Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@4.18.0-425.3.1?arch=el8
Typerpm
Namespaceredhat
Namekernel
Version4.18.0-425.3.1
Qualifiers
arch el8
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-18e7-kygq-cbay
vulnerability_id VCID-18e7-kygq-cbay
summary kernel: igc: Reinstate IGC_REMOVED logic and implement it properly
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49605.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49605.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49605
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.12919
published_at 2026-04-02T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12968
published_at 2026-04-04T12:55:00Z
2
value 0.00146
scoring_system epss
scoring_elements 0.34998
published_at 2026-04-09T12:55:00Z
3
value 0.00146
scoring_system epss
scoring_elements 0.35002
published_at 2026-04-11T12:55:00Z
4
value 0.00146
scoring_system epss
scoring_elements 0.34966
published_at 2026-04-12T12:55:00Z
5
value 0.00146
scoring_system epss
scoring_elements 0.34942
published_at 2026-04-13T12:55:00Z
6
value 0.00146
scoring_system epss
scoring_elements 0.34981
published_at 2026-04-16T12:55:00Z
7
value 0.00146
scoring_system epss
scoring_elements 0.34965
published_at 2026-04-18T12:55:00Z
8
value 0.00146
scoring_system epss
scoring_elements 0.34921
published_at 2026-04-21T12:55:00Z
9
value 0.00146
scoring_system epss
scoring_elements 0.34692
published_at 2026-04-24T12:55:00Z
10
value 0.00146
scoring_system epss
scoring_elements 0.34924
published_at 2026-04-07T12:55:00Z
11
value 0.00146
scoring_system epss
scoring_elements 0.34969
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49605
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49605
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49605
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348215
reference_id 2348215
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348215
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49605
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-18e7-kygq-cbay
1
url VCID-18mv-aj8j-2qg2
vulnerability_id VCID-18mv-aj8j-2qg2
summary kernel: usb: dwc3: gadget: Replace list_for_each_entry_safe() if using giveback
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49398.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49398.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49398
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10785
published_at 2026-04-02T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10848
published_at 2026-04-04T12:55:00Z
2
value 0.0008
scoring_system epss
scoring_elements 0.2376
published_at 2026-04-09T12:55:00Z
3
value 0.0008
scoring_system epss
scoring_elements 0.23775
published_at 2026-04-11T12:55:00Z
4
value 0.0008
scoring_system epss
scoring_elements 0.23731
published_at 2026-04-12T12:55:00Z
5
value 0.0008
scoring_system epss
scoring_elements 0.23675
published_at 2026-04-13T12:55:00Z
6
value 0.0008
scoring_system epss
scoring_elements 0.23687
published_at 2026-04-16T12:55:00Z
7
value 0.0008
scoring_system epss
scoring_elements 0.23677
published_at 2026-04-18T12:55:00Z
8
value 0.0008
scoring_system epss
scoring_elements 0.23656
published_at 2026-04-21T12:55:00Z
9
value 0.0008
scoring_system epss
scoring_elements 0.23544
published_at 2026-04-24T12:55:00Z
10
value 0.0008
scoring_system epss
scoring_elements 0.23644
published_at 2026-04-07T12:55:00Z
11
value 0.0008
scoring_system epss
scoring_elements 0.23713
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49398
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49398
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49398
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348309
reference_id 2348309
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348309
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49398
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-18mv-aj8j-2qg2
2
url VCID-1rhh-zrug-1ueq
vulnerability_id VCID-1rhh-zrug-1ueq
summary kernel: KVM: VMX: Prevent RSB underflow before vmenter
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49610.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49610.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49610
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.13
published_at 2026-04-02T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.13049
published_at 2026-04-04T12:55:00Z
2
value 0.00072
scoring_system epss
scoring_elements 0.22042
published_at 2026-04-09T12:55:00Z
3
value 0.00072
scoring_system epss
scoring_elements 0.22056
published_at 2026-04-11T12:55:00Z
4
value 0.00072
scoring_system epss
scoring_elements 0.22015
published_at 2026-04-12T12:55:00Z
5
value 0.00072
scoring_system epss
scoring_elements 0.21956
published_at 2026-04-13T12:55:00Z
6
value 0.00072
scoring_system epss
scoring_elements 0.21955
published_at 2026-04-16T12:55:00Z
7
value 0.00072
scoring_system epss
scoring_elements 0.21952
published_at 2026-04-18T12:55:00Z
8
value 0.00072
scoring_system epss
scoring_elements 0.21909
published_at 2026-04-21T12:55:00Z
9
value 0.00072
scoring_system epss
scoring_elements 0.21763
published_at 2026-04-24T12:55:00Z
10
value 0.00072
scoring_system epss
scoring_elements 0.21906
published_at 2026-04-07T12:55:00Z
11
value 0.00072
scoring_system epss
scoring_elements 0.21987
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49610
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49610
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347926
reference_id 2347926
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347926
5
reference_url https://access.redhat.com/errata/RHSA-2022:7110
reference_id RHSA-2022:7110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7110
6
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
7
reference_url https://access.redhat.com/errata/RHSA-2022:8973
reference_id RHSA-2022:8973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8973
fixed_packages
aliases CVE-2022-49610
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1rhh-zrug-1ueq
3
url VCID-1tdb-pc8x-yud9
vulnerability_id VCID-1tdb-pc8x-yud9
summary kernel: memory leak in drivers/hid/hid-elo.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27950.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27950.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27950
reference_id
reference_type
scores
0
value 0.00069
scoring_system epss
scoring_elements 0.21241
published_at 2026-04-02T12:55:00Z
1
value 0.00069
scoring_system epss
scoring_elements 0.21294
published_at 2026-04-04T12:55:00Z
2
value 0.00069
scoring_system epss
scoring_elements 0.21045
published_at 2026-04-07T12:55:00Z
3
value 0.00069
scoring_system epss
scoring_elements 0.21127
published_at 2026-04-08T12:55:00Z
4
value 0.00069
scoring_system epss
scoring_elements 0.21187
published_at 2026-04-09T12:55:00Z
5
value 0.00069
scoring_system epss
scoring_elements 0.21198
published_at 2026-04-11T12:55:00Z
6
value 0.00069
scoring_system epss
scoring_elements 0.21156
published_at 2026-04-12T12:55:00Z
7
value 0.00069
scoring_system epss
scoring_elements 0.21104
published_at 2026-04-13T12:55:00Z
8
value 0.00069
scoring_system epss
scoring_elements 0.21096
published_at 2026-04-16T12:55:00Z
9
value 0.00069
scoring_system epss
scoring_elements 0.21107
published_at 2026-04-18T12:55:00Z
10
value 0.00069
scoring_system epss
scoring_elements 0.21084
published_at 2026-04-21T12:55:00Z
11
value 0.00069
scoring_system epss
scoring_elements 0.20957
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27950
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2069408
reference_id 2069408
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2069408
4
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2024:1188
reference_id RHSA-2024:1188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1188
fixed_packages
aliases CVE-2022-27950
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1tdb-pc8x-yud9
4
url VCID-24k6-kgcc-fkev
vulnerability_id VCID-24k6-kgcc-fkev
summary kernel: ACPI: CPPC: Avoid out of bounds access when parsing _CPC data
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49145.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49145.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49145
reference_id
reference_type
scores
0
value 0.00052
scoring_system epss
scoring_elements 0.16113
published_at 2026-04-24T12:55:00Z
1
value 0.00052
scoring_system epss
scoring_elements 0.16167
published_at 2026-04-16T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.16184
published_at 2026-04-18T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.16221
published_at 2026-04-21T12:55:00Z
4
value 0.00052
scoring_system epss
scoring_elements 0.16206
published_at 2026-04-07T12:55:00Z
5
value 0.00052
scoring_system epss
scoring_elements 0.16292
published_at 2026-04-08T12:55:00Z
6
value 0.00052
scoring_system epss
scoring_elements 0.16356
published_at 2026-04-09T12:55:00Z
7
value 0.00052
scoring_system epss
scoring_elements 0.16337
published_at 2026-04-11T12:55:00Z
8
value 0.00052
scoring_system epss
scoring_elements 0.16298
published_at 2026-04-12T12:55:00Z
9
value 0.00052
scoring_system epss
scoring_elements 0.1623
published_at 2026-04-13T12:55:00Z
10
value 0.00057
scoring_system epss
scoring_elements 0.1802
published_at 2026-04-02T12:55:00Z
11
value 0.00057
scoring_system epss
scoring_elements 0.18074
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49145
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49145
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49145
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348029
reference_id 2348029
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348029
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49145
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-24k6-kgcc-fkev
5
url VCID-2a7t-t8ex-nkch
vulnerability_id VCID-2a7t-t8ex-nkch
summary kernel: iommu/arm-smmu-v3-sva: Fix mm use-after-free
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49426.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49426.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49426
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11313
published_at 2026-04-02T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11373
published_at 2026-04-04T12:55:00Z
2
value 0.00138
scoring_system epss
scoring_elements 0.33454
published_at 2026-04-24T12:55:00Z
3
value 0.00138
scoring_system epss
scoring_elements 0.33818
published_at 2026-04-07T12:55:00Z
4
value 0.00138
scoring_system epss
scoring_elements 0.3386
published_at 2026-04-08T12:55:00Z
5
value 0.00138
scoring_system epss
scoring_elements 0.33892
published_at 2026-04-09T12:55:00Z
6
value 0.00138
scoring_system epss
scoring_elements 0.33891
published_at 2026-04-11T12:55:00Z
7
value 0.00138
scoring_system epss
scoring_elements 0.33849
published_at 2026-04-12T12:55:00Z
8
value 0.00138
scoring_system epss
scoring_elements 0.33824
published_at 2026-04-13T12:55:00Z
9
value 0.00138
scoring_system epss
scoring_elements 0.33862
published_at 2026-04-16T12:55:00Z
10
value 0.00138
scoring_system epss
scoring_elements 0.33847
published_at 2026-04-18T12:55:00Z
11
value 0.00138
scoring_system epss
scoring_elements 0.33816
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49426
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347804
reference_id 2347804
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347804
4
reference_url https://git.kernel.org/stable/c/9aa215450888cf29af0c479e14a712dc6b0c506c
reference_id 9aa215450888cf29af0c479e14a712dc6b0c506c
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:10Z/
url https://git.kernel.org/stable/c/9aa215450888cf29af0c479e14a712dc6b0c506c
5
reference_url https://git.kernel.org/stable/c/cbd23144f7662b00bcde32a938c4a4057e476d68
reference_id cbd23144f7662b00bcde32a938c4a4057e476d68
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:10Z/
url https://git.kernel.org/stable/c/cbd23144f7662b00bcde32a938c4a4057e476d68
6
reference_url https://git.kernel.org/stable/c/e3cbbdbff8a4db5d053c53fd71be62ccccdb52b0
reference_id e3cbbdbff8a4db5d053c53fd71be62ccccdb52b0
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:10Z/
url https://git.kernel.org/stable/c/e3cbbdbff8a4db5d053c53fd71be62ccccdb52b0
7
reference_url https://git.kernel.org/stable/c/fc90f13ea0dcd960e5002d204fa55cec4e0db2fa
reference_id fc90f13ea0dcd960e5002d204fa55cec4e0db2fa
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:10Z/
url https://git.kernel.org/stable/c/fc90f13ea0dcd960e5002d204fa55cec4e0db2fa
8
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
9
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49426
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2a7t-t8ex-nkch
6
url VCID-2jda-3qf9-6kg2
vulnerability_id VCID-2jda-3qf9-6kg2
summary kernel: scsi: scsi_debug: Fix type in min_t to avoid stack OOB
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47580.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47580.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-47580
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.0315
published_at 2026-04-01T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03207
published_at 2026-04-02T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03252
published_at 2026-04-24T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03248
published_at 2026-04-09T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03204
published_at 2026-04-11T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03177
published_at 2026-04-12T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.03156
published_at 2026-04-13T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.0313
published_at 2026-04-16T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.03137
published_at 2026-04-18T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03257
published_at 2026-04-21T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03216
published_at 2026-04-04T12:55:00Z
11
value 0.00015
scoring_system epss
scoring_elements 0.03219
published_at 2026-04-07T12:55:00Z
12
value 0.00015
scoring_system epss
scoring_elements 0.03224
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-47580
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47580
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47580
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2293249
reference_id 2293249
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2293249
5
reference_url https://git.kernel.org/stable/c/3085147645938eb41f0bc0e25ef9791e71f5ee4b
reference_id 3085147645938eb41f0bc0e25ef9791e71f5ee4b
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-20T15:21:00Z/
url https://git.kernel.org/stable/c/3085147645938eb41f0bc0e25ef9791e71f5ee4b
6
reference_url https://git.kernel.org/stable/c/36e07d7ede88a1f1ef8f0f209af5b7612324ac2c
reference_id 36e07d7ede88a1f1ef8f0f209af5b7612324ac2c
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-20T15:21:00Z/
url https://git.kernel.org/stable/c/36e07d7ede88a1f1ef8f0f209af5b7612324ac2c
7
reference_url https://git.kernel.org/stable/c/bdb854f134b964528fa543e0351022eb45bd7346
reference_id bdb854f134b964528fa543e0351022eb45bd7346
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-20T15:21:00Z/
url https://git.kernel.org/stable/c/bdb854f134b964528fa543e0351022eb45bd7346
8
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
9
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
10
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
11
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2021-47580
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2jda-3qf9-6kg2
7
url VCID-2uct-bxdp-4ygm
vulnerability_id VCID-2uct-bxdp-4ygm
summary kernel: RDMA/hfi1: Fix potential integer multiplication overflow errors
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49404.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49404.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49404
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01423
published_at 2026-04-24T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.09738
published_at 2026-04-02T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.09788
published_at 2026-04-04T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13653
published_at 2026-04-07T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13736
published_at 2026-04-08T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13786
published_at 2026-04-09T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13755
published_at 2026-04-11T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13718
published_at 2026-04-12T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.13668
published_at 2026-04-13T12:55:00Z
9
value 0.00045
scoring_system epss
scoring_elements 0.13579
published_at 2026-04-16T12:55:00Z
10
value 0.00045
scoring_system epss
scoring_elements 0.13576
published_at 2026-04-18T12:55:00Z
11
value 0.00045
scoring_system epss
scoring_elements 0.13649
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49404
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49404
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49404
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348266
reference_id 2348266
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348266
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49404
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2uct-bxdp-4ygm
8
url VCID-3auk-78hr-2kg6
vulnerability_id VCID-3auk-78hr-2kg6
summary kernel: PM: domains: Fix sleep-in-atomic bug caused by genpd_debug_remove()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49265.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49265.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49265
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10785
published_at 2026-04-02T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10848
published_at 2026-04-04T12:55:00Z
2
value 0.00064
scoring_system epss
scoring_elements 0.1998
published_at 2026-04-09T12:55:00Z
3
value 0.00064
scoring_system epss
scoring_elements 0.2
published_at 2026-04-11T12:55:00Z
4
value 0.00064
scoring_system epss
scoring_elements 0.19955
published_at 2026-04-12T12:55:00Z
5
value 0.00064
scoring_system epss
scoring_elements 0.19897
published_at 2026-04-13T12:55:00Z
6
value 0.00064
scoring_system epss
scoring_elements 0.19875
published_at 2026-04-16T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.19879
published_at 2026-04-18T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.19877
published_at 2026-04-21T12:55:00Z
9
value 0.00064
scoring_system epss
scoring_elements 0.19772
published_at 2026-04-24T12:55:00Z
10
value 0.00064
scoring_system epss
scoring_elements 0.19846
published_at 2026-04-07T12:55:00Z
11
value 0.00064
scoring_system epss
scoring_elements 0.19926
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49265
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348093
reference_id 2348093
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348093
4
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49265
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3auk-78hr-2kg6
9
url VCID-3cn4-nfwc-eff5
vulnerability_id VCID-3cn4-nfwc-eff5
summary kernel: dm raid: fix address sanitizer warning in raid_resume
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50085.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50085.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50085
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06385
published_at 2026-04-02T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06428
published_at 2026-04-04T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06416
published_at 2026-04-07T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06466
published_at 2026-04-08T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06508
published_at 2026-04-09T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06505
published_at 2026-04-11T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06498
published_at 2026-04-12T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06488
published_at 2026-04-13T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.19811
published_at 2026-04-24T12:55:00Z
9
value 0.00064
scoring_system epss
scoring_elements 0.19917
published_at 2026-04-16T12:55:00Z
10
value 0.00064
scoring_system epss
scoring_elements 0.19921
published_at 2026-04-18T12:55:00Z
11
value 0.00064
scoring_system epss
scoring_elements 0.19918
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50085
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50085
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50085
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373463
reference_id 2373463
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373463
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-50085
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3cn4-nfwc-eff5
10
url VCID-3zrw-j38p-e7dw
vulnerability_id VCID-3zrw-j38p-e7dw
summary kernel: ext4: add reserved GDT blocks check
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49707.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49707.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49707
reference_id
reference_type
scores
0
value 0.0001
scoring_system epss
scoring_elements 0.01078
published_at 2026-04-24T12:55:00Z
1
value 0.0001
scoring_system epss
scoring_elements 0.01032
published_at 2026-04-07T12:55:00Z
2
value 0.0001
scoring_system epss
scoring_elements 0.01037
published_at 2026-04-08T12:55:00Z
3
value 0.0001
scoring_system epss
scoring_elements 0.01035
published_at 2026-04-09T12:55:00Z
4
value 0.0001
scoring_system epss
scoring_elements 0.0102
published_at 2026-04-11T12:55:00Z
5
value 0.0001
scoring_system epss
scoring_elements 0.01015
published_at 2026-04-12T12:55:00Z
6
value 0.0001
scoring_system epss
scoring_elements 0.01014
published_at 2026-04-13T12:55:00Z
7
value 0.0001
scoring_system epss
scoring_elements 0.01008
published_at 2026-04-16T12:55:00Z
8
value 0.0001
scoring_system epss
scoring_elements 0.01017
published_at 2026-04-18T12:55:00Z
9
value 0.0001
scoring_system epss
scoring_elements 0.01076
published_at 2026-04-21T12:55:00Z
10
value 0.00028
scoring_system epss
scoring_elements 0.08089
published_at 2026-04-04T12:55:00Z
11
value 0.00028
scoring_system epss
scoring_elements 0.08046
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49707
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49707
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/0dc2fca8e4f9ac4a40e8424a10163369cca0cc06
reference_id 0dc2fca8e4f9ac4a40e8424a10163369cca0cc06
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:32:29Z/
url https://git.kernel.org/stable/c/0dc2fca8e4f9ac4a40e8424a10163369cca0cc06
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348100
reference_id 2348100
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348100
6
reference_url https://git.kernel.org/stable/c/33b1bba31f4c784d33d2c2517964bdccdc9204cd
reference_id 33b1bba31f4c784d33d2c2517964bdccdc9204cd
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:32:29Z/
url https://git.kernel.org/stable/c/33b1bba31f4c784d33d2c2517964bdccdc9204cd
7
reference_url https://git.kernel.org/stable/c/7c921328ac760bba780bdace41f4cd045f7f1405
reference_id 7c921328ac760bba780bdace41f4cd045f7f1405
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:32:29Z/
url https://git.kernel.org/stable/c/7c921328ac760bba780bdace41f4cd045f7f1405
8
reference_url https://git.kernel.org/stable/c/af75c481a2e45e70f62f5942c93695e95bf7bd21
reference_id af75c481a2e45e70f62f5942c93695e95bf7bd21
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:32:29Z/
url https://git.kernel.org/stable/c/af75c481a2e45e70f62f5942c93695e95bf7bd21
9
reference_url https://git.kernel.org/stable/c/b55c3cd102a6f48b90e61c44f7f3dda8c290c694
reference_id b55c3cd102a6f48b90e61c44f7f3dda8c290c694
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:32:29Z/
url https://git.kernel.org/stable/c/b55c3cd102a6f48b90e61c44f7f3dda8c290c694
10
reference_url https://git.kernel.org/stable/c/b9747263b13e5290ac4d63bec47e38f701303cad
reference_id b9747263b13e5290ac4d63bec47e38f701303cad
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:32:29Z/
url https://git.kernel.org/stable/c/b9747263b13e5290ac4d63bec47e38f701303cad
11
reference_url https://git.kernel.org/stable/c/bfd004a1d3a062aac300523d406ac1f3e5f1a82c
reference_id bfd004a1d3a062aac300523d406ac1f3e5f1a82c
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:32:29Z/
url https://git.kernel.org/stable/c/bfd004a1d3a062aac300523d406ac1f3e5f1a82c
12
reference_url https://git.kernel.org/stable/c/fba54289176702a7caac0b64738406775817f451
reference_id fba54289176702a7caac0b64738406775817f451
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:32:29Z/
url https://git.kernel.org/stable/c/fba54289176702a7caac0b64738406775817f451
13
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
14
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49707
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3zrw-j38p-e7dw
11
url VCID-4qgp-hd8a-a7a7
vulnerability_id VCID-4qgp-hd8a-a7a7
summary kernel: thermal: core: Fix TZ_GET_TRIP NULL pointer dereference
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48915.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48915.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-48915
reference_id
reference_type
scores
0
value 0.00028
scoring_system epss
scoring_elements 0.07861
published_at 2026-04-02T12:55:00Z
1
value 0.00028
scoring_system epss
scoring_elements 0.0791
published_at 2026-04-24T12:55:00Z
2
value 0.00028
scoring_system epss
scoring_elements 0.07913
published_at 2026-04-12T12:55:00Z
3
value 0.00028
scoring_system epss
scoring_elements 0.07899
published_at 2026-04-13T12:55:00Z
4
value 0.00028
scoring_system epss
scoring_elements 0.07814
published_at 2026-04-16T12:55:00Z
5
value 0.00028
scoring_system epss
scoring_elements 0.07797
published_at 2026-04-18T12:55:00Z
6
value 0.00028
scoring_system epss
scoring_elements 0.07952
published_at 2026-04-21T12:55:00Z
7
value 0.00028
scoring_system epss
scoring_elements 0.07909
published_at 2026-04-04T12:55:00Z
8
value 0.00028
scoring_system epss
scoring_elements 0.07862
published_at 2026-04-07T12:55:00Z
9
value 0.00028
scoring_system epss
scoring_elements 0.07921
published_at 2026-04-08T12:55:00Z
10
value 0.00028
scoring_system epss
scoring_elements 0.07941
published_at 2026-04-09T12:55:00Z
11
value 0.00028
scoring_system epss
scoring_elements 0.07929
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-48915
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48915
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/1c0b51e62a50e9291764d022ed44549e65d6ab9c
reference_id 1c0b51e62a50e9291764d022ed44549e65d6ab9c
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:33:47Z/
url https://git.kernel.org/stable/c/1c0b51e62a50e9291764d022ed44549e65d6ab9c
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2307168
reference_id 2307168
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2307168
6
reference_url https://git.kernel.org/stable/c/3dafbf915c05f83469e791949b5590da2aca2afb
reference_id 3dafbf915c05f83469e791949b5590da2aca2afb
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:33:47Z/
url https://git.kernel.org/stable/c/3dafbf915c05f83469e791949b5590da2aca2afb
7
reference_url https://git.kernel.org/stable/c/4c294285cec3964b3291772ac0642c2bf440bd1b
reference_id 4c294285cec3964b3291772ac0642c2bf440bd1b
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:33:47Z/
url https://git.kernel.org/stable/c/4c294285cec3964b3291772ac0642c2bf440bd1b
8
reference_url https://git.kernel.org/stable/c/5838a14832d447990827d85e90afe17e6fb9c175
reference_id 5838a14832d447990827d85e90afe17e6fb9c175
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:33:47Z/
url https://git.kernel.org/stable/c/5838a14832d447990827d85e90afe17e6fb9c175
9
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
10
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
fixed_packages
aliases CVE-2022-48915
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4qgp-hd8a-a7a7
12
url VCID-4r38-vuty-qfdw
vulnerability_id VCID-4r38-vuty-qfdw
summary kernel: ext4: avoid cycles in directory h-tree
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49343.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49343.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49343
reference_id
reference_type
scores
0
value 0.00028
scoring_system epss
scoring_elements 0.08046
published_at 2026-04-02T12:55:00Z
1
value 0.00028
scoring_system epss
scoring_elements 0.08089
published_at 2026-04-04T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.15282
published_at 2026-04-09T12:55:00Z
3
value 0.00049
scoring_system epss
scoring_elements 0.15252
published_at 2026-04-11T12:55:00Z
4
value 0.00049
scoring_system epss
scoring_elements 0.15213
published_at 2026-04-12T12:55:00Z
5
value 0.00049
scoring_system epss
scoring_elements 0.15149
published_at 2026-04-13T12:55:00Z
6
value 0.00049
scoring_system epss
scoring_elements 0.15062
published_at 2026-04-16T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.15071
published_at 2026-04-18T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.15122
published_at 2026-04-21T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.15161
published_at 2026-04-24T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.15143
published_at 2026-04-07T12:55:00Z
11
value 0.00049
scoring_system epss
scoring_elements 0.15231
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49343
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49343
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348095
reference_id 2348095
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348095
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49343
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4r38-vuty-qfdw
13
url VCID-4w5c-d8pd-uqeb
vulnerability_id VCID-4w5c-d8pd-uqeb
summary kernel: use-after-free due to improper update of reference count in net/sched/cls_u32.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29581.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29581.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-29581
reference_id
reference_type
scores
0
value 0.00185
scoring_system epss
scoring_elements 0.40141
published_at 2026-04-24T12:55:00Z
1
value 0.00185
scoring_system epss
scoring_elements 0.40337
published_at 2026-04-11T12:55:00Z
2
value 0.00185
scoring_system epss
scoring_elements 0.403
published_at 2026-04-12T12:55:00Z
3
value 0.00185
scoring_system epss
scoring_elements 0.4028
published_at 2026-04-13T12:55:00Z
4
value 0.00185
scoring_system epss
scoring_elements 0.40327
published_at 2026-04-16T12:55:00Z
5
value 0.00185
scoring_system epss
scoring_elements 0.40296
published_at 2026-04-18T12:55:00Z
6
value 0.00185
scoring_system epss
scoring_elements 0.4022
published_at 2026-04-21T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42113
published_at 2026-04-07T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.42163
published_at 2026-04-08T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42175
published_at 2026-04-09T12:55:00Z
10
value 0.00392
scoring_system epss
scoring_elements 0.60155
published_at 2026-04-02T12:55:00Z
11
value 0.00392
scoring_system epss
scoring_elements 0.60181
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-29581
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
39
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
40
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2088021
reference_id 2088021
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2088021
41
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
42
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
43
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
44
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
45
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
46
reference_url https://usn.ubuntu.com/5442-1/
reference_id USN-5442-1
reference_type
scores
url https://usn.ubuntu.com/5442-1/
47
reference_url https://usn.ubuntu.com/5442-2/
reference_id USN-5442-2
reference_type
scores
url https://usn.ubuntu.com/5442-2/
48
reference_url https://usn.ubuntu.com/5443-1/
reference_id USN-5443-1
reference_type
scores
url https://usn.ubuntu.com/5443-1/
49
reference_url https://usn.ubuntu.com/5443-2/
reference_id USN-5443-2
reference_type
scores
url https://usn.ubuntu.com/5443-2/
50
reference_url https://usn.ubuntu.com/5444-1/
reference_id USN-5444-1
reference_type
scores
url https://usn.ubuntu.com/5444-1/
fixed_packages
aliases CVE-2022-29581
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4w5c-d8pd-uqeb
14
url VCID-4xaf-p3np-2kbp
vulnerability_id VCID-4xaf-p3np-2kbp
summary kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1158.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1158.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1158
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04095
published_at 2026-04-01T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04172
published_at 2026-04-07T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04134
published_at 2026-04-02T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.04153
published_at 2026-04-04T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.04203
published_at 2026-04-08T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.04218
published_at 2026-04-09T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.04199
published_at 2026-04-11T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.04182
published_at 2026-04-12T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.04158
published_at 2026-04-13T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.05153
published_at 2026-04-16T12:55:00Z
10
value 0.0002
scoring_system epss
scoring_elements 0.05307
published_at 2026-04-21T12:55:00Z
11
value 0.0002
scoring_system epss
scoring_elements 0.05155
published_at 2026-04-18T12:55:00Z
12
value 0.0002
scoring_system epss
scoring_elements 0.05346
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1158
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582
21
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2069793
reference_id 2069793
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2069793
23
reference_url https://security.archlinux.org/AVG-2698
reference_id AVG-2698
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2698
24
reference_url https://security.archlinux.org/AVG-2699
reference_id AVG-2699
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2699
25
reference_url https://security.archlinux.org/AVG-2700
reference_id AVG-2700
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2700
26
reference_url https://security.archlinux.org/AVG-2701
reference_id AVG-2701
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2701
27
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
28
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
29
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
30
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
31
reference_url https://access.redhat.com/errata/RHSA-2022:8673
reference_id RHSA-2022:8673
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8673
32
reference_url https://access.redhat.com/errata/RHSA-2022:8685
reference_id RHSA-2022:8685
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8685
33
reference_url https://access.redhat.com/errata/RHSA-2022:8686
reference_id RHSA-2022:8686
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8686
34
reference_url https://access.redhat.com/errata/RHSA-2022:8809
reference_id RHSA-2022:8809
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8809
35
reference_url https://access.redhat.com/errata/RHSA-2022:8831
reference_id RHSA-2022:8831
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8831
36
reference_url https://access.redhat.com/errata/RHSA-2022:8940
reference_id RHSA-2022:8940
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8940
37
reference_url https://access.redhat.com/errata/RHSA-2022:8941
reference_id RHSA-2022:8941
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8941
38
reference_url https://access.redhat.com/errata/RHSA-2022:8973
reference_id RHSA-2022:8973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8973
39
reference_url https://access.redhat.com/errata/RHSA-2022:8974
reference_id RHSA-2022:8974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8974
40
reference_url https://access.redhat.com/errata/RHSA-2022:8989
reference_id RHSA-2022:8989
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8989
41
reference_url https://access.redhat.com/errata/RHSA-2022:9082
reference_id RHSA-2022:9082
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9082
42
reference_url https://usn.ubuntu.com/5416-1/
reference_id USN-5416-1
reference_type
scores
url https://usn.ubuntu.com/5416-1/
43
reference_url https://usn.ubuntu.com/5467-1/
reference_id USN-5467-1
reference_type
scores
url https://usn.ubuntu.com/5467-1/
44
reference_url https://usn.ubuntu.com/5468-1/
reference_id USN-5468-1
reference_type
scores
url https://usn.ubuntu.com/5468-1/
45
reference_url https://usn.ubuntu.com/5469-1/
reference_id USN-5469-1
reference_type
scores
url https://usn.ubuntu.com/5469-1/
fixed_packages
aliases CVE-2022-1158
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4xaf-p3np-2kbp
15
url VCID-5149-phe6-eqh5
vulnerability_id VCID-5149-phe6-eqh5
summary kernel: DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36946.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36946.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-36946
reference_id
reference_type
scores
0
value 0.05077
scoring_system epss
scoring_elements 0.89823
published_at 2026-04-24T12:55:00Z
1
value 0.05077
scoring_system epss
scoring_elements 0.8976
published_at 2026-04-02T12:55:00Z
2
value 0.05077
scoring_system epss
scoring_elements 0.89775
published_at 2026-04-04T12:55:00Z
3
value 0.05077
scoring_system epss
scoring_elements 0.89779
published_at 2026-04-07T12:55:00Z
4
value 0.05077
scoring_system epss
scoring_elements 0.89796
published_at 2026-04-08T12:55:00Z
5
value 0.05077
scoring_system epss
scoring_elements 0.89802
published_at 2026-04-09T12:55:00Z
6
value 0.05077
scoring_system epss
scoring_elements 0.89809
published_at 2026-04-11T12:55:00Z
7
value 0.05077
scoring_system epss
scoring_elements 0.89807
published_at 2026-04-12T12:55:00Z
8
value 0.05077
scoring_system epss
scoring_elements 0.898
published_at 2026-04-13T12:55:00Z
9
value 0.05077
scoring_system epss
scoring_elements 0.89814
published_at 2026-04-18T12:55:00Z
10
value 0.05077
scoring_system epss
scoring_elements 0.89808
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-36946
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2115278
reference_id 2115278
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2115278
12
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
13
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
14
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
15
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
16
reference_url https://www.debian.org/security/2022/dsa-5207
reference_id dsa-5207
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/
url https://www.debian.org/security/2022/dsa-5207
17
reference_url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=99a63d36cb3ed5ca3aa6fcb64cffbeaf3b0fb164
reference_id ?id=99a63d36cb3ed5ca3aa6fcb64cffbeaf3b0fb164
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/
url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=99a63d36cb3ed5ca3aa6fcb64cffbeaf3b0fb164
18
reference_url https://marc.info/?l=netfilter-devel&m=165883202007292&w=2
reference_id ?l=netfilter-devel&m=165883202007292&w=2
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/
url https://marc.info/?l=netfilter-devel&m=165883202007292&w=2
19
reference_url https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html
reference_id msg00000.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/
url https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html
20
reference_url https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html
reference_id msg00011.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/
url https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html
21
reference_url https://security.netapp.com/advisory/ntap-20220901-0007/
reference_id ntap-20220901-0007
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/
url https://security.netapp.com/advisory/ntap-20220901-0007/
22
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
23
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
24
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
25
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
26
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
27
reference_url https://usn.ubuntu.com/5580-1/
reference_id USN-5580-1
reference_type
scores
url https://usn.ubuntu.com/5580-1/
28
reference_url https://usn.ubuntu.com/5590-1/
reference_id USN-5590-1
reference_type
scores
url https://usn.ubuntu.com/5590-1/
29
reference_url https://usn.ubuntu.com/5621-1/
reference_id USN-5621-1
reference_type
scores
url https://usn.ubuntu.com/5621-1/
30
reference_url https://usn.ubuntu.com/5622-1/
reference_id USN-5622-1
reference_type
scores
url https://usn.ubuntu.com/5622-1/
31
reference_url https://usn.ubuntu.com/5623-1/
reference_id USN-5623-1
reference_type
scores
url https://usn.ubuntu.com/5623-1/
32
reference_url https://usn.ubuntu.com/5624-1/
reference_id USN-5624-1
reference_type
scores
url https://usn.ubuntu.com/5624-1/
33
reference_url https://usn.ubuntu.com/5630-1/
reference_id USN-5630-1
reference_type
scores
url https://usn.ubuntu.com/5630-1/
34
reference_url https://usn.ubuntu.com/5633-1/
reference_id USN-5633-1
reference_type
scores
url https://usn.ubuntu.com/5633-1/
35
reference_url https://usn.ubuntu.com/5634-1/
reference_id USN-5634-1
reference_type
scores
url https://usn.ubuntu.com/5634-1/
36
reference_url https://usn.ubuntu.com/5635-1/
reference_id USN-5635-1
reference_type
scores
url https://usn.ubuntu.com/5635-1/
37
reference_url https://usn.ubuntu.com/5639-1/
reference_id USN-5639-1
reference_type
scores
url https://usn.ubuntu.com/5639-1/
38
reference_url https://usn.ubuntu.com/5640-1/
reference_id USN-5640-1
reference_type
scores
url https://usn.ubuntu.com/5640-1/
39
reference_url https://usn.ubuntu.com/5644-1/
reference_id USN-5644-1
reference_type
scores
url https://usn.ubuntu.com/5644-1/
40
reference_url https://usn.ubuntu.com/5647-1/
reference_id USN-5647-1
reference_type
scores
url https://usn.ubuntu.com/5647-1/
41
reference_url https://usn.ubuntu.com/5648-1/
reference_id USN-5648-1
reference_type
scores
url https://usn.ubuntu.com/5648-1/
42
reference_url https://usn.ubuntu.com/5650-1/
reference_id USN-5650-1
reference_type
scores
url https://usn.ubuntu.com/5650-1/
43
reference_url https://usn.ubuntu.com/5652-1/
reference_id USN-5652-1
reference_type
scores
url https://usn.ubuntu.com/5652-1/
44
reference_url https://usn.ubuntu.com/5654-1/
reference_id USN-5654-1
reference_type
scores
url https://usn.ubuntu.com/5654-1/
45
reference_url https://usn.ubuntu.com/5655-1/
reference_id USN-5655-1
reference_type
scores
url https://usn.ubuntu.com/5655-1/
46
reference_url https://usn.ubuntu.com/5660-1/
reference_id USN-5660-1
reference_type
scores
url https://usn.ubuntu.com/5660-1/
47
reference_url https://usn.ubuntu.com/5683-1/
reference_id USN-5683-1
reference_type
scores
url https://usn.ubuntu.com/5683-1/
fixed_packages
aliases CVE-2022-36946
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5149-phe6-eqh5
16
url VCID-56gq-qmzj-1yaj
vulnerability_id VCID-56gq-qmzj-1yaj
summary kernel: KVM: x86/mmu: Zap _all_ roots when unmapping gfn range in TDP MMU
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47639.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47639.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-47639
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.05307
published_at 2026-04-24T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.05199
published_at 2026-04-11T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.05183
published_at 2026-04-12T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.05168
published_at 2026-04-13T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.05114
published_at 2026-04-16T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.05118
published_at 2026-04-18T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.05269
published_at 2026-04-21T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.11168
published_at 2026-04-01T12:55:00Z
8
value 0.00038
scoring_system epss
scoring_elements 0.11313
published_at 2026-04-02T12:55:00Z
9
value 0.00038
scoring_system epss
scoring_elements 0.11373
published_at 2026-04-04T12:55:00Z
10
value 0.00091
scoring_system epss
scoring_elements 0.25784
published_at 2026-04-09T12:55:00Z
11
value 0.00091
scoring_system epss
scoring_elements 0.25665
published_at 2026-04-07T12:55:00Z
12
value 0.00091
scoring_system epss
scoring_elements 0.25736
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-47639
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://git.kernel.org/stable/c/0c8a8da182d4333d9bbb9131d765145568c847b2
reference_id 0c8a8da182d4333d9bbb9131d765145568c847b2
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:17:52Z/
url https://git.kernel.org/stable/c/0c8a8da182d4333d9bbb9131d765145568c847b2
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348067
reference_id 2348067
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348067
5
reference_url https://git.kernel.org/stable/c/8cf6f98ab1d16d5e607635a0c21c4231eb15367e
reference_id 8cf6f98ab1d16d5e607635a0c21c4231eb15367e
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:17:52Z/
url https://git.kernel.org/stable/c/8cf6f98ab1d16d5e607635a0c21c4231eb15367e
6
reference_url https://git.kernel.org/stable/c/af47248407c0c5ae52a752af1ab5ce5b0db91502
reference_id af47248407c0c5ae52a752af1ab5ce5b0db91502
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:17:52Z/
url https://git.kernel.org/stable/c/af47248407c0c5ae52a752af1ab5ce5b0db91502
7
reference_url https://git.kernel.org/stable/c/d62007edf01f5c11f75d0f4b1e538fc52a5b1982
reference_id d62007edf01f5c11f75d0f4b1e538fc52a5b1982
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:17:52Z/
url https://git.kernel.org/stable/c/d62007edf01f5c11f75d0f4b1e538fc52a5b1982
8
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
9
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2021-47639
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-56gq-qmzj-1yaj
17
url VCID-582a-cnj5-fub5
vulnerability_id VCID-582a-cnj5-fub5
summary kernel: BPF: Fix potential bad pointer dereference in bpf_sys_bpf()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50069.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50069.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50069
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04693
published_at 2026-04-02T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04734
published_at 2026-04-04T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04751
published_at 2026-04-13T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04784
published_at 2026-04-08T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04796
published_at 2026-04-09T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04788
published_at 2026-04-11T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04768
published_at 2026-04-12T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.15157
published_at 2026-04-24T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.15058
published_at 2026-04-16T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.15068
published_at 2026-04-18T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.15119
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50069
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373533
reference_id 2373533
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373533
4
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
5
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
fixed_packages
aliases CVE-2022-50069
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-582a-cnj5-fub5
18
url VCID-5pt2-wwc2-zbfy
vulnerability_id VCID-5pt2-wwc2-zbfy
summary kernel: uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1016.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1016.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1016
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02384
published_at 2026-04-01T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02543
published_at 2026-04-24T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.0249
published_at 2026-04-09T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02461
published_at 2026-04-13T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02445
published_at 2026-04-16T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02451
published_at 2026-04-18T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02556
published_at 2026-04-21T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02454
published_at 2026-04-02T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02466
published_at 2026-04-04T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02467
published_at 2026-04-07T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.0247
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1016
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
42
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
43
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2066614
reference_id 2066614
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2066614
44
reference_url https://security.archlinux.org/AVG-2698
reference_id AVG-2698
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2698
45
reference_url https://security.archlinux.org/AVG-2699
reference_id AVG-2699
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2699
46
reference_url https://security.archlinux.org/AVG-2700
reference_id AVG-2700
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2700
47
reference_url https://security.archlinux.org/AVG-2701
reference_id AVG-2701
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2701
48
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
49
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
50
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
51
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
52
reference_url https://access.redhat.com/errata/RHSA-2023:4137
reference_id RHSA-2023:4137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4137
53
reference_url https://access.redhat.com/errata/RHSA-2023:4138
reference_id RHSA-2023:4138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4138
54
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
55
reference_url https://usn.ubuntu.com/5381-1/
reference_id USN-5381-1
reference_type
scores
url https://usn.ubuntu.com/5381-1/
56
reference_url https://usn.ubuntu.com/5383-1/
reference_id USN-5383-1
reference_type
scores
url https://usn.ubuntu.com/5383-1/
57
reference_url https://usn.ubuntu.com/5390-1/
reference_id USN-5390-1
reference_type
scores
url https://usn.ubuntu.com/5390-1/
58
reference_url https://usn.ubuntu.com/5390-2/
reference_id USN-5390-2
reference_type
scores
url https://usn.ubuntu.com/5390-2/
59
reference_url https://usn.ubuntu.com/5415-1/
reference_id USN-5415-1
reference_type
scores
url https://usn.ubuntu.com/5415-1/
60
reference_url https://usn.ubuntu.com/5466-1/
reference_id USN-5466-1
reference_type
scores
url https://usn.ubuntu.com/5466-1/
61
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
62
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
63
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
fixed_packages
aliases CVE-2022-1016
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5pt2-wwc2-zbfy
19
url VCID-5rym-k4vn-nye8
vulnerability_id VCID-5rym-k4vn-nye8
summary kernel: NULL pointer dereference in x86_emulate_insn may lead to DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1852.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1852.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1852
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04431
published_at 2026-04-01T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04469
published_at 2026-04-02T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04494
published_at 2026-04-04T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04507
published_at 2026-04-07T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04543
published_at 2026-04-08T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04558
published_at 2026-04-09T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04546
published_at 2026-04-11T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04531
published_at 2026-04-12T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04516
published_at 2026-04-13T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.04488
published_at 2026-04-16T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04497
published_at 2026-04-18T12:55:00Z
11
value 0.00018
scoring_system epss
scoring_elements 0.04633
published_at 2026-04-21T12:55:00Z
12
value 0.00018
scoring_system epss
scoring_elements 0.04675
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1852
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2089815
reference_id 2089815
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2089815
17
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
18
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
19
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
20
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
21
reference_url https://access.redhat.com/errata/RHSA-2024:1877
reference_id RHSA-2024:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1877
22
reference_url https://usn.ubuntu.com/5529-1/
reference_id USN-5529-1
reference_type
scores
url https://usn.ubuntu.com/5529-1/
23
reference_url https://usn.ubuntu.com/5594-1/
reference_id USN-5594-1
reference_type
scores
url https://usn.ubuntu.com/5594-1/
24
reference_url https://usn.ubuntu.com/5599-1/
reference_id USN-5599-1
reference_type
scores
url https://usn.ubuntu.com/5599-1/
25
reference_url https://usn.ubuntu.com/5602-1/
reference_id USN-5602-1
reference_type
scores
url https://usn.ubuntu.com/5602-1/
26
reference_url https://usn.ubuntu.com/5616-1/
reference_id USN-5616-1
reference_type
scores
url https://usn.ubuntu.com/5616-1/
27
reference_url https://usn.ubuntu.com/5623-1/
reference_id USN-5623-1
reference_type
scores
url https://usn.ubuntu.com/5623-1/
fixed_packages
aliases CVE-2022-1852
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5rym-k4vn-nye8
20
url VCID-5zzw-du1s-gyf2
vulnerability_id VCID-5zzw-du1s-gyf2
summary hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26373.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26373.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-26373
reference_id
reference_type
scores
0
value 0.00106
scoring_system epss
scoring_elements 0.28903
published_at 2026-04-02T12:55:00Z
1
value 0.00106
scoring_system epss
scoring_elements 0.28611
published_at 2026-04-24T12:55:00Z
2
value 0.00106
scoring_system epss
scoring_elements 0.28759
published_at 2026-04-07T12:55:00Z
3
value 0.00106
scoring_system epss
scoring_elements 0.28826
published_at 2026-04-08T12:55:00Z
4
value 0.00106
scoring_system epss
scoring_elements 0.28867
published_at 2026-04-09T12:55:00Z
5
value 0.00106
scoring_system epss
scoring_elements 0.28872
published_at 2026-04-11T12:55:00Z
6
value 0.00106
scoring_system epss
scoring_elements 0.28827
published_at 2026-04-12T12:55:00Z
7
value 0.00106
scoring_system epss
scoring_elements 0.28778
published_at 2026-04-13T12:55:00Z
8
value 0.00106
scoring_system epss
scoring_elements 0.28797
published_at 2026-04-16T12:55:00Z
9
value 0.00106
scoring_system epss
scoring_elements 0.28774
published_at 2026-04-18T12:55:00Z
10
value 0.00106
scoring_system epss
scoring_elements 0.28725
published_at 2026-04-21T12:55:00Z
11
value 0.00106
scoring_system epss
scoring_elements 0.28953
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-26373
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2115065
reference_id 2115065
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2115065
12
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00706.html
reference_id intel-sa-00706.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:22Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00706.html
13
reference_url https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html
reference_id msg00000.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:22Z/
url https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html
14
reference_url https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html
reference_id msg00011.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:22Z/
url https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html
15
reference_url https://security.netapp.com/advisory/ntap-20221007-0005/
reference_id ntap-20221007-0005
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:22Z/
url https://security.netapp.com/advisory/ntap-20221007-0005/
16
reference_url https://access.redhat.com/errata/RHSA-2022:7337
reference_id RHSA-2022:7337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7337
17
reference_url https://access.redhat.com/errata/RHSA-2022:7338
reference_id RHSA-2022:7338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7338
18
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
19
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
20
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
21
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
22
reference_url https://access.redhat.com/errata/RHSA-2022:8973
reference_id RHSA-2022:8973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8973
23
reference_url https://access.redhat.com/errata/RHSA-2022:8974
reference_id RHSA-2022:8974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8974
24
reference_url https://access.redhat.com/errata/RHSA-2023:0440
reference_id RHSA-2023:0440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0440
25
reference_url https://usn.ubuntu.com/5667-1/
reference_id USN-5667-1
reference_type
scores
url https://usn.ubuntu.com/5667-1/
26
reference_url https://usn.ubuntu.com/5668-1/
reference_id USN-5668-1
reference_type
scores
url https://usn.ubuntu.com/5668-1/
27
reference_url https://usn.ubuntu.com/5677-1/
reference_id USN-5677-1
reference_type
scores
url https://usn.ubuntu.com/5677-1/
28
reference_url https://usn.ubuntu.com/5682-1/
reference_id USN-5682-1
reference_type
scores
url https://usn.ubuntu.com/5682-1/
29
reference_url https://usn.ubuntu.com/5683-1/
reference_id USN-5683-1
reference_type
scores
url https://usn.ubuntu.com/5683-1/
30
reference_url https://usn.ubuntu.com/5703-1/
reference_id USN-5703-1
reference_type
scores
url https://usn.ubuntu.com/5703-1/
31
reference_url https://usn.ubuntu.com/5706-1/
reference_id USN-5706-1
reference_type
scores
url https://usn.ubuntu.com/5706-1/
32
reference_url https://usn.ubuntu.com/5854-1/
reference_id USN-5854-1
reference_type
scores
url https://usn.ubuntu.com/5854-1/
33
reference_url https://usn.ubuntu.com/5861-1/
reference_id USN-5861-1
reference_type
scores
url https://usn.ubuntu.com/5861-1/
34
reference_url https://usn.ubuntu.com/5862-1/
reference_id USN-5862-1
reference_type
scores
url https://usn.ubuntu.com/5862-1/
35
reference_url https://usn.ubuntu.com/5865-1/
reference_id USN-5865-1
reference_type
scores
url https://usn.ubuntu.com/5865-1/
36
reference_url https://usn.ubuntu.com/5883-1/
reference_id USN-5883-1
reference_type
scores
url https://usn.ubuntu.com/5883-1/
37
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
38
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
39
reference_url https://usn.ubuntu.com/6007-1/
reference_id USN-6007-1
reference_type
scores
url https://usn.ubuntu.com/6007-1/
40
reference_url https://usn.ubuntu.com/6221-1/
reference_id USN-6221-1
reference_type
scores
url https://usn.ubuntu.com/6221-1/
fixed_packages
aliases CVE-2022-26373
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5zzw-du1s-gyf2
21
url VCID-6a92-c98x-uqfe
vulnerability_id VCID-6a92-c98x-uqfe
summary kernel: scsi: lpfc: Protect memory leak for NPIV ports sending PLOGI_RJT
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49534.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49534.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49534
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09313
published_at 2026-04-04T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09262
published_at 2026-04-02T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.2155
published_at 2026-04-24T12:55:00Z
3
value 0.00085
scoring_system epss
scoring_elements 0.24674
published_at 2026-04-13T12:55:00Z
4
value 0.00085
scoring_system epss
scoring_elements 0.24658
published_at 2026-04-21T12:55:00Z
5
value 0.00085
scoring_system epss
scoring_elements 0.24679
published_at 2026-04-18T12:55:00Z
6
value 0.00085
scoring_system epss
scoring_elements 0.24687
published_at 2026-04-16T12:55:00Z
7
value 0.00085
scoring_system epss
scoring_elements 0.24643
published_at 2026-04-07T12:55:00Z
8
value 0.00085
scoring_system epss
scoring_elements 0.24711
published_at 2026-04-08T12:55:00Z
9
value 0.00085
scoring_system epss
scoring_elements 0.24759
published_at 2026-04-09T12:55:00Z
10
value 0.00085
scoring_system epss
scoring_elements 0.24771
published_at 2026-04-11T12:55:00Z
11
value 0.00085
scoring_system epss
scoring_elements 0.24731
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49534
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49534
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49534
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347930
reference_id 2347930
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347930
5
reference_url https://git.kernel.org/stable/c/672d1cb40551ea9c95efad43ab6d45e4ab4e015f
reference_id 672d1cb40551ea9c95efad43ab6d45e4ab4e015f
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:37:49Z/
url https://git.kernel.org/stable/c/672d1cb40551ea9c95efad43ab6d45e4ab4e015f
6
reference_url https://git.kernel.org/stable/c/c00df0f34a6d5e14da379f96ea67e501ce67b002
reference_id c00df0f34a6d5e14da379f96ea67e501ce67b002
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:37:49Z/
url https://git.kernel.org/stable/c/c00df0f34a6d5e14da379f96ea67e501ce67b002
7
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
8
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49534
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6a92-c98x-uqfe
22
url VCID-6axn-r2sc-euh1
vulnerability_id VCID-6axn-r2sc-euh1
summary kernel: buffer overflow in nft_set_desc_concat_parse()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2078.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2078.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2078
reference_id
reference_type
scores
0
value 0.00494
scoring_system epss
scoring_elements 0.65767
published_at 2026-04-24T12:55:00Z
1
value 0.00494
scoring_system epss
scoring_elements 0.65754
published_at 2026-04-21T12:55:00Z
2
value 0.00494
scoring_system epss
scoring_elements 0.65768
published_at 2026-04-18T12:55:00Z
3
value 0.00494
scoring_system epss
scoring_elements 0.65679
published_at 2026-04-07T12:55:00Z
4
value 0.00494
scoring_system epss
scoring_elements 0.6573
published_at 2026-04-08T12:55:00Z
5
value 0.00494
scoring_system epss
scoring_elements 0.65742
published_at 2026-04-09T12:55:00Z
6
value 0.00494
scoring_system epss
scoring_elements 0.65763
published_at 2026-04-11T12:55:00Z
7
value 0.00494
scoring_system epss
scoring_elements 0.65749
published_at 2026-04-12T12:55:00Z
8
value 0.00494
scoring_system epss
scoring_elements 0.65719
published_at 2026-04-13T12:55:00Z
9
value 0.00507
scoring_system epss
scoring_elements 0.66268
published_at 2026-04-04T12:55:00Z
10
value 0.00507
scoring_system epss
scoring_elements 0.66241
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2078
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2096178
reference_id 2096178
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2096178
16
reference_url https://access.redhat.com/errata/RHSA-2022:6582
reference_id RHSA-2022:6582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6582
17
reference_url https://access.redhat.com/errata/RHSA-2022:6610
reference_id RHSA-2022:6610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6610
18
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
19
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
20
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
21
reference_url https://usn.ubuntu.com/5529-1/
reference_id USN-5529-1
reference_type
scores
url https://usn.ubuntu.com/5529-1/
fixed_packages
aliases CVE-2022-2078
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6axn-r2sc-euh1
23
url VCID-6ca4-5f11-eqfv
vulnerability_id VCID-6ca4-5f11-eqfv
summary kernel: ASoC: SOF: ipc3-topology: Prevent double freeing of ipc_control_data via load_bytes
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50115.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50115.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50115
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06033
published_at 2026-04-02T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06078
published_at 2026-04-04T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.0606
published_at 2026-04-07T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06101
published_at 2026-04-08T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06141
published_at 2026-04-09T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06132
published_at 2026-04-11T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06127
published_at 2026-04-12T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.0612
published_at 2026-04-13T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.18874
published_at 2026-04-24T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.18963
published_at 2026-04-16T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.18976
published_at 2026-04-18T12:55:00Z
11
value 0.00061
scoring_system epss
scoring_elements 0.18981
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50115
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373645
reference_id 2373645
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373645
4
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-50115
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6ca4-5f11-eqfv
24
url VCID-6fxv-3tch-23cq
vulnerability_id VCID-6fxv-3tch-23cq
summary kernel: scsi: lpfc: Fix possible memory leak when failing to issue CMF WQE
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50027.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50027.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50027
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04693
published_at 2026-04-02T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04734
published_at 2026-04-04T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04751
published_at 2026-04-13T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04784
published_at 2026-04-08T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04796
published_at 2026-04-09T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04788
published_at 2026-04-11T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04768
published_at 2026-04-12T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.15157
published_at 2026-04-24T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.15058
published_at 2026-04-16T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.15068
published_at 2026-04-18T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.15119
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50027
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373520
reference_id 2373520
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373520
4
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-50027
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6fxv-3tch-23cq
25
url VCID-6pvh-2n4u-7yaw
vulnerability_id VCID-6pvh-2n4u-7yaw
summary kernel: dm ioctl: prevent potential spectre v1 gadget
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49122.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49122.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49122
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01669
published_at 2026-04-24T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01568
published_at 2026-04-13T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01556
published_at 2026-04-16T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01571
published_at 2026-04-18T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.0166
published_at 2026-04-21T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02166
published_at 2026-04-11T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02167
published_at 2026-04-07T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02168
published_at 2026-04-08T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.02189
published_at 2026-04-09T12:55:00Z
9
value 0.00053
scoring_system epss
scoring_elements 0.16755
published_at 2026-04-02T12:55:00Z
10
value 0.00053
scoring_system epss
scoring_elements 0.16814
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49122
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49122
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49122
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348154
reference_id 2348154
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348154
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
7
reference_url https://access.redhat.com/errata/RHSA-2025:10005
reference_id RHSA-2025:10005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10005
8
reference_url https://access.redhat.com/errata/RHSA-2025:10009
reference_id RHSA-2025:10009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10009
9
reference_url https://access.redhat.com/errata/RHSA-2025:10179
reference_id RHSA-2025:10179
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10179
10
reference_url https://access.redhat.com/errata/RHSA-2025:10829
reference_id RHSA-2025:10829
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10829
11
reference_url https://access.redhat.com/errata/RHSA-2025:10830
reference_id RHSA-2025:10830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10830
fixed_packages
aliases CVE-2022-49122
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6pvh-2n4u-7yaw
26
url VCID-7cfh-fdht-e3ek
vulnerability_id VCID-7cfh-fdht-e3ek
summary kernel: NFSD: Fix READDIR buffer overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47107.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47107.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-47107
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03341
published_at 2026-04-01T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03389
published_at 2026-04-02T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03447
published_at 2026-04-24T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03354
published_at 2026-04-13T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.0333
published_at 2026-04-16T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03343
published_at 2026-04-18T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.0346
published_at 2026-04-21T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03402
published_at 2026-04-04T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03419
published_at 2026-04-07T12:55:00Z
9
value 0.00016
scoring_system epss
scoring_elements 0.03422
published_at 2026-04-08T12:55:00Z
10
value 0.00016
scoring_system epss
scoring_elements 0.03443
published_at 2026-04-09T12:55:00Z
11
value 0.00016
scoring_system epss
scoring_elements 0.03404
published_at 2026-04-11T12:55:00Z
12
value 0.00016
scoring_system epss
scoring_elements 0.03377
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-47107
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2267911
reference_id 2267911
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2267911
4
reference_url https://git.kernel.org/stable/c/53b1119a6e5028b125f431a0116ba73510d82a72
reference_id 53b1119a6e5028b125f431a0116ba73510d82a72
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:23:20Z/
url https://git.kernel.org/stable/c/53b1119a6e5028b125f431a0116ba73510d82a72
5
reference_url https://git.kernel.org/stable/c/9e291a6a28d32545ed2fd959a8165144d1724df1
reference_id 9e291a6a28d32545ed2fd959a8165144d1724df1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:23:20Z/
url https://git.kernel.org/stable/c/9e291a6a28d32545ed2fd959a8165144d1724df1
6
reference_url https://git.kernel.org/stable/c/eabc0aab98e5218ceecd82069b0d6fdfff5ee885
reference_id eabc0aab98e5218ceecd82069b0d6fdfff5ee885
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:23:20Z/
url https://git.kernel.org/stable/c/eabc0aab98e5218ceecd82069b0d6fdfff5ee885
7
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
fixed_packages
aliases CVE-2021-47107
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7cfh-fdht-e3ek
27
url VCID-7nsd-5rzy-c7a2
vulnerability_id VCID-7nsd-5rzy-c7a2
summary kernel: ath11k: free peer for station when disconnect from AP for QCA6390/WCN6855
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49238.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49238.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49238
reference_id
reference_type
scores
0
value 0.00046
scoring_system epss
scoring_elements 0.14496
published_at 2026-04-04T12:55:00Z
1
value 0.00046
scoring_system epss
scoring_elements 0.14429
published_at 2026-04-02T12:55:00Z
2
value 0.00086
scoring_system epss
scoring_elements 0.24783
published_at 2026-04-24T12:55:00Z
3
value 0.00086
scoring_system epss
scoring_elements 0.24911
published_at 2026-04-12T12:55:00Z
4
value 0.00086
scoring_system epss
scoring_elements 0.24856
published_at 2026-04-13T12:55:00Z
5
value 0.00086
scoring_system epss
scoring_elements 0.24868
published_at 2026-04-16T12:55:00Z
6
value 0.00086
scoring_system epss
scoring_elements 0.24861
published_at 2026-04-18T12:55:00Z
7
value 0.00086
scoring_system epss
scoring_elements 0.24839
published_at 2026-04-21T12:55:00Z
8
value 0.00086
scoring_system epss
scoring_elements 0.24821
published_at 2026-04-07T12:55:00Z
9
value 0.00086
scoring_system epss
scoring_elements 0.24889
published_at 2026-04-08T12:55:00Z
10
value 0.00086
scoring_system epss
scoring_elements 0.24935
published_at 2026-04-09T12:55:00Z
11
value 0.00086
scoring_system epss
scoring_elements 0.2495
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49238
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://git.kernel.org/stable/c/212ad7cb7d7592669c067125949e0a8e31ce6a0b
reference_id 212ad7cb7d7592669c067125949e0a8e31ce6a0b
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:59Z/
url https://git.kernel.org/stable/c/212ad7cb7d7592669c067125949e0a8e31ce6a0b
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348142
reference_id 2348142
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348142
5
reference_url https://git.kernel.org/stable/c/400705c50bbf184794c885d1efad7fe9ccf1471a
reference_id 400705c50bbf184794c885d1efad7fe9ccf1471a
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:59Z/
url https://git.kernel.org/stable/c/400705c50bbf184794c885d1efad7fe9ccf1471a
6
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
7
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49238
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7nsd-5rzy-c7a2
28
url VCID-7qyk-a688-n3bx
vulnerability_id VCID-7qyk-a688-n3bx
summary kernel: veth: Ensure eth header is in skb's linear part
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49066.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49066.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49066
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.15339
published_at 2026-04-04T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.1527
published_at 2026-04-02T12:55:00Z
2
value 8e-05
scoring_system epss
scoring_elements 0.00735
published_at 2026-04-24T12:55:00Z
3
value 8e-05
scoring_system epss
scoring_elements 0.00692
published_at 2026-04-18T12:55:00Z
4
value 8e-05
scoring_system epss
scoring_elements 0.00686
published_at 2026-04-16T12:55:00Z
5
value 8e-05
scoring_system epss
scoring_elements 0.00733
published_at 2026-04-21T12:55:00Z
6
value 8e-05
scoring_system epss
scoring_elements 0.0075
published_at 2026-04-11T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.00922
published_at 2026-04-09T12:55:00Z
8
value 9e-05
scoring_system epss
scoring_elements 0.00925
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49066
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49066
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348115
reference_id 2348115
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348115
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49066
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7qyk-a688-n3bx
29
url VCID-834p-5e5a-zud6
vulnerability_id VCID-834p-5e5a-zud6
summary kernel: nvme-rdma: destroy cm id before destroy qp to avoid use after free
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47378.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47378.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-47378
reference_id
reference_type
scores
0
value 0.00087
scoring_system epss
scoring_elements 0.25098
published_at 2026-04-01T12:55:00Z
1
value 0.00087
scoring_system epss
scoring_elements 0.25178
published_at 2026-04-02T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.24931
published_at 2026-04-24T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.25103
published_at 2026-04-09T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.25117
published_at 2026-04-11T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.25077
published_at 2026-04-12T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.25022
published_at 2026-04-13T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.25031
published_at 2026-04-16T12:55:00Z
8
value 0.00087
scoring_system epss
scoring_elements 0.25023
published_at 2026-04-18T12:55:00Z
9
value 0.00087
scoring_system epss
scoring_elements 0.24994
published_at 2026-04-21T12:55:00Z
10
value 0.00087
scoring_system epss
scoring_elements 0.2522
published_at 2026-04-04T12:55:00Z
11
value 0.00087
scoring_system epss
scoring_elements 0.2499
published_at 2026-04-07T12:55:00Z
12
value 0.00087
scoring_system epss
scoring_elements 0.25058
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-47378
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47378
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2282362
reference_id 2282362
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2282362
5
reference_url https://git.kernel.org/stable/c/9817d763dbe15327b9b3ff4404fa6f27f927e744
reference_id 9817d763dbe15327b9b3ff4404fa6f27f927e744
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-16T21:04:16Z/
url https://git.kernel.org/stable/c/9817d763dbe15327b9b3ff4404fa6f27f927e744
6
reference_url https://git.kernel.org/stable/c/d268a182c56e8361e19fb781137411643312b994
reference_id d268a182c56e8361e19fb781137411643312b994
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-16T21:04:16Z/
url https://git.kernel.org/stable/c/d268a182c56e8361e19fb781137411643312b994
7
reference_url https://git.kernel.org/stable/c/ecf0dc5a904830c926a64feffd8e01141f89822f
reference_id ecf0dc5a904830c926a64feffd8e01141f89822f
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-16T21:04:16Z/
url https://git.kernel.org/stable/c/ecf0dc5a904830c926a64feffd8e01141f89822f
8
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
9
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
10
reference_url https://access.redhat.com/errata/RHSA-2024:6297
reference_id RHSA-2024:6297
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6297
fixed_packages
aliases CVE-2021-47378
risk_score 3.9
exploitability 0.5
weighted_severity 7.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-834p-5e5a-zud6
30
url VCID-88ed-7s2j-yfd2
vulnerability_id VCID-88ed-7s2j-yfd2
summary kernel: watchdog: sp5100_tco: Fix a memory leak of EFCH MMIO resource
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50110.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50110.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50110
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.15665
published_at 2026-04-02T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.15772
published_at 2026-04-04T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15576
published_at 2026-04-07T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15662
published_at 2026-04-08T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.1572
published_at 2026-04-09T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15688
published_at 2026-04-11T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15653
published_at 2026-04-12T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15588
published_at 2026-04-13T12:55:00Z
8
value 0.00136
scoring_system epss
scoring_elements 0.33124
published_at 2026-04-24T12:55:00Z
9
value 0.00136
scoring_system epss
scoring_elements 0.33335
published_at 2026-04-16T12:55:00Z
10
value 0.00136
scoring_system epss
scoring_elements 0.33311
published_at 2026-04-18T12:55:00Z
11
value 0.00136
scoring_system epss
scoring_elements 0.33275
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50110
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373606
reference_id 2373606
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373606
4
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
5
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
fixed_packages
aliases CVE-2022-50110
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-88ed-7s2j-yfd2
31
url VCID-8fjq-zape-gkbk
vulnerability_id VCID-8fjq-zape-gkbk
summary kernel: memory leak for large arguments in video_usercopy function in drivers/media/v4l2-core/v4l2-ioctl.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30002.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30002.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30002
reference_id
reference_type
scores
0
value 0.0003
scoring_system epss
scoring_elements 0.08518
published_at 2026-04-07T12:55:00Z
1
value 0.0003
scoring_system epss
scoring_elements 0.08547
published_at 2026-04-02T12:55:00Z
2
value 0.0003
scoring_system epss
scoring_elements 0.086
published_at 2026-04-04T12:55:00Z
3
value 0.0003
scoring_system epss
scoring_elements 0.0859
published_at 2026-04-08T12:55:00Z
4
value 0.0003
scoring_system epss
scoring_elements 0.08614
published_at 2026-04-09T12:55:00Z
5
value 0.0003
scoring_system epss
scoring_elements 0.08611
published_at 2026-04-11T12:55:00Z
6
value 0.0003
scoring_system epss
scoring_elements 0.08589
published_at 2026-04-12T12:55:00Z
7
value 0.0003
scoring_system epss
scoring_elements 0.08577
published_at 2026-04-13T12:55:00Z
8
value 0.0003
scoring_system epss
scoring_elements 0.08466
published_at 2026-04-16T12:55:00Z
9
value 0.0003
scoring_system epss
scoring_elements 0.08453
published_at 2026-04-18T12:55:00Z
10
value 0.0003
scoring_system epss
scoring_elements 0.08603
published_at 2026-04-21T12:55:00Z
11
value 0.0003
scoring_system epss
scoring_elements 0.08615
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30002
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30002
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1946279
reference_id 1946279
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1946279
5
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
6
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
7
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
8
reference_url https://usn.ubuntu.com/4945-1/
reference_id USN-4945-1
reference_type
scores
url https://usn.ubuntu.com/4945-1/
9
reference_url https://usn.ubuntu.com/4945-2/
reference_id USN-4945-2
reference_type
scores
url https://usn.ubuntu.com/4945-2/
10
reference_url https://usn.ubuntu.com/4946-1/
reference_id USN-4946-1
reference_type
scores
url https://usn.ubuntu.com/4946-1/
11
reference_url https://usn.ubuntu.com/4947-1/
reference_id USN-4947-1
reference_type
scores
url https://usn.ubuntu.com/4947-1/
12
reference_url https://usn.ubuntu.com/4984-1/
reference_id USN-4984-1
reference_type
scores
url https://usn.ubuntu.com/4984-1/
fixed_packages
aliases CVE-2021-30002
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8fjq-zape-gkbk
32
url VCID-8gr5-zvxj-mbb3
vulnerability_id VCID-8gr5-zvxj-mbb3
summary kernel: ALSA: pcm: Fix races among concurrent prealloc proc writes
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49288.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49288.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49288
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08241
published_at 2026-04-04T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08186
published_at 2026-04-02T12:55:00Z
2
value 0.00055
scoring_system epss
scoring_elements 0.17103
published_at 2026-04-24T12:55:00Z
3
value 0.00055
scoring_system epss
scoring_elements 0.17163
published_at 2026-04-07T12:55:00Z
4
value 0.00055
scoring_system epss
scoring_elements 0.17254
published_at 2026-04-08T12:55:00Z
5
value 0.00055
scoring_system epss
scoring_elements 0.17312
published_at 2026-04-09T12:55:00Z
6
value 0.00055
scoring_system epss
scoring_elements 0.17326
published_at 2026-04-11T12:55:00Z
7
value 0.00055
scoring_system epss
scoring_elements 0.17277
published_at 2026-04-12T12:55:00Z
8
value 0.00055
scoring_system epss
scoring_elements 0.17218
published_at 2026-04-13T12:55:00Z
9
value 0.00055
scoring_system epss
scoring_elements 0.17157
published_at 2026-04-16T12:55:00Z
10
value 0.00055
scoring_system epss
scoring_elements 0.17162
published_at 2026-04-18T12:55:00Z
11
value 0.00055
scoring_system epss
scoring_elements 0.17198
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49288
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49288
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49288
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347877
reference_id 2347877
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347877
5
reference_url https://git.kernel.org/stable/c/37b12c16beb6f6c1c3c678c1aacbc46525c250f7
reference_id 37b12c16beb6f6c1c3c678c1aacbc46525c250f7
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:58:50Z/
url https://git.kernel.org/stable/c/37b12c16beb6f6c1c3c678c1aacbc46525c250f7
6
reference_url https://git.kernel.org/stable/c/51fce708ab8986a9879ee5da946a2cc120f1036d
reference_id 51fce708ab8986a9879ee5da946a2cc120f1036d
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:58:50Z/
url https://git.kernel.org/stable/c/51fce708ab8986a9879ee5da946a2cc120f1036d
7
reference_url https://git.kernel.org/stable/c/5ed8f8e3c4e59d0396b9ccf2e639711e24295bb6
reference_id 5ed8f8e3c4e59d0396b9ccf2e639711e24295bb6
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:58:50Z/
url https://git.kernel.org/stable/c/5ed8f8e3c4e59d0396b9ccf2e639711e24295bb6
8
reference_url https://git.kernel.org/stable/c/69534c48ba8ce552ce383b3dfdb271ffe51820c3
reference_id 69534c48ba8ce552ce383b3dfdb271ffe51820c3
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:58:50Z/
url https://git.kernel.org/stable/c/69534c48ba8ce552ce383b3dfdb271ffe51820c3
9
reference_url https://git.kernel.org/stable/c/a21d2f323b5a978dedf9ff1d50f101f85e39b3f2
reference_id a21d2f323b5a978dedf9ff1d50f101f85e39b3f2
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:58:50Z/
url https://git.kernel.org/stable/c/a21d2f323b5a978dedf9ff1d50f101f85e39b3f2
10
reference_url https://git.kernel.org/stable/c/b560d670c87d7d40b3cf6949246fa4c7aa65a00a
reference_id b560d670c87d7d40b3cf6949246fa4c7aa65a00a
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:58:50Z/
url https://git.kernel.org/stable/c/b560d670c87d7d40b3cf6949246fa4c7aa65a00a
11
reference_url https://git.kernel.org/stable/c/e14dca613e0a6ddc2bf6e360f16936a9f865205b
reference_id e14dca613e0a6ddc2bf6e360f16936a9f865205b
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:58:50Z/
url https://git.kernel.org/stable/c/e14dca613e0a6ddc2bf6e360f16936a9f865205b
12
reference_url https://git.kernel.org/stable/c/e7786c445bb67a9a6e64f66ebd6b7215b153ff7d
reference_id e7786c445bb67a9a6e64f66ebd6b7215b153ff7d
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:58:50Z/
url https://git.kernel.org/stable/c/e7786c445bb67a9a6e64f66ebd6b7215b153ff7d
13
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
14
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49288
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8gr5-zvxj-mbb3
33
url VCID-8m61-w5gs-gua7
vulnerability_id VCID-8m61-w5gs-gua7
summary kernel: mt76: mt7921: fix crash when startup fails.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49129.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49129.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49129
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11313
published_at 2026-04-02T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11373
published_at 2026-04-04T12:55:00Z
2
value 0.00074
scoring_system epss
scoring_elements 0.22065
published_at 2026-04-24T12:55:00Z
3
value 0.00074
scoring_system epss
scoring_elements 0.22207
published_at 2026-04-07T12:55:00Z
4
value 0.00074
scoring_system epss
scoring_elements 0.2229
published_at 2026-04-08T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.22344
published_at 2026-04-09T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22365
published_at 2026-04-11T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.22323
published_at 2026-04-12T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22264
published_at 2026-04-13T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.22269
published_at 2026-04-16T12:55:00Z
10
value 0.00074
scoring_system epss
scoring_elements 0.22263
published_at 2026-04-18T12:55:00Z
11
value 0.00074
scoring_system epss
scoring_elements 0.22215
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49129
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347839
reference_id 2347839
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347839
4
reference_url https://git.kernel.org/stable/c/38fbe806645090c07aa97171f20fc62c3d7d3a98
reference_id 38fbe806645090c07aa97171f20fc62c3d7d3a98
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:17:14Z/
url https://git.kernel.org/stable/c/38fbe806645090c07aa97171f20fc62c3d7d3a98
5
reference_url https://git.kernel.org/stable/c/827e7799c61b978fbc2cc9dac66cb62401b2b3f0
reference_id 827e7799c61b978fbc2cc9dac66cb62401b2b3f0
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:17:14Z/
url https://git.kernel.org/stable/c/827e7799c61b978fbc2cc9dac66cb62401b2b3f0
6
reference_url https://git.kernel.org/stable/c/ac1260b661c2ef0d0a56680cdb5672b931b7be8f
reference_id ac1260b661c2ef0d0a56680cdb5672b931b7be8f
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:17:14Z/
url https://git.kernel.org/stable/c/ac1260b661c2ef0d0a56680cdb5672b931b7be8f
7
reference_url https://git.kernel.org/stable/c/c1a5e6002ec441a3b9fb4d048b4b49ae93409a46
reference_id c1a5e6002ec441a3b9fb4d048b4b49ae93409a46
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:17:14Z/
url https://git.kernel.org/stable/c/c1a5e6002ec441a3b9fb4d048b4b49ae93409a46
8
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
9
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49129
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8m61-w5gs-gua7
34
url VCID-8rss-adyd-tqbd
vulnerability_id VCID-8rss-adyd-tqbd
summary kernel: rcutorture: Fix ksoftirqd boosting timing and iteration
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50177.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50177.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50177
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06468
published_at 2026-04-02T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.0652
published_at 2026-04-04T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.0651
published_at 2026-04-07T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.0656
published_at 2026-04-08T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06602
published_at 2026-04-09T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06596
published_at 2026-04-11T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06588
published_at 2026-04-12T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06579
published_at 2026-04-13T12:55:00Z
8
value 0.00065
scoring_system epss
scoring_elements 0.19968
published_at 2026-04-24T12:55:00Z
9
value 0.00065
scoring_system epss
scoring_elements 0.20082
published_at 2026-04-16T12:55:00Z
10
value 0.00065
scoring_system epss
scoring_elements 0.20086
published_at 2026-04-18T12:55:00Z
11
value 0.00065
scoring_system epss
scoring_elements 0.20084
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50177
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373568
reference_id 2373568
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373568
4
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
5
reference_url https://access.redhat.com/errata/RHSA-2024:9315
reference_id RHSA-2024:9315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9315
fixed_packages
aliases CVE-2022-50177
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8rss-adyd-tqbd
35
url VCID-8tv2-9rnq-dqf7
vulnerability_id VCID-8tv2-9rnq-dqf7
summary kernel: inet: fully convert sk->sk_rx_dst to RCU rules
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47103.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47103.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-47103
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09354
published_at 2026-04-07T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09489
published_at 2026-04-11T12:55:00Z
2
value 0.00033
scoring_system epss
scoring_elements 0.09476
published_at 2026-04-09T12:55:00Z
3
value 0.00033
scoring_system epss
scoring_elements 0.09428
published_at 2026-04-08T12:55:00Z
4
value 0.00033
scoring_system epss
scoring_elements 0.09338
published_at 2026-04-18T12:55:00Z
5
value 0.00033
scoring_system epss
scoring_elements 0.09445
published_at 2026-04-13T12:55:00Z
6
value 0.00033
scoring_system epss
scoring_elements 0.09462
published_at 2026-04-12T12:55:00Z
7
value 0.00035
scoring_system epss
scoring_elements 0.09991
published_at 2026-04-01T12:55:00Z
8
value 0.00035
scoring_system epss
scoring_elements 0.10113
published_at 2026-04-02T12:55:00Z
9
value 0.00035
scoring_system epss
scoring_elements 0.10177
published_at 2026-04-04T12:55:00Z
10
value 0.00037
scoring_system epss
scoring_elements 0.10994
published_at 2026-04-24T12:55:00Z
11
value 0.00037
scoring_system epss
scoring_elements 0.11034
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-47103
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47103
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47103
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
reference_id 0249a4b8a554f2eb6a27b62516fa50168584faa4
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:23:27Z/
url https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2267914
reference_id 2267914
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2267914
6
reference_url https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
reference_id 68c34ce11ef23328692aa35fa6aaafdd75913100
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:23:27Z/
url https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
7
reference_url https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
reference_id 75a578000ae5e511e5d0e8433c94a14d9c99c412
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:23:27Z/
url https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
8
reference_url https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
reference_id 8f905c0e7354ef261360fb7535ea079b1082c105
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:23:27Z/
url https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
9
reference_url https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
reference_id 92e6e36ecd16808866ac6172b9491b5097cde449
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:23:27Z/
url https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
10
reference_url https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
reference_id c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:23:27Z/
url https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
11
reference_url https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
reference_id f039b43cbaea5e0700980c2f0052da05a70782e0
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:23:27Z/
url https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
12
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
13
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
14
reference_url https://usn.ubuntu.com/7332-1/
reference_id USN-7332-1
reference_type
scores
url https://usn.ubuntu.com/7332-1/
15
reference_url https://usn.ubuntu.com/7332-2/
reference_id USN-7332-2
reference_type
scores
url https://usn.ubuntu.com/7332-2/
16
reference_url https://usn.ubuntu.com/7332-3/
reference_id USN-7332-3
reference_type
scores
url https://usn.ubuntu.com/7332-3/
fixed_packages
aliases CVE-2021-47103
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8tv2-9rnq-dqf7
36
url VCID-9133-4vru-fucq
vulnerability_id VCID-9133-4vru-fucq
summary kernel: possible to use the debugger to write zero into a location of choice
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21499.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21499.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21499
reference_id
reference_type
scores
0
value 0.00178
scoring_system epss
scoring_elements 0.39053
published_at 2026-04-24T12:55:00Z
1
value 0.00178
scoring_system epss
scoring_elements 0.39305
published_at 2026-04-07T12:55:00Z
2
value 0.00178
scoring_system epss
scoring_elements 0.3936
published_at 2026-04-08T12:55:00Z
3
value 0.00178
scoring_system epss
scoring_elements 0.39378
published_at 2026-04-09T12:55:00Z
4
value 0.00178
scoring_system epss
scoring_elements 0.39389
published_at 2026-04-11T12:55:00Z
5
value 0.00178
scoring_system epss
scoring_elements 0.3935
published_at 2026-04-12T12:55:00Z
6
value 0.00178
scoring_system epss
scoring_elements 0.39331
published_at 2026-04-13T12:55:00Z
7
value 0.00178
scoring_system epss
scoring_elements 0.39384
published_at 2026-04-16T12:55:00Z
8
value 0.00178
scoring_system epss
scoring_elements 0.39355
published_at 2026-04-18T12:55:00Z
9
value 0.00178
scoring_system epss
scoring_elements 0.39268
published_at 2026-04-21T12:55:00Z
10
value 0.00178
scoring_system epss
scoring_elements 0.39367
published_at 2026-04-02T12:55:00Z
11
value 0.00178
scoring_system epss
scoring_elements 0.39391
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21499
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2084183
reference_id 2084183
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2084183
17
reference_url https://security.archlinux.org/AVG-2740
reference_id AVG-2740
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2740
18
reference_url https://security.archlinux.org/AVG-2741
reference_id AVG-2741
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2741
19
reference_url https://security.archlinux.org/AVG-2742
reference_id AVG-2742
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2742
20
reference_url https://security.archlinux.org/AVG-2743
reference_id AVG-2743
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2743
21
reference_url https://www.debian.org/security/2022/dsa-5161
reference_id dsa-5161
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-24T13:49:06Z/
url https://www.debian.org/security/2022/dsa-5161
22
reference_url https://git.kernel.org/linus/eadb2f47a3ced5c64b23b90fd2a3463f63726066
reference_id eadb2f47a3ced5c64b23b90fd2a3463f63726066
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-24T13:49:06Z/
url https://git.kernel.org/linus/eadb2f47a3ced5c64b23b90fd2a3463f63726066
23
reference_url http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html
reference_id Kernel-Live-Patch-Security-Notice-LSN-0089-1.html
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-24T13:49:06Z/
url http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html
24
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
25
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
26
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
27
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
28
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
29
reference_url https://usn.ubuntu.com/5465-1/
reference_id USN-5465-1
reference_type
scores
url https://usn.ubuntu.com/5465-1/
30
reference_url https://usn.ubuntu.com/5466-1/
reference_id USN-5466-1
reference_type
scores
url https://usn.ubuntu.com/5466-1/
31
reference_url https://usn.ubuntu.com/5467-1/
reference_id USN-5467-1
reference_type
scores
url https://usn.ubuntu.com/5467-1/
32
reference_url https://usn.ubuntu.com/5468-1/
reference_id USN-5468-1
reference_type
scores
url https://usn.ubuntu.com/5468-1/
33
reference_url https://usn.ubuntu.com/5469-1/
reference_id USN-5469-1
reference_type
scores
url https://usn.ubuntu.com/5469-1/
34
reference_url https://usn.ubuntu.com/5470-1/
reference_id USN-5470-1
reference_type
scores
url https://usn.ubuntu.com/5470-1/
35
reference_url https://usn.ubuntu.com/5471-1/
reference_id USN-5471-1
reference_type
scores
url https://usn.ubuntu.com/5471-1/
36
reference_url https://usn.ubuntu.com/5484-1/
reference_id USN-5484-1
reference_type
scores
url https://usn.ubuntu.com/5484-1/
fixed_packages
aliases CVE-2022-21499
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9133-4vru-fucq
37
url VCID-97ym-aqgz-ybbq
vulnerability_id VCID-97ym-aqgz-ybbq
summary kernel: dm mirror log: round up region bitmap size to BITS_PER_LONG
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49710.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49710.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49710
reference_id
reference_type
scores
0
value 0.00052
scoring_system epss
scoring_elements 0.16383
published_at 2026-04-02T12:55:00Z
1
value 0.00052
scoring_system epss
scoring_elements 0.16446
published_at 2026-04-04T12:55:00Z
2
value 0.00104
scoring_system epss
scoring_elements 0.2842
published_at 2026-04-09T12:55:00Z
3
value 0.00104
scoring_system epss
scoring_elements 0.28424
published_at 2026-04-11T12:55:00Z
4
value 0.00104
scoring_system epss
scoring_elements 0.2838
published_at 2026-04-12T12:55:00Z
5
value 0.00104
scoring_system epss
scoring_elements 0.28322
published_at 2026-04-13T12:55:00Z
6
value 0.00104
scoring_system epss
scoring_elements 0.28334
published_at 2026-04-16T12:55:00Z
7
value 0.00104
scoring_system epss
scoring_elements 0.28313
published_at 2026-04-18T12:55:00Z
8
value 0.00104
scoring_system epss
scoring_elements 0.28267
published_at 2026-04-21T12:55:00Z
9
value 0.00104
scoring_system epss
scoring_elements 0.28172
published_at 2026-04-24T12:55:00Z
10
value 0.00104
scoring_system epss
scoring_elements 0.28311
published_at 2026-04-07T12:55:00Z
11
value 0.00104
scoring_system epss
scoring_elements 0.28377
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49710
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49710
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347643
reference_id 2347643
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347643
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49710
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-97ym-aqgz-ybbq
38
url VCID-9gux-pynq-nyhz
vulnerability_id VCID-9gux-pynq-nyhz
summary kernel: ext4: fix use-after-free in ext4_rename_dir_prepare
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49349.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49349.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49349
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.0774
published_at 2026-04-04T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07696
published_at 2026-04-02T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.162
published_at 2026-04-24T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.16291
published_at 2026-04-07T12:55:00Z
4
value 0.00052
scoring_system epss
scoring_elements 0.16376
published_at 2026-04-08T12:55:00Z
5
value 0.00052
scoring_system epss
scoring_elements 0.16435
published_at 2026-04-09T12:55:00Z
6
value 0.00052
scoring_system epss
scoring_elements 0.16418
published_at 2026-04-11T12:55:00Z
7
value 0.00052
scoring_system epss
scoring_elements 0.16379
published_at 2026-04-12T12:55:00Z
8
value 0.00052
scoring_system epss
scoring_elements 0.16316
published_at 2026-04-13T12:55:00Z
9
value 0.00052
scoring_system epss
scoring_elements 0.16254
published_at 2026-04-16T12:55:00Z
10
value 0.00052
scoring_system epss
scoring_elements 0.16275
published_at 2026-04-18T12:55:00Z
11
value 0.00052
scoring_system epss
scoring_elements 0.1631
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49349
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49349
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49349
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/0be698ecbe4471fcad80e81ec6a05001421041b3
reference_id 0be698ecbe4471fcad80e81ec6a05001421041b3
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:42Z/
url https://git.kernel.org/stable/c/0be698ecbe4471fcad80e81ec6a05001421041b3
5
reference_url https://git.kernel.org/stable/c/0ff38b99fa075ddd246487a28cb9af049f4ceef1
reference_id 0ff38b99fa075ddd246487a28cb9af049f4ceef1
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:42Z/
url https://git.kernel.org/stable/c/0ff38b99fa075ddd246487a28cb9af049f4ceef1
6
reference_url https://git.kernel.org/stable/c/10801095224de0d0ab06ae60698680c1f883a3ae
reference_id 10801095224de0d0ab06ae60698680c1f883a3ae
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:42Z/
url https://git.kernel.org/stable/c/10801095224de0d0ab06ae60698680c1f883a3ae
7
reference_url https://git.kernel.org/stable/c/1a3a15bf6f9963d755270cbdb282863b84839195
reference_id 1a3a15bf6f9963d755270cbdb282863b84839195
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:42Z/
url https://git.kernel.org/stable/c/1a3a15bf6f9963d755270cbdb282863b84839195
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348203
reference_id 2348203
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348203
9
reference_url https://git.kernel.org/stable/c/364380c00912bed9b5d99eb485018360b0ecf64f
reference_id 364380c00912bed9b5d99eb485018360b0ecf64f
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:42Z/
url https://git.kernel.org/stable/c/364380c00912bed9b5d99eb485018360b0ecf64f
10
reference_url https://git.kernel.org/stable/c/4a2bea60cf7ff957b3eda0b17750d483876a02fa
reference_id 4a2bea60cf7ff957b3eda0b17750d483876a02fa
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:42Z/
url https://git.kernel.org/stable/c/4a2bea60cf7ff957b3eda0b17750d483876a02fa
11
reference_url https://git.kernel.org/stable/c/97f802a652a749422dede32071d29a53cf4bd034
reference_id 97f802a652a749422dede32071d29a53cf4bd034
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:42Z/
url https://git.kernel.org/stable/c/97f802a652a749422dede32071d29a53cf4bd034
12
reference_url https://git.kernel.org/stable/c/dd887f83ea54aea5b780a84527e23ab95f777fed
reference_id dd887f83ea54aea5b780a84527e23ab95f777fed
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:42Z/
url https://git.kernel.org/stable/c/dd887f83ea54aea5b780a84527e23ab95f777fed
13
reference_url https://git.kernel.org/stable/c/eaecf7ebfd5dd09038a80b14be46b844f54cfc5c
reference_id eaecf7ebfd5dd09038a80b14be46b844f54cfc5c
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:42Z/
url https://git.kernel.org/stable/c/eaecf7ebfd5dd09038a80b14be46b844f54cfc5c
14
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
15
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49349
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9gux-pynq-nyhz
39
url VCID-9nut-ha7g-dbbc
vulnerability_id VCID-9nut-ha7g-dbbc
summary kernel: scsi: qla2xxx: Fix scheduling while atomic
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49156.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49156.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49156
reference_id
reference_type
scores
0
value 0.00052
scoring_system epss
scoring_elements 0.16383
published_at 2026-04-02T12:55:00Z
1
value 0.00052
scoring_system epss
scoring_elements 0.16446
published_at 2026-04-04T12:55:00Z
2
value 0.00104
scoring_system epss
scoring_elements 0.2842
published_at 2026-04-09T12:55:00Z
3
value 0.00104
scoring_system epss
scoring_elements 0.28424
published_at 2026-04-11T12:55:00Z
4
value 0.00104
scoring_system epss
scoring_elements 0.2838
published_at 2026-04-12T12:55:00Z
5
value 0.00104
scoring_system epss
scoring_elements 0.28322
published_at 2026-04-13T12:55:00Z
6
value 0.00104
scoring_system epss
scoring_elements 0.28334
published_at 2026-04-16T12:55:00Z
7
value 0.00104
scoring_system epss
scoring_elements 0.28313
published_at 2026-04-18T12:55:00Z
8
value 0.00104
scoring_system epss
scoring_elements 0.28267
published_at 2026-04-21T12:55:00Z
9
value 0.00104
scoring_system epss
scoring_elements 0.28172
published_at 2026-04-24T12:55:00Z
10
value 0.00104
scoring_system epss
scoring_elements 0.28311
published_at 2026-04-07T12:55:00Z
11
value 0.00104
scoring_system epss
scoring_elements 0.28377
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49156
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49156
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347783
reference_id 2347783
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347783
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49156
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9nut-ha7g-dbbc
40
url VCID-9ujy-9ynv-nkar
vulnerability_id VCID-9ujy-9ynv-nkar
summary kernel: netfilter: conntrack: re-fetch conntrack after insertion
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49561.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49561.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49561
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10422
published_at 2026-04-02T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.1049
published_at 2026-04-04T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.16498
published_at 2026-04-09T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.16483
published_at 2026-04-11T12:55:00Z
4
value 0.00052
scoring_system epss
scoring_elements 0.16444
published_at 2026-04-12T12:55:00Z
5
value 0.00052
scoring_system epss
scoring_elements 0.16383
published_at 2026-04-13T12:55:00Z
6
value 0.00052
scoring_system epss
scoring_elements 0.16323
published_at 2026-04-16T12:55:00Z
7
value 0.00052
scoring_system epss
scoring_elements 0.16344
published_at 2026-04-18T12:55:00Z
8
value 0.00052
scoring_system epss
scoring_elements 0.16379
published_at 2026-04-21T12:55:00Z
9
value 0.00052
scoring_system epss
scoring_elements 0.16273
published_at 2026-04-24T12:55:00Z
10
value 0.00052
scoring_system epss
scoring_elements 0.16352
published_at 2026-04-07T12:55:00Z
11
value 0.00052
scoring_system epss
scoring_elements 0.16439
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49561
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49561
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348159
reference_id 2348159
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348159
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49561
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9ujy-9ynv-nkar
41
url VCID-9x6z-na1u-93bs
vulnerability_id VCID-9x6z-na1u-93bs
summary kernel: ice: arfs: fix use-after-free when freeing @rx_cpu_rmap
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49063.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49063.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49063
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.0425
published_at 2026-04-24T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04238
published_at 2026-04-21T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.05069
published_at 2026-04-16T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.05136
published_at 2026-04-12T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.05153
published_at 2026-04-11T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.05074
published_at 2026-04-18T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.05122
published_at 2026-04-13T12:55:00Z
7
value 0.00039
scoring_system epss
scoring_elements 0.1186
published_at 2026-04-02T12:55:00Z
8
value 0.00039
scoring_system epss
scoring_elements 0.11904
published_at 2026-04-04T12:55:00Z
9
value 0.00081
scoring_system epss
scoring_elements 0.23811
published_at 2026-04-07T12:55:00Z
10
value 0.00081
scoring_system epss
scoring_elements 0.23878
published_at 2026-04-08T12:55:00Z
11
value 0.00081
scoring_system epss
scoring_elements 0.23924
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49063
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49063
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348323
reference_id 2348323
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348323
5
reference_url https://git.kernel.org/stable/c/618df75f2e30c7838a3e010ca32cd4893ec9fe33
reference_id 618df75f2e30c7838a3e010ca32cd4893ec9fe33
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:17:43Z/
url https://git.kernel.org/stable/c/618df75f2e30c7838a3e010ca32cd4893ec9fe33
6
reference_url https://git.kernel.org/stable/c/ba2f6ec28733fb6b24ed086e676df3df4c138f3f
reference_id ba2f6ec28733fb6b24ed086e676df3df4c138f3f
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:17:43Z/
url https://git.kernel.org/stable/c/ba2f6ec28733fb6b24ed086e676df3df4c138f3f
7
reference_url https://git.kernel.org/stable/c/d08d2fb6d99d82da1c63aba5c0d1c6f237e150f3
reference_id d08d2fb6d99d82da1c63aba5c0d1c6f237e150f3
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:17:43Z/
url https://git.kernel.org/stable/c/d08d2fb6d99d82da1c63aba5c0d1c6f237e150f3
8
reference_url https://git.kernel.org/stable/c/d7442f512b71fc63a99c8a801422dde4fbbf9f93
reference_id d7442f512b71fc63a99c8a801422dde4fbbf9f93
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:17:43Z/
url https://git.kernel.org/stable/c/d7442f512b71fc63a99c8a801422dde4fbbf9f93
9
reference_url https://access.redhat.com/errata/RHSA-2022:6610
reference_id RHSA-2022:6610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6610
10
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
11
reference_url https://usn.ubuntu.com/7654-1/
reference_id USN-7654-1
reference_type
scores
url https://usn.ubuntu.com/7654-1/
12
reference_url https://usn.ubuntu.com/7654-2/
reference_id USN-7654-2
reference_type
scores
url https://usn.ubuntu.com/7654-2/
13
reference_url https://usn.ubuntu.com/7654-3/
reference_id USN-7654-3
reference_type
scores
url https://usn.ubuntu.com/7654-3/
14
reference_url https://usn.ubuntu.com/7654-4/
reference_id USN-7654-4
reference_type
scores
url https://usn.ubuntu.com/7654-4/
15
reference_url https://usn.ubuntu.com/7654-5/
reference_id USN-7654-5
reference_type
scores
url https://usn.ubuntu.com/7654-5/
16
reference_url https://usn.ubuntu.com/7655-1/
reference_id USN-7655-1
reference_type
scores
url https://usn.ubuntu.com/7655-1/
17
reference_url https://usn.ubuntu.com/7686-1/
reference_id USN-7686-1
reference_type
scores
url https://usn.ubuntu.com/7686-1/
18
reference_url https://usn.ubuntu.com/7711-1/
reference_id USN-7711-1
reference_type
scores
url https://usn.ubuntu.com/7711-1/
19
reference_url https://usn.ubuntu.com/7712-1/
reference_id USN-7712-1
reference_type
scores
url https://usn.ubuntu.com/7712-1/
20
reference_url https://usn.ubuntu.com/7712-2/
reference_id USN-7712-2
reference_type
scores
url https://usn.ubuntu.com/7712-2/
fixed_packages
aliases CVE-2022-49063
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9x6z-na1u-93bs
42
url VCID-abus-pmpv-ayca
vulnerability_id VCID-abus-pmpv-ayca
summary kernel: iwlwifi: mvm: check debugfs_dir ptr before use
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48918.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48918.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-48918
reference_id
reference_type
scores
0
value 0.00028
scoring_system epss
scoring_elements 0.07861
published_at 2026-04-02T12:55:00Z
1
value 0.00028
scoring_system epss
scoring_elements 0.0791
published_at 2026-04-24T12:55:00Z
2
value 0.00028
scoring_system epss
scoring_elements 0.07899
published_at 2026-04-13T12:55:00Z
3
value 0.00028
scoring_system epss
scoring_elements 0.07814
published_at 2026-04-16T12:55:00Z
4
value 0.00028
scoring_system epss
scoring_elements 0.07797
published_at 2026-04-18T12:55:00Z
5
value 0.00028
scoring_system epss
scoring_elements 0.07952
published_at 2026-04-21T12:55:00Z
6
value 0.00028
scoring_system epss
scoring_elements 0.07909
published_at 2026-04-04T12:55:00Z
7
value 0.00028
scoring_system epss
scoring_elements 0.07862
published_at 2026-04-07T12:55:00Z
8
value 0.00028
scoring_system epss
scoring_elements 0.07921
published_at 2026-04-08T12:55:00Z
9
value 0.00028
scoring_system epss
scoring_elements 0.07941
published_at 2026-04-09T12:55:00Z
10
value 0.00028
scoring_system epss
scoring_elements 0.07929
published_at 2026-04-11T12:55:00Z
11
value 0.00028
scoring_system epss
scoring_elements 0.07913
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-48918
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2307171
reference_id 2307171
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2307171
4
reference_url https://git.kernel.org/stable/c/5a6248c0a22352f09ea041665d3bd3e18f6f872c
reference_id 5a6248c0a22352f09ea041665d3bd3e18f6f872c
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:33:38Z/
url https://git.kernel.org/stable/c/5a6248c0a22352f09ea041665d3bd3e18f6f872c
5
reference_url https://git.kernel.org/stable/c/7de1ed755e1ace30d97a724bad32452ed86b653b
reference_id 7de1ed755e1ace30d97a724bad32452ed86b653b
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:33:38Z/
url https://git.kernel.org/stable/c/7de1ed755e1ace30d97a724bad32452ed86b653b
6
reference_url https://git.kernel.org/stable/c/fe51975ff13831e794e1bcd0039b305dcad3d7ba
reference_id fe51975ff13831e794e1bcd0039b305dcad3d7ba
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:33:38Z/
url https://git.kernel.org/stable/c/fe51975ff13831e794e1bcd0039b305dcad3d7ba
7
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
8
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
9
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
10
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-48918
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-abus-pmpv-ayca
43
url VCID-ac81-f1pp-3keh
vulnerability_id VCID-ac81-f1pp-3keh
summary kernel: scsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50030.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50030.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50030
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07129
published_at 2026-04-02T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.07204
published_at 2026-04-04T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.07183
published_at 2026-04-07T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07237
published_at 2026-04-13T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.07263
published_at 2026-04-09T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.0726
published_at 2026-04-11T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.07247
published_at 2026-04-12T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.21171
published_at 2026-04-24T12:55:00Z
8
value 0.0007
scoring_system epss
scoring_elements 0.21324
published_at 2026-04-16T12:55:00Z
9
value 0.0007
scoring_system epss
scoring_elements 0.21332
published_at 2026-04-18T12:55:00Z
10
value 0.0007
scoring_system epss
scoring_elements 0.21307
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50030
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50030
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50030
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373453
reference_id 2373453
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373453
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
7
reference_url https://access.redhat.com/errata/RHSA-2024:4447
reference_id RHSA-2024:4447
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4447
fixed_packages
aliases CVE-2022-50030
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ac81-f1pp-3keh
44
url VCID-adpr-958r-eke7
vulnerability_id VCID-adpr-958r-eke7
summary kernel: race condition in snd_pcm_hw_free leading to use-after-free
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1048.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1048.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1048
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02647
published_at 2026-04-01T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.0281
published_at 2026-04-24T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02718
published_at 2026-04-12T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02715
published_at 2026-04-13T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02696
published_at 2026-04-16T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02706
published_at 2026-04-18T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.0282
published_at 2026-04-21T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02719
published_at 2026-04-02T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02734
published_at 2026-04-04T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02741
published_at 2026-04-07T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02744
published_at 2026-04-08T12:55:00Z
11
value 0.00014
scoring_system epss
scoring_elements 0.02764
published_at 2026-04-09T12:55:00Z
12
value 0.00014
scoring_system epss
scoring_elements 0.02735
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1048
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
42
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
43
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2066706
reference_id 2066706
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2066706
44
reference_url https://security.archlinux.org/AVG-2698
reference_id AVG-2698
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2698
45
reference_url https://security.archlinux.org/AVG-2699
reference_id AVG-2699
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2699
46
reference_url https://security.archlinux.org/AVG-2700
reference_id AVG-2700
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2700
47
reference_url https://security.archlinux.org/AVG-2701
reference_id AVG-2701
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2701
48
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
49
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
50
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
51
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
52
reference_url https://access.redhat.com/errata/RHSA-2024:4107
reference_id RHSA-2024:4107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4107
53
reference_url https://usn.ubuntu.com/5381-1/
reference_id USN-5381-1
reference_type
scores
url https://usn.ubuntu.com/5381-1/
54
reference_url https://usn.ubuntu.com/5469-1/
reference_id USN-5469-1
reference_type
scores
url https://usn.ubuntu.com/5469-1/
55
reference_url https://usn.ubuntu.com/5560-1/
reference_id USN-5560-1
reference_type
scores
url https://usn.ubuntu.com/5560-1/
56
reference_url https://usn.ubuntu.com/5560-2/
reference_id USN-5560-2
reference_type
scores
url https://usn.ubuntu.com/5560-2/
57
reference_url https://usn.ubuntu.com/5562-1/
reference_id USN-5562-1
reference_type
scores
url https://usn.ubuntu.com/5562-1/
58
reference_url https://usn.ubuntu.com/5582-1/
reference_id USN-5582-1
reference_type
scores
url https://usn.ubuntu.com/5582-1/
59
reference_url https://usn.ubuntu.com/5856-1/
reference_id USN-5856-1
reference_type
scores
url https://usn.ubuntu.com/5856-1/
fixed_packages
aliases CVE-2022-1048
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-adpr-958r-eke7
45
url VCID-atz3-c1m5-eqa2
vulnerability_id VCID-atz3-c1m5-eqa2
summary kernel: dm thin: fix use-after-free crash in dm_sm_register_threshold_callback
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50092.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50092.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50092
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06259
published_at 2026-04-02T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06275
published_at 2026-04-07T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06321
published_at 2026-04-08T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06361
published_at 2026-04-09T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06353
published_at 2026-04-11T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06298
published_at 2026-04-04T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06348
published_at 2026-04-12T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06337
published_at 2026-04-13T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.19468
published_at 2026-04-24T12:55:00Z
9
value 0.00063
scoring_system epss
scoring_elements 0.19553
published_at 2026-04-16T12:55:00Z
10
value 0.00063
scoring_system epss
scoring_elements 0.1956
published_at 2026-04-18T12:55:00Z
11
value 0.00063
scoring_system epss
scoring_elements 0.19573
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50092
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50092
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373527
reference_id 2373527
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373527
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-50092
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-atz3-c1m5-eqa2
46
url VCID-bdpj-gk16-a3dz
vulnerability_id VCID-bdpj-gk16-a3dz
summary kernel: net/packet: slab-out-of-bounds access in packet_recvmsg()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-20368.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-20368.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-20368
reference_id
reference_type
scores
0
value 0.00052
scoring_system epss
scoring_elements 0.16153
published_at 2026-04-24T12:55:00Z
1
value 0.00052
scoring_system epss
scoring_elements 0.16204
published_at 2026-04-16T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.16223
published_at 2026-04-18T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.16261
published_at 2026-04-21T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.21147
published_at 2026-04-04T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.20941
published_at 2026-04-08T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.21003
published_at 2026-04-09T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.21019
published_at 2026-04-11T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.20974
published_at 2026-04-12T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.2092
published_at 2026-04-13T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.20942
published_at 2026-04-01T12:55:00Z
11
value 0.00068
scoring_system epss
scoring_elements 0.20861
published_at 2026-04-07T12:55:00Z
12
value 0.00068
scoring_system epss
scoring_elements 0.21093
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-20368
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20368
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2123695
reference_id 2123695
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2123695
5
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
6
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
7
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
8
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
9
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
10
reference_url https://usn.ubuntu.com/5580-1/
reference_id USN-5580-1
reference_type
scores
url https://usn.ubuntu.com/5580-1/
11
reference_url https://usn.ubuntu.com/5650-1/
reference_id USN-5650-1
reference_type
scores
url https://usn.ubuntu.com/5650-1/
fixed_packages
aliases CVE-2022-20368
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bdpj-gk16-a3dz
47
url VCID-bp6k-v3c5-gudy
vulnerability_id VCID-bp6k-v3c5-gudy
summary kernel: LoadPin bypass via dm-verity table reload
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2503.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2503.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2503
reference_id
reference_type
scores
0
value 4e-05
scoring_system epss
scoring_elements 0.00202
published_at 2026-04-24T12:55:00Z
1
value 4e-05
scoring_system epss
scoring_elements 0.00194
published_at 2026-04-07T12:55:00Z
2
value 4e-05
scoring_system epss
scoring_elements 0.00197
published_at 2026-04-18T12:55:00Z
3
value 4e-05
scoring_system epss
scoring_elements 0.00193
published_at 2026-04-09T12:55:00Z
4
value 4e-05
scoring_system epss
scoring_elements 0.00195
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2503
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2503
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2177862
reference_id 2177862
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2177862
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://github.com/google/security-research/security/advisories/GHSA-6vq3-w69p-w63m
reference_id GHSA-6vq3-w69p-w63m
reference_type
scores
0
value 6.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-21T13:39:52Z/
url https://github.com/google/security-research/security/advisories/GHSA-6vq3-w69p-w63m
10
reference_url https://security.netapp.com/advisory/ntap-20230214-0005/
reference_id ntap-20230214-0005
reference_type
scores
0
value 6.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-21T13:39:52Z/
url https://security.netapp.com/advisory/ntap-20230214-0005/
11
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
12
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
13
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
14
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
15
reference_url https://access.redhat.com/errata/RHSA-2023:5627
reference_id RHSA-2023:5627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5627
16
reference_url https://usn.ubuntu.com/5594-1/
reference_id USN-5594-1
reference_type
scores
url https://usn.ubuntu.com/5594-1/
17
reference_url https://usn.ubuntu.com/5599-1/
reference_id USN-5599-1
reference_type
scores
url https://usn.ubuntu.com/5599-1/
18
reference_url https://usn.ubuntu.com/5602-1/
reference_id USN-5602-1
reference_type
scores
url https://usn.ubuntu.com/5602-1/
19
reference_url https://usn.ubuntu.com/5616-1/
reference_id USN-5616-1
reference_type
scores
url https://usn.ubuntu.com/5616-1/
20
reference_url https://usn.ubuntu.com/5622-1/
reference_id USN-5622-1
reference_type
scores
url https://usn.ubuntu.com/5622-1/
21
reference_url https://usn.ubuntu.com/5623-1/
reference_id USN-5623-1
reference_type
scores
url https://usn.ubuntu.com/5623-1/
22
reference_url https://usn.ubuntu.com/5630-1/
reference_id USN-5630-1
reference_type
scores
url https://usn.ubuntu.com/5630-1/
23
reference_url https://usn.ubuntu.com/5639-1/
reference_id USN-5639-1
reference_type
scores
url https://usn.ubuntu.com/5639-1/
24
reference_url https://usn.ubuntu.com/5647-1/
reference_id USN-5647-1
reference_type
scores
url https://usn.ubuntu.com/5647-1/
25
reference_url https://usn.ubuntu.com/5654-1/
reference_id USN-5654-1
reference_type
scores
url https://usn.ubuntu.com/5654-1/
26
reference_url https://usn.ubuntu.com/5660-1/
reference_id USN-5660-1
reference_type
scores
url https://usn.ubuntu.com/5660-1/
27
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
28
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
29
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
fixed_packages
aliases CVE-2022-2503
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bp6k-v3c5-gudy
48
url VCID-byxa-eqjd-8yb2
vulnerability_id VCID-byxa-eqjd-8yb2
summary kernel: use after free in SUNRPC subsystem
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28893.json
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28893.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-28893
reference_id
reference_type
scores
0
value 0.00028
scoring_system epss
scoring_elements 0.07986
published_at 2026-04-02T12:55:00Z
1
value 0.00028
scoring_system epss
scoring_elements 0.08033
published_at 2026-04-04T12:55:00Z
2
value 0.00028
scoring_system epss
scoring_elements 0.07992
published_at 2026-04-07T12:55:00Z
3
value 0.00028
scoring_system epss
scoring_elements 0.08053
published_at 2026-04-08T12:55:00Z
4
value 0.00028
scoring_system epss
scoring_elements 0.08077
published_at 2026-04-09T12:55:00Z
5
value 0.00028
scoring_system epss
scoring_elements 0.08067
published_at 2026-04-11T12:55:00Z
6
value 0.00028
scoring_system epss
scoring_elements 0.08046
published_at 2026-04-12T12:55:00Z
7
value 0.00028
scoring_system epss
scoring_elements 0.08029
published_at 2026-04-24T12:55:00Z
8
value 0.00028
scoring_system epss
scoring_elements 0.07932
published_at 2026-04-16T12:55:00Z
9
value 0.00028
scoring_system epss
scoring_elements 0.07918
published_at 2026-04-18T12:55:00Z
10
value 0.00028
scoring_system epss
scoring_elements 0.08075
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-28893
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2074208
reference_id 2074208
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2074208
17
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
18
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
19
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
20
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
21
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
22
reference_url https://usn.ubuntu.com/5544-1/
reference_id USN-5544-1
reference_type
scores
url https://usn.ubuntu.com/5544-1/
23
reference_url https://usn.ubuntu.com/5562-1/
reference_id USN-5562-1
reference_type
scores
url https://usn.ubuntu.com/5562-1/
24
reference_url https://usn.ubuntu.com/5564-1/
reference_id USN-5564-1
reference_type
scores
url https://usn.ubuntu.com/5564-1/
25
reference_url https://usn.ubuntu.com/5566-1/
reference_id USN-5566-1
reference_type
scores
url https://usn.ubuntu.com/5566-1/
26
reference_url https://usn.ubuntu.com/5582-1/
reference_id USN-5582-1
reference_type
scores
url https://usn.ubuntu.com/5582-1/
fixed_packages
aliases CVE-2022-28893
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-byxa-eqjd-8yb2
49
url VCID-cdxu-3fm4-rkdr
vulnerability_id VCID-cdxu-3fm4-rkdr
summary kernel: mac80211: fix potential double free on mesh join
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49290.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49290.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49290
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03597
published_at 2026-04-24T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03552
published_at 2026-04-07T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03553
published_at 2026-04-08T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03575
published_at 2026-04-09T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03531
published_at 2026-04-11T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03502
published_at 2026-04-12T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03477
published_at 2026-04-13T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03451
published_at 2026-04-16T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03463
published_at 2026-04-18T12:55:00Z
9
value 0.00016
scoring_system epss
scoring_elements 0.03589
published_at 2026-04-21T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07515
published_at 2026-04-02T12:55:00Z
11
value 0.00027
scoring_system epss
scoring_elements 0.07555
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49290
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49290
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49290
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/12e407a8ef17623823fd0c066fbd7f103953d28d
reference_id 12e407a8ef17623823fd0c066fbd7f103953d28d
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T19:45:11Z/
url https://git.kernel.org/stable/c/12e407a8ef17623823fd0c066fbd7f103953d28d
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347727
reference_id 2347727
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347727
6
reference_url https://git.kernel.org/stable/c/273ebddc5fda2967492cb0b6cdd7d81cfb821b76
reference_id 273ebddc5fda2967492cb0b6cdd7d81cfb821b76
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T19:45:11Z/
url https://git.kernel.org/stable/c/273ebddc5fda2967492cb0b6cdd7d81cfb821b76
7
reference_url https://git.kernel.org/stable/c/3bbd0000d012f92aec423b224784fbf0f7bf40f8
reference_id 3bbd0000d012f92aec423b224784fbf0f7bf40f8
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T19:45:11Z/
url https://git.kernel.org/stable/c/3bbd0000d012f92aec423b224784fbf0f7bf40f8
8
reference_url https://git.kernel.org/stable/c/46bb87d40683337757a2f902fcd4244b32bb4e86
reference_id 46bb87d40683337757a2f902fcd4244b32bb4e86
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T19:45:11Z/
url https://git.kernel.org/stable/c/46bb87d40683337757a2f902fcd4244b32bb4e86
9
reference_url https://git.kernel.org/stable/c/4a2d4496e15ea5bb5c8e83b94ca8ca7fb045e7d3
reference_id 4a2d4496e15ea5bb5c8e83b94ca8ca7fb045e7d3
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T19:45:11Z/
url https://git.kernel.org/stable/c/4a2d4496e15ea5bb5c8e83b94ca8ca7fb045e7d3
10
reference_url https://git.kernel.org/stable/c/582d8c60c0c053684f7138875e8150d5749ffc17
reference_id 582d8c60c0c053684f7138875e8150d5749ffc17
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T19:45:11Z/
url https://git.kernel.org/stable/c/582d8c60c0c053684f7138875e8150d5749ffc17
11
reference_url https://git.kernel.org/stable/c/5d3ff9542a40ce034416bca03864709540a36016
reference_id 5d3ff9542a40ce034416bca03864709540a36016
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T19:45:11Z/
url https://git.kernel.org/stable/c/5d3ff9542a40ce034416bca03864709540a36016
12
reference_url https://git.kernel.org/stable/c/615716af8644813355e014314a0bc1e961250f5a
reference_id 615716af8644813355e014314a0bc1e961250f5a
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T19:45:11Z/
url https://git.kernel.org/stable/c/615716af8644813355e014314a0bc1e961250f5a
13
reference_url https://git.kernel.org/stable/c/c1d9c3628ef0a0ca197595d0f9e01cd3b5dda186
reference_id c1d9c3628ef0a0ca197595d0f9e01cd3b5dda186
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T19:45:11Z/
url https://git.kernel.org/stable/c/c1d9c3628ef0a0ca197595d0f9e01cd3b5dda186
14
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
15
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
16
reference_url https://access.redhat.com/errata/RHSA-2026:1442
reference_id RHSA-2026:1442
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1442
17
reference_url https://access.redhat.com/errata/RHSA-2026:1494
reference_id RHSA-2026:1494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1494
18
reference_url https://access.redhat.com/errata/RHSA-2026:1495
reference_id RHSA-2026:1495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1495
19
reference_url https://access.redhat.com/errata/RHSA-2026:1886
reference_id RHSA-2026:1886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1886
fixed_packages
aliases CVE-2022-49290
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cdxu-3fm4-rkdr
50
url VCID-ce4d-arhp-2fh7
vulnerability_id VCID-ce4d-arhp-2fh7
summary kernel: use-after-free vulnerability in function sco_sock_sendmsg()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3640.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3640.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3640
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01659
published_at 2026-04-01T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01768
published_at 2026-04-24T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01685
published_at 2026-04-12T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01684
published_at 2026-04-13T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01674
published_at 2026-04-16T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01677
published_at 2026-04-18T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01757
published_at 2026-04-21T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.01692
published_at 2026-04-02T12:55:00Z
8
value 0.00012
scoring_system epss
scoring_elements 0.01701
published_at 2026-04-04T12:55:00Z
9
value 0.00012
scoring_system epss
scoring_elements 0.01699
published_at 2026-04-07T12:55:00Z
10
value 0.00012
scoring_system epss
scoring_elements 0.01702
published_at 2026-04-08T12:55:00Z
11
value 0.00012
scoring_system epss
scoring_elements 0.0171
published_at 2026-04-09T12:55:00Z
12
value 0.00012
scoring_system epss
scoring_elements 0.01694
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3640
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375
53
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
54
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1980646
reference_id 1980646
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1980646
55
reference_url https://security.archlinux.org/AVG-2568
reference_id AVG-2568
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2568
56
reference_url https://security.archlinux.org/AVG-2570
reference_id AVG-2570
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2570
57
reference_url https://security.archlinux.org/AVG-2571
reference_id AVG-2571
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2571
58
reference_url https://security.archlinux.org/AVG-2588
reference_id AVG-2588
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2588
59
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
60
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
61
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
62
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
63
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
64
reference_url https://usn.ubuntu.com/5265-1/
reference_id USN-5265-1
reference_type
scores
url https://usn.ubuntu.com/5265-1/
65
reference_url https://usn.ubuntu.com/5267-1/
reference_id USN-5267-1
reference_type
scores
url https://usn.ubuntu.com/5267-1/
66
reference_url https://usn.ubuntu.com/5267-3/
reference_id USN-5267-3
reference_type
scores
url https://usn.ubuntu.com/5267-3/
67
reference_url https://usn.ubuntu.com/5268-1/
reference_id USN-5268-1
reference_type
scores
url https://usn.ubuntu.com/5268-1/
fixed_packages
aliases CVE-2021-3640
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ce4d-arhp-2fh7
51
url VCID-cjvg-hahg-rygg
vulnerability_id VCID-cjvg-hahg-rygg
summary kernel: ext4: fix bug_on ext4_mb_use_inode_pa
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49708.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49708.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49708
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07121
published_at 2026-04-24T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.07103
published_at 2026-04-13T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.07023
published_at 2026-04-18T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07156
published_at 2026-04-21T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.07039
published_at 2026-04-16T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.07094
published_at 2026-04-08T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.07125
published_at 2026-04-09T12:55:00Z
7
value 0.00026
scoring_system epss
scoring_elements 0.07124
published_at 2026-04-11T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.07113
published_at 2026-04-12T12:55:00Z
9
value 0.0003
scoring_system epss
scoring_elements 0.08625
published_at 2026-04-02T12:55:00Z
10
value 0.0003
scoring_system epss
scoring_elements 0.08676
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49708
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49708
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49708
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347684
reference_id 2347684
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347684
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49708
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cjvg-hahg-rygg
52
url VCID-cr5s-una3-gyg4
vulnerability_id VCID-cr5s-una3-gyg4
summary kernel: nfs_atomic_open() returns uninitialized data instead of ENOTDIR
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24448.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24448.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-24448
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03773
published_at 2026-04-12T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03786
published_at 2026-04-04T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03801
published_at 2026-04-07T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03805
published_at 2026-04-08T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03829
published_at 2026-04-09T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03792
published_at 2026-04-11T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03745
published_at 2026-04-13T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03726
published_at 2026-04-16T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03737
published_at 2026-04-18T12:55:00Z
9
value 0.00016
scoring_system epss
scoring_elements 0.0386
published_at 2026-04-21T12:55:00Z
10
value 0.00016
scoring_system epss
scoring_elements 0.03866
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-24448
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0516
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0847
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0847
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375
55
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
56
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2051444
reference_id 2051444
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2051444
57
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
58
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
59
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
60
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
61
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
62
reference_url https://usn.ubuntu.com/5302-1/
reference_id USN-5302-1
reference_type
scores
url https://usn.ubuntu.com/5302-1/
63
reference_url https://usn.ubuntu.com/5383-1/
reference_id USN-5383-1
reference_type
scores
url https://usn.ubuntu.com/5383-1/
64
reference_url https://usn.ubuntu.com/5384-1/
reference_id USN-5384-1
reference_type
scores
url https://usn.ubuntu.com/5384-1/
65
reference_url https://usn.ubuntu.com/5385-1/
reference_id USN-5385-1
reference_type
scores
url https://usn.ubuntu.com/5385-1/
66
reference_url https://usn.ubuntu.com/7148-1/
reference_id USN-7148-1
reference_type
scores
url https://usn.ubuntu.com/7148-1/
fixed_packages
aliases CVE-2022-24448
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cr5s-una3-gyg4
53
url VCID-d1uc-apk8-qked
vulnerability_id VCID-d1uc-apk8-qked
summary kernel: concurrency use-after-free between drm_setmaster_ioctl and drm_mode_getresources
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1280.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1280.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1280
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05438
published_at 2026-04-24T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05245
published_at 2026-04-16T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05247
published_at 2026-04-18T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05399
published_at 2026-04-21T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05714
published_at 2026-04-04T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05747
published_at 2026-04-08T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05773
published_at 2026-04-09T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05751
published_at 2026-04-11T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05743
published_at 2026-04-12T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.05738
published_at 2026-04-13T12:55:00Z
10
value 0.00021
scoring_system epss
scoring_elements 0.0564
published_at 2026-04-01T12:55:00Z
11
value 0.00021
scoring_system epss
scoring_elements 0.05707
published_at 2026-04-07T12:55:00Z
12
value 0.00021
scoring_system epss
scoring_elements 0.05674
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1280
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1280
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2071022
reference_id 2071022
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2071022
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
7
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-1280
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d1uc-apk8-qked
54
url VCID-dqm4-h22h-fqdm
vulnerability_id VCID-dqm4-h22h-fqdm
summary kernel: ext4: fix bug_on in __es_tree_search
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49409.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49409.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49409
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08143
published_at 2026-04-24T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08045
published_at 2026-04-16T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.0803
published_at 2026-04-18T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.08189
published_at 2026-04-21T12:55:00Z
4
value 0.00029
scoring_system epss
scoring_elements 0.08099
published_at 2026-04-07T12:55:00Z
5
value 0.00029
scoring_system epss
scoring_elements 0.08159
published_at 2026-04-08T12:55:00Z
6
value 0.00029
scoring_system epss
scoring_elements 0.08182
published_at 2026-04-09T12:55:00Z
7
value 0.00029
scoring_system epss
scoring_elements 0.08176
published_at 2026-04-11T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08156
published_at 2026-04-12T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.08139
published_at 2026-04-13T12:55:00Z
10
value 0.0003
scoring_system epss
scoring_elements 0.08625
published_at 2026-04-02T12:55:00Z
11
value 0.0003
scoring_system epss
scoring_elements 0.08676
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49409
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49409
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49409
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348330
reference_id 2348330
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348330
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49409
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dqm4-h22h-fqdm
55
url VCID-dxzp-2kau-bkfw
vulnerability_id VCID-dxzp-2kau-bkfw
summary kernel: RDMA/cm: Fix memory leak in ib_cm_insert_listen
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49671.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49671.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49671
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10785
published_at 2026-04-02T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10722
published_at 2026-04-24T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.10675
published_at 2026-04-07T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10751
published_at 2026-04-08T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10808
published_at 2026-04-09T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.10822
published_at 2026-04-11T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10791
published_at 2026-04-12T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10766
published_at 2026-04-13T12:55:00Z
8
value 0.00036
scoring_system epss
scoring_elements 0.10627
published_at 2026-04-16T12:55:00Z
9
value 0.00036
scoring_system epss
scoring_elements 0.10643
published_at 2026-04-18T12:55:00Z
10
value 0.00036
scoring_system epss
scoring_elements 0.10768
published_at 2026-04-21T12:55:00Z
11
value 0.00036
scoring_system epss
scoring_elements 0.10848
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49671
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49671
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348040
reference_id 2348040
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348040
5
reference_url https://git.kernel.org/stable/c/2990f223ffa7bb25422956b9f79f9176a5b38346
reference_id 2990f223ffa7bb25422956b9f79f9176a5b38346
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:33:18Z/
url https://git.kernel.org/stable/c/2990f223ffa7bb25422956b9f79f9176a5b38346
6
reference_url https://git.kernel.org/stable/c/2febf09a8a8ae4accf908f043f1bab1421056568
reference_id 2febf09a8a8ae4accf908f043f1bab1421056568
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:33:18Z/
url https://git.kernel.org/stable/c/2febf09a8a8ae4accf908f043f1bab1421056568
7
reference_url https://git.kernel.org/stable/c/889000874c1204e47c7f2a4945db262a47e7efc9
reference_id 889000874c1204e47c7f2a4945db262a47e7efc9
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:33:18Z/
url https://git.kernel.org/stable/c/889000874c1204e47c7f2a4945db262a47e7efc9
8
reference_url https://git.kernel.org/stable/c/b0cab8b517aeaf2592c3479294f934209c41a26f
reference_id b0cab8b517aeaf2592c3479294f934209c41a26f
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:33:18Z/
url https://git.kernel.org/stable/c/b0cab8b517aeaf2592c3479294f934209c41a26f
9
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
10
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49671
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dxzp-2kau-bkfw
56
url VCID-dzcg-vtsb-1kh6
vulnerability_id VCID-dzcg-vtsb-1kh6
summary kernel: dma-buf/dma-resv: Stop leaking on krealloc() failure
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53181.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53181.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53181
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01826
published_at 2026-04-02T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01838
published_at 2026-04-04T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.0184
published_at 2026-04-07T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01843
published_at 2026-04-08T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01857
published_at 2026-04-09T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02281
published_at 2026-04-21T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02261
published_at 2026-04-24T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02215
published_at 2026-04-11T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.02204
published_at 2026-04-12T12:55:00Z
9
value 0.00013
scoring_system epss
scoring_elements 0.02203
published_at 2026-04-13T12:55:00Z
10
value 0.00013
scoring_system epss
scoring_elements 0.02186
published_at 2026-04-16T12:55:00Z
11
value 0.00013
scoring_system epss
scoring_elements 0.02197
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53181
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2395369
reference_id 2395369
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2395369
4
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
6
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
fixed_packages
aliases CVE-2023-53181
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dzcg-vtsb-1kh6
57
url VCID-e9ut-4ka7-nuhd
vulnerability_id VCID-e9ut-4ka7-nuhd
summary kernel: ASoC: rt7*-sdw: harden jack_detect_handler
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49616.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49616.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49616
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08329
published_at 2026-04-02T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08382
published_at 2026-04-04T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.21651
published_at 2026-04-07T12:55:00Z
3
value 0.0008
scoring_system epss
scoring_elements 0.23731
published_at 2026-04-12T12:55:00Z
4
value 0.0008
scoring_system epss
scoring_elements 0.23675
published_at 2026-04-13T12:55:00Z
5
value 0.0008
scoring_system epss
scoring_elements 0.23687
published_at 2026-04-16T12:55:00Z
6
value 0.0008
scoring_system epss
scoring_elements 0.23677
published_at 2026-04-18T12:55:00Z
7
value 0.0008
scoring_system epss
scoring_elements 0.23656
published_at 2026-04-21T12:55:00Z
8
value 0.0008
scoring_system epss
scoring_elements 0.23544
published_at 2026-04-24T12:55:00Z
9
value 0.0008
scoring_system epss
scoring_elements 0.23713
published_at 2026-04-08T12:55:00Z
10
value 0.0008
scoring_system epss
scoring_elements 0.2376
published_at 2026-04-09T12:55:00Z
11
value 0.0008
scoring_system epss
scoring_elements 0.23775
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49616
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49616
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347865
reference_id 2347865
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347865
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
fixed_packages
aliases CVE-2022-49616
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e9ut-4ka7-nuhd
58
url VCID-ec58-aejx-2kce
vulnerability_id VCID-ec58-aejx-2kce
summary kernel: mptcp: fix race on unaccepted mptcp sockets
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49669.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49669.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49669
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.12166
published_at 2026-04-04T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.1212
published_at 2026-04-02T12:55:00Z
2
value 0.0014
scoring_system epss
scoring_elements 0.33813
published_at 2026-04-24T12:55:00Z
3
value 0.0014
scoring_system epss
scoring_elements 0.34222
published_at 2026-04-12T12:55:00Z
4
value 0.0014
scoring_system epss
scoring_elements 0.34198
published_at 2026-04-13T12:55:00Z
5
value 0.0014
scoring_system epss
scoring_elements 0.34232
published_at 2026-04-16T12:55:00Z
6
value 0.0014
scoring_system epss
scoring_elements 0.34221
published_at 2026-04-18T12:55:00Z
7
value 0.0014
scoring_system epss
scoring_elements 0.34186
published_at 2026-04-21T12:55:00Z
8
value 0.0014
scoring_system epss
scoring_elements 0.3419
published_at 2026-04-07T12:55:00Z
9
value 0.0014
scoring_system epss
scoring_elements 0.34233
published_at 2026-04-08T12:55:00Z
10
value 0.0014
scoring_system epss
scoring_elements 0.34262
published_at 2026-04-09T12:55:00Z
11
value 0.0014
scoring_system epss
scoring_elements 0.34263
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49669
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348086
reference_id 2348086
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348086
4
reference_url https://git.kernel.org/stable/c/6aeed9045071f2252ff4e98fc13d1e304f33e5b0
reference_id 6aeed9045071f2252ff4e98fc13d1e304f33e5b0
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:58:23Z/
url https://git.kernel.org/stable/c/6aeed9045071f2252ff4e98fc13d1e304f33e5b0
5
reference_url https://git.kernel.org/stable/c/a8a3e95c74e48c2c9b07b81fafda9122993f2e12
reference_id a8a3e95c74e48c2c9b07b81fafda9122993f2e12
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:58:23Z/
url https://git.kernel.org/stable/c/a8a3e95c74e48c2c9b07b81fafda9122993f2e12
6
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
7
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49669
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ec58-aejx-2kce
59
url VCID-ep2r-37u6-a7ht
vulnerability_id VCID-ep2r-37u6-a7ht
summary kernel: veth: ensure skb entering GRO are not cloned.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47099.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47099.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-47099
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.02056
published_at 2026-04-01T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02127
published_at 2026-04-02T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.0215
published_at 2026-04-24T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02109
published_at 2026-04-12T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02105
published_at 2026-04-13T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.0208
published_at 2026-04-16T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02094
published_at 2026-04-18T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02181
published_at 2026-04-21T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.02133
published_at 2026-04-04T12:55:00Z
9
value 0.00013
scoring_system epss
scoring_elements 0.02129
published_at 2026-04-08T12:55:00Z
10
value 0.00013
scoring_system epss
scoring_elements 0.02147
published_at 2026-04-09T12:55:00Z
11
value 0.00013
scoring_system epss
scoring_elements 0.02124
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-47099
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2267919
reference_id 2267919
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2267919
4
reference_url https://git.kernel.org/stable/c/9695b7de5b4760ed22132aca919570c0190cb0ce
reference_id 9695b7de5b4760ed22132aca919570c0190cb0ce
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-12T14:24:44Z/
url https://git.kernel.org/stable/c/9695b7de5b4760ed22132aca919570c0190cb0ce
5
reference_url https://git.kernel.org/stable/c/d2269ae48598e05b59ec9ea9e6e44fd33941130d
reference_id d2269ae48598e05b59ec9ea9e6e44fd33941130d
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-12T14:24:44Z/
url https://git.kernel.org/stable/c/d2269ae48598e05b59ec9ea9e6e44fd33941130d
6
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
7
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
8
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
9
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
10
reference_url https://access.redhat.com/errata/RHSA-2024:1877
reference_id RHSA-2024:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1877
fixed_packages
aliases CVE-2021-47099
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ep2r-37u6-a7ht
60
url VCID-er28-r5n3-eken
vulnerability_id VCID-er28-r5n3-eken
summary kernel: netfilter: fix use-after-free in __nf_register_net_hook()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48912.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48912.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-48912
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06216
published_at 2026-04-02T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06418
published_at 2026-04-24T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.0627
published_at 2026-04-08T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06311
published_at 2026-04-09T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06305
published_at 2026-04-11T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.063
published_at 2026-04-12T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06289
published_at 2026-04-13T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06246
published_at 2026-04-16T12:55:00Z
8
value 0.00023
scoring_system epss
scoring_elements 0.06259
published_at 2026-04-18T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06404
published_at 2026-04-21T12:55:00Z
10
value 0.00023
scoring_system epss
scoring_elements 0.06247
published_at 2026-04-04T12:55:00Z
11
value 0.00023
scoring_system epss
scoring_elements 0.06226
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-48912
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48912
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/05f7927b25d2635e87267ff6c79db79fb46cf313
reference_id 05f7927b25d2635e87267ff6c79db79fb46cf313
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:33:57Z/
url https://git.kernel.org/stable/c/05f7927b25d2635e87267ff6c79db79fb46cf313
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2307165
reference_id 2307165
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2307165
6
reference_url https://git.kernel.org/stable/c/49c24579cec41e32f13d57b337fd28fb208d4a5b
reference_id 49c24579cec41e32f13d57b337fd28fb208d4a5b
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:33:57Z/
url https://git.kernel.org/stable/c/49c24579cec41e32f13d57b337fd28fb208d4a5b
7
reference_url https://git.kernel.org/stable/c/56763f12b0f02706576a088e85ef856deacc98a0
reference_id 56763f12b0f02706576a088e85ef856deacc98a0
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:33:57Z/
url https://git.kernel.org/stable/c/56763f12b0f02706576a088e85ef856deacc98a0
8
reference_url https://git.kernel.org/stable/c/5a8076e98dde17224dd47283b894a8b1dbe1bc72
reference_id 5a8076e98dde17224dd47283b894a8b1dbe1bc72
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:33:57Z/
url https://git.kernel.org/stable/c/5a8076e98dde17224dd47283b894a8b1dbe1bc72
9
reference_url https://git.kernel.org/stable/c/8b0142c4143c1ca297dcf2c0cdd045d65dae2344
reference_id 8b0142c4143c1ca297dcf2c0cdd045d65dae2344
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:33:57Z/
url https://git.kernel.org/stable/c/8b0142c4143c1ca297dcf2c0cdd045d65dae2344
10
reference_url https://git.kernel.org/stable/c/bd61f192a339b1095dfd6d56073a5265934c2979
reference_id bd61f192a339b1095dfd6d56073a5265934c2979
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:33:57Z/
url https://git.kernel.org/stable/c/bd61f192a339b1095dfd6d56073a5265934c2979
11
reference_url https://git.kernel.org/stable/c/bdd8fc1b826e6f23963f5bef3f7431c6188ec954
reference_id bdd8fc1b826e6f23963f5bef3f7431c6188ec954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:33:57Z/
url https://git.kernel.org/stable/c/bdd8fc1b826e6f23963f5bef3f7431c6188ec954
12
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
13
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-48912
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-er28-r5n3-eken
61
url VCID-etaa-zh6y-kqg7
vulnerability_id VCID-etaa-zh6y-kqg7
summary kernel: dm raid: fix KASAN warning in raid5_add_disks
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49673.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49673.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49673
reference_id
reference_type
scores
0
value 0.00028
scoring_system epss
scoring_elements 0.08089
published_at 2026-04-04T12:55:00Z
1
value 0.00028
scoring_system epss
scoring_elements 0.08046
published_at 2026-04-02T12:55:00Z
2
value 0.00039
scoring_system epss
scoring_elements 0.11746
published_at 2026-04-24T12:55:00Z
3
value 0.00049
scoring_system epss
scoring_elements 0.15143
published_at 2026-04-07T12:55:00Z
4
value 0.00049
scoring_system epss
scoring_elements 0.15231
published_at 2026-04-08T12:55:00Z
5
value 0.00049
scoring_system epss
scoring_elements 0.15282
published_at 2026-04-09T12:55:00Z
6
value 0.00049
scoring_system epss
scoring_elements 0.15252
published_at 2026-04-11T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.15213
published_at 2026-04-12T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.15149
published_at 2026-04-13T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.15062
published_at 2026-04-16T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.15071
published_at 2026-04-18T12:55:00Z
11
value 0.00049
scoring_system epss
scoring_elements 0.15122
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49673
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49673
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347792
reference_id 2347792
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347792
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49673
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-etaa-zh6y-kqg7
62
url VCID-eyf5-2y8d-33hp
vulnerability_id VCID-eyf5-2y8d-33hp
summary kernel: KVM: LAPIC: Also cancel preemption timer during SET_LAPIC
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48765.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48765.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-48765
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09471
published_at 2026-04-02T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09615
published_at 2026-04-24T12:55:00Z
2
value 0.00033
scoring_system epss
scoring_elements 0.09524
published_at 2026-04-13T12:55:00Z
3
value 0.00033
scoring_system epss
scoring_elements 0.09417
published_at 2026-04-16T12:55:00Z
4
value 0.00033
scoring_system epss
scoring_elements 0.09419
published_at 2026-04-18T12:55:00Z
5
value 0.00033
scoring_system epss
scoring_elements 0.09569
published_at 2026-04-21T12:55:00Z
6
value 0.00033
scoring_system epss
scoring_elements 0.09519
published_at 2026-04-04T12:55:00Z
7
value 0.00033
scoring_system epss
scoring_elements 0.09433
published_at 2026-04-07T12:55:00Z
8
value 0.00033
scoring_system epss
scoring_elements 0.09507
published_at 2026-04-08T12:55:00Z
9
value 0.00033
scoring_system epss
scoring_elements 0.09554
published_at 2026-04-09T12:55:00Z
10
value 0.00033
scoring_system epss
scoring_elements 0.09568
published_at 2026-04-11T12:55:00Z
11
value 0.00033
scoring_system epss
scoring_elements 0.09539
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-48765
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48765
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2293344
reference_id 2293344
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2293344
5
reference_url https://git.kernel.org/stable/c/35fe7cfbab2e81f1afb23fc4212210b1de6d9633
reference_id 35fe7cfbab2e81f1afb23fc4212210b1de6d9633
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T17:10:12Z/
url https://git.kernel.org/stable/c/35fe7cfbab2e81f1afb23fc4212210b1de6d9633
6
reference_url https://git.kernel.org/stable/c/54b3439c8e70e0bcfea59aeef9dd98908cbbf655
reference_id 54b3439c8e70e0bcfea59aeef9dd98908cbbf655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T17:10:12Z/
url https://git.kernel.org/stable/c/54b3439c8e70e0bcfea59aeef9dd98908cbbf655
7
reference_url https://git.kernel.org/stable/c/ce55f63f6cea4cab8ae9212f73285648a5baa30d
reference_id ce55f63f6cea4cab8ae9212f73285648a5baa30d
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T17:10:12Z/
url https://git.kernel.org/stable/c/ce55f63f6cea4cab8ae9212f73285648a5baa30d
8
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
9
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-48765
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eyf5-2y8d-33hp
63
url VCID-f4jq-3ezz-63b6
vulnerability_id VCID-f4jq-3ezz-63b6
summary kernel: net: openvswitch: fix leak of nested actions
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49086.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49086.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49086
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01537
published_at 2026-04-24T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01435
published_at 2026-04-12T12:55:00Z
2
value 0.00011
scoring_system epss
scoring_elements 0.01436
published_at 2026-04-13T12:55:00Z
3
value 0.00011
scoring_system epss
scoring_elements 0.01426
published_at 2026-04-16T12:55:00Z
4
value 0.00011
scoring_system epss
scoring_elements 0.0144
published_at 2026-04-18T12:55:00Z
5
value 0.00011
scoring_system epss
scoring_elements 0.01528
published_at 2026-04-21T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.1049
published_at 2026-04-04T12:55:00Z
7
value 0.00035
scoring_system epss
scoring_elements 0.10422
published_at 2026-04-02T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15608
published_at 2026-04-11T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.18511
published_at 2026-04-09T12:55:00Z
10
value 0.00059
scoring_system epss
scoring_elements 0.18377
published_at 2026-04-07T12:55:00Z
11
value 0.00059
scoring_system epss
scoring_elements 0.18459
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49086
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49086
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49086
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347770
reference_id 2347770
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347770
5
reference_url https://access.redhat.com/errata/RHSA-2022:5626
reference_id RHSA-2022:5626
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5626
6
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
7
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
8
reference_url https://access.redhat.com/errata/RHSA-2022:8973
reference_id RHSA-2022:8973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8973
fixed_packages
aliases CVE-2022-49086
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f4jq-3ezz-63b6
64
url VCID-f9md-7hmr-qucr
vulnerability_id VCID-f9md-7hmr-qucr
summary kernel: smb2_ioctl_query_info NULL pointer dereference
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0168.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0168.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0168
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.0439
published_at 2026-04-01T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04631
published_at 2026-04-24T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04493
published_at 2026-04-12T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04475
published_at 2026-04-13T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04445
published_at 2026-04-16T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04454
published_at 2026-04-18T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04591
published_at 2026-04-21T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.0443
published_at 2026-04-02T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04456
published_at 2026-04-04T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.04468
published_at 2026-04-07T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04502
published_at 2026-04-08T12:55:00Z
11
value 0.00018
scoring_system epss
scoring_elements 0.04517
published_at 2026-04-09T12:55:00Z
12
value 0.00018
scoring_system epss
scoring_elements 0.04507
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0168
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582
21
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2037386
reference_id 2037386
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2037386
23
reference_url https://security.archlinux.org/AVG-2698
reference_id AVG-2698
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2698
24
reference_url https://security.archlinux.org/AVG-2699
reference_id AVG-2699
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2699
25
reference_url https://security.archlinux.org/AVG-2700
reference_id AVG-2700
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2700
26
reference_url https://security.archlinux.org/AVG-2701
reference_id AVG-2701
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2701
27
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
28
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
29
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
30
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
31
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
32
reference_url https://usn.ubuntu.com/5469-1/
reference_id USN-5469-1
reference_type
scores
url https://usn.ubuntu.com/5469-1/
33
reference_url https://usn.ubuntu.com/6284-1/
reference_id USN-6284-1
reference_type
scores
url https://usn.ubuntu.com/6284-1/
34
reference_url https://usn.ubuntu.com/6301-1/
reference_id USN-6301-1
reference_type
scores
url https://usn.ubuntu.com/6301-1/
35
reference_url https://usn.ubuntu.com/6312-1/
reference_id USN-6312-1
reference_type
scores
url https://usn.ubuntu.com/6312-1/
36
reference_url https://usn.ubuntu.com/6314-1/
reference_id USN-6314-1
reference_type
scores
url https://usn.ubuntu.com/6314-1/
37
reference_url https://usn.ubuntu.com/6331-1/
reference_id USN-6331-1
reference_type
scores
url https://usn.ubuntu.com/6331-1/
38
reference_url https://usn.ubuntu.com/6337-1/
reference_id USN-6337-1
reference_type
scores
url https://usn.ubuntu.com/6337-1/
fixed_packages
aliases CVE-2022-0168
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f9md-7hmr-qucr
65
url VCID-fpkj-sk3m-pqae
vulnerability_id VCID-fpkj-sk3m-pqae
summary kernel: Drivers: hv: vmbus: Fix potential crash on module unload
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49098.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49098.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49098
reference_id
reference_type
scores
0
value 0.0001
scoring_system epss
scoring_elements 0.01118
published_at 2026-04-11T12:55:00Z
1
value 0.0001
scoring_system epss
scoring_elements 0.01127
published_at 2026-04-07T12:55:00Z
2
value 0.0001
scoring_system epss
scoring_elements 0.01133
published_at 2026-04-09T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.1645
published_at 2026-04-04T12:55:00Z
4
value 0.00052
scoring_system epss
scoring_elements 0.16388
published_at 2026-04-02T12:55:00Z
5
value 9e-05
scoring_system epss
scoring_elements 0.00898
published_at 2026-04-12T12:55:00Z
6
value 9e-05
scoring_system epss
scoring_elements 0.00954
published_at 2026-04-21T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.00897
published_at 2026-04-16T12:55:00Z
8
value 9e-05
scoring_system epss
scoring_elements 0.00905
published_at 2026-04-18T12:55:00Z
9
value 9e-05
scoring_system epss
scoring_elements 0.009
published_at 2026-04-13T12:55:00Z
10
value 9e-05
scoring_system epss
scoring_elements 0.00957
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49098
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49098
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348148
reference_id 2348148
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348148
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49098
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fpkj-sk3m-pqae
66
url VCID-fz24-3kux-sucr
vulnerability_id VCID-fz24-3kux-sucr
summary kernel: ASoC: ops: Reject out of bounds values in snd_soc_put_volsw()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48738.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48738.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-48738
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02463
published_at 2026-04-02T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02551
published_at 2026-04-24T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02475
published_at 2026-04-07T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02478
published_at 2026-04-08T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02498
published_at 2026-04-09T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02477
published_at 2026-04-11T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02469
published_at 2026-04-12T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02468
published_at 2026-04-13T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02452
published_at 2026-04-16T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02459
published_at 2026-04-18T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02565
published_at 2026-04-21T12:55:00Z
11
value 0.00014
scoring_system epss
scoring_elements 0.02476
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-48738
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48738
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2293321
reference_id 2293321
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2293321
5
reference_url https://git.kernel.org/stable/c/40f598698129b5ceaf31012f9501b775c7b6e57d
reference_id 40f598698129b5ceaf31012f9501b775c7b6e57d
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T17:10:47Z/
url https://git.kernel.org/stable/c/40f598698129b5ceaf31012f9501b775c7b6e57d
6
reference_url https://git.kernel.org/stable/c/586ef863c94354a7e00e5ae5ef01443d1dc99bc7
reference_id 586ef863c94354a7e00e5ae5ef01443d1dc99bc7
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T17:10:47Z/
url https://git.kernel.org/stable/c/586ef863c94354a7e00e5ae5ef01443d1dc99bc7
7
reference_url https://git.kernel.org/stable/c/65a61b1f56f5386486757930069fbdce94af08bf
reference_id 65a61b1f56f5386486757930069fbdce94af08bf
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T17:10:47Z/
url https://git.kernel.org/stable/c/65a61b1f56f5386486757930069fbdce94af08bf
8
reference_url https://git.kernel.org/stable/c/68fd718724284788fc5f379e0b7cac541429ece7
reference_id 68fd718724284788fc5f379e0b7cac541429ece7
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T17:10:47Z/
url https://git.kernel.org/stable/c/68fd718724284788fc5f379e0b7cac541429ece7
9
reference_url https://git.kernel.org/stable/c/817f7c9335ec01e0f5e8caffc4f1dcd5e458a4c0
reference_id 817f7c9335ec01e0f5e8caffc4f1dcd5e458a4c0
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T17:10:47Z/
url https://git.kernel.org/stable/c/817f7c9335ec01e0f5e8caffc4f1dcd5e458a4c0
10
reference_url https://git.kernel.org/stable/c/9e8895f1b3d4433f6d78aa6578e9db61ca6e6830
reference_id 9e8895f1b3d4433f6d78aa6578e9db61ca6e6830
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T17:10:47Z/
url https://git.kernel.org/stable/c/9e8895f1b3d4433f6d78aa6578e9db61ca6e6830
11
reference_url https://git.kernel.org/stable/c/a9394f21fba027147bf275b083c77955864c366a
reference_id a9394f21fba027147bf275b083c77955864c366a
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T17:10:47Z/
url https://git.kernel.org/stable/c/a9394f21fba027147bf275b083c77955864c366a
12
reference_url https://git.kernel.org/stable/c/bb72d2dda85564c66d909108ea6903937a41679d
reference_id bb72d2dda85564c66d909108ea6903937a41679d
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T17:10:47Z/
url https://git.kernel.org/stable/c/bb72d2dda85564c66d909108ea6903937a41679d
13
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
14
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-48738
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fz24-3kux-sucr
67
url VCID-g4vz-dgw6-dua2
vulnerability_id VCID-g4vz-dgw6-dua2
summary kernel: swiotlb information leak with DMA_FROM_DEVICE
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0854.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0854.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0854
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04576
published_at 2026-04-01T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04637
published_at 2026-04-02T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.0466
published_at 2026-04-04T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04673
published_at 2026-04-07T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04707
published_at 2026-04-08T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04719
published_at 2026-04-09T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04713
published_at 2026-04-11T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04696
published_at 2026-04-12T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04679
published_at 2026-04-13T12:55:00Z
9
value 0.00019
scoring_system epss
scoring_elements 0.05116
published_at 2026-04-24T12:55:00Z
10
value 0.00019
scoring_system epss
scoring_elements 0.04929
published_at 2026-04-16T12:55:00Z
11
value 0.00019
scoring_system epss
scoring_elements 0.04939
published_at 2026-04-18T12:55:00Z
12
value 0.00019
scoring_system epss
scoring_elements 0.05086
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0854
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
45
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
46
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2058395
reference_id 2058395
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2058395
47
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
48
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
49
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
50
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
51
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
52
reference_url https://usn.ubuntu.com/5381-1/
reference_id USN-5381-1
reference_type
scores
url https://usn.ubuntu.com/5381-1/
fixed_packages
aliases CVE-2022-0854
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g4vz-dgw6-dua2
68
url VCID-g5ce-cbh7-w7c8
vulnerability_id VCID-g5ce-cbh7-w7c8
summary kernel: iavf: Fix NULL pointer dereference in iavf_get_link_ksettings
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50054.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50054.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50054
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.0768
published_at 2026-04-02T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07735
published_at 2026-04-04T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07701
published_at 2026-04-07T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.0776
published_at 2026-04-08T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07778
published_at 2026-04-11T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07764
published_at 2026-04-12T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07748
published_at 2026-04-13T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.22111
published_at 2026-04-24T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22318
published_at 2026-04-16T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.22312
published_at 2026-04-18T12:55:00Z
10
value 0.00074
scoring_system epss
scoring_elements 0.2226
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50054
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373531
reference_id 2373531
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373531
4
reference_url https://access.redhat.com/errata/RHSA-2022:7110
reference_id RHSA-2022:7110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7110
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2023:0334
reference_id RHSA-2023:0334
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0334
7
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
fixed_packages
aliases CVE-2022-50054
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g5ce-cbh7-w7c8
69
url VCID-g8j3-3ky8-h7av
vulnerability_id VCID-g8j3-3ky8-h7av
summary kernel: KVM: NULL pointer dereference in kvm_irq_delivery_to_apic_fast()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2153.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2153.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2153
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03579
published_at 2026-04-02T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03593
published_at 2026-04-04T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06351
published_at 2026-04-24T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06171
published_at 2026-04-16T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06182
published_at 2026-04-18T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06332
published_at 2026-04-21T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06657
published_at 2026-04-09T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06563
published_at 2026-04-07T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06613
published_at 2026-04-08T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06633
published_at 2026-04-13T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06648
published_at 2026-04-11T12:55:00Z
11
value 0.00024
scoring_system epss
scoring_elements 0.06641
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2153
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
39
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
40
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2069736
reference_id 2069736
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2069736
41
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
42
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
43
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
44
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
45
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
46
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
47
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
48
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
49
reference_url https://usn.ubuntu.com/5727-1/
reference_id USN-5727-1
reference_type
scores
url https://usn.ubuntu.com/5727-1/
50
reference_url https://usn.ubuntu.com/5727-2/
reference_id USN-5727-2
reference_type
scores
url https://usn.ubuntu.com/5727-2/
51
reference_url https://usn.ubuntu.com/5728-1/
reference_id USN-5728-1
reference_type
scores
url https://usn.ubuntu.com/5728-1/
52
reference_url https://usn.ubuntu.com/5728-2/
reference_id USN-5728-2
reference_type
scores
url https://usn.ubuntu.com/5728-2/
53
reference_url https://usn.ubuntu.com/5728-3/
reference_id USN-5728-3
reference_type
scores
url https://usn.ubuntu.com/5728-3/
54
reference_url https://usn.ubuntu.com/5774-1/
reference_id USN-5774-1
reference_type
scores
url https://usn.ubuntu.com/5774-1/
fixed_packages
aliases CVE-2022-2153
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g8j3-3ky8-h7av
70
url VCID-gcuq-w2hp-xubb
vulnerability_id VCID-gcuq-w2hp-xubb
summary kernel: ath9k_htc: fix uninit value bugs
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49235.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49235.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49235
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.05785
published_at 2026-04-04T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.05744
published_at 2026-04-02T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07455
published_at 2026-04-24T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.0741
published_at 2026-04-07T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07465
published_at 2026-04-08T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07488
published_at 2026-04-09T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07481
published_at 2026-04-11T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07469
published_at 2026-04-12T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07457
published_at 2026-04-13T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07381
published_at 2026-04-16T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07367
published_at 2026-04-18T12:55:00Z
11
value 0.00027
scoring_system epss
scoring_elements 0.07495
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49235
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49235
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/0b700f7d06492de34964b6f414120043364f8191
reference_id 0b700f7d06492de34964b6f414120043364f8191
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:46:00Z/
url https://git.kernel.org/stable/c/0b700f7d06492de34964b6f414120043364f8191
5
reference_url https://git.kernel.org/stable/c/11f11ac281f0c0b363d2940204f28bae0422ed71
reference_id 11f11ac281f0c0b363d2940204f28bae0422ed71
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:46:00Z/
url https://git.kernel.org/stable/c/11f11ac281f0c0b363d2940204f28bae0422ed71
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347667
reference_id 2347667
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347667
7
reference_url https://git.kernel.org/stable/c/4d244b731188e0b63fc40a9d2dec72e9181fb37c
reference_id 4d244b731188e0b63fc40a9d2dec72e9181fb37c
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:46:00Z/
url https://git.kernel.org/stable/c/4d244b731188e0b63fc40a9d2dec72e9181fb37c
8
reference_url https://git.kernel.org/stable/c/5abf2b761b998063f5e2bae93fd4ab10e2a80f10
reference_id 5abf2b761b998063f5e2bae93fd4ab10e2a80f10
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:46:00Z/
url https://git.kernel.org/stable/c/5abf2b761b998063f5e2bae93fd4ab10e2a80f10
9
reference_url https://git.kernel.org/stable/c/5c2a6a8daa17a3f65b38b9a5574bb362c13fa1d9
reference_id 5c2a6a8daa17a3f65b38b9a5574bb362c13fa1d9
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:46:00Z/
url https://git.kernel.org/stable/c/5c2a6a8daa17a3f65b38b9a5574bb362c13fa1d9
10
reference_url https://git.kernel.org/stable/c/7da6169b6ebb75816b57be3beb829afa74f3b4b6
reference_id 7da6169b6ebb75816b57be3beb829afa74f3b4b6
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:46:00Z/
url https://git.kernel.org/stable/c/7da6169b6ebb75816b57be3beb829afa74f3b4b6
11
reference_url https://git.kernel.org/stable/c/d1e0df1c57bd30871dd1c855742a7c346dbca853
reference_id d1e0df1c57bd30871dd1c855742a7c346dbca853
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:46:00Z/
url https://git.kernel.org/stable/c/d1e0df1c57bd30871dd1c855742a7c346dbca853
12
reference_url https://git.kernel.org/stable/c/e352acdd378e9263cc4c6018e588f2dac7161d07
reference_id e352acdd378e9263cc4c6018e588f2dac7161d07
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:46:00Z/
url https://git.kernel.org/stable/c/e352acdd378e9263cc4c6018e588f2dac7161d07
13
reference_url https://git.kernel.org/stable/c/ee4222052a76559c20e821bc3519cefb58b6d3e9
reference_id ee4222052a76559c20e821bc3519cefb58b6d3e9
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:46:00Z/
url https://git.kernel.org/stable/c/ee4222052a76559c20e821bc3519cefb58b6d3e9
14
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
15
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49235
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gcuq-w2hp-xubb
71
url VCID-gvxp-zyrr-s7em
vulnerability_id VCID-gvxp-zyrr-s7em
summary kernel: net/smc: Fix NULL pointer dereference in smc_pnet_find_ib()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49060.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49060.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49060
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.02235
published_at 2026-04-24T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02182
published_at 2026-04-12T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.02178
published_at 2026-04-13T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02156
published_at 2026-04-16T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02168
published_at 2026-04-18T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02253
published_at 2026-04-21T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.10351
published_at 2026-04-02T12:55:00Z
7
value 0.00035
scoring_system epss
scoring_elements 0.10417
published_at 2026-04-04T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.19192
published_at 2026-04-11T12:55:00Z
9
value 0.00082
scoring_system epss
scoring_elements 0.2406
published_at 2026-04-09T12:55:00Z
10
value 0.00082
scoring_system epss
scoring_elements 0.23947
published_at 2026-04-07T12:55:00Z
11
value 0.00082
scoring_system epss
scoring_elements 0.24014
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49060
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49060
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49060
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/22025513ced3d599ee8b24169141c95cf2467a4a
reference_id 22025513ced3d599ee8b24169141c95cf2467a4a
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:49:56Z/
url https://git.kernel.org/stable/c/22025513ced3d599ee8b24169141c95cf2467a4a
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348065
reference_id 2348065
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348065
6
reference_url https://git.kernel.org/stable/c/35b91e49bc80ca944a8679c3b139ddaf2f8eea0f
reference_id 35b91e49bc80ca944a8679c3b139ddaf2f8eea0f
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:49:56Z/
url https://git.kernel.org/stable/c/35b91e49bc80ca944a8679c3b139ddaf2f8eea0f
7
reference_url https://git.kernel.org/stable/c/3a523807f01455fe9a0c1a433f27cd4411ee400f
reference_id 3a523807f01455fe9a0c1a433f27cd4411ee400f
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:49:56Z/
url https://git.kernel.org/stable/c/3a523807f01455fe9a0c1a433f27cd4411ee400f
8
reference_url https://git.kernel.org/stable/c/a05f5e26cb8bb4d07e0595545fcad1bb406f0085
reference_id a05f5e26cb8bb4d07e0595545fcad1bb406f0085
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:49:56Z/
url https://git.kernel.org/stable/c/a05f5e26cb8bb4d07e0595545fcad1bb406f0085
9
reference_url https://git.kernel.org/stable/c/d22f4f977236f97e01255a80bca2ea93a8094fc8
reference_id d22f4f977236f97e01255a80bca2ea93a8094fc8
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:49:56Z/
url https://git.kernel.org/stable/c/d22f4f977236f97e01255a80bca2ea93a8094fc8
10
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
11
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49060
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gvxp-zyrr-s7em
72
url VCID-gx5c-b8jv-nqae
vulnerability_id VCID-gx5c-b8jv-nqae
summary kernel: NFSv4: Fix free of uninitialized nfs4_label on referral lookup.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49418.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49418.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49418
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11337
published_at 2026-04-02T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11394
published_at 2026-04-04T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19023
published_at 2026-04-09T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.1903
published_at 2026-04-11T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.18983
published_at 2026-04-12T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.18932
published_at 2026-04-13T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.18886
published_at 2026-04-16T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.18899
published_at 2026-04-18T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.18911
published_at 2026-04-21T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.188
published_at 2026-04-24T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.1889
published_at 2026-04-07T12:55:00Z
11
value 0.00061
scoring_system epss
scoring_elements 0.18969
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49418
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348347
reference_id 2348347
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348347
4
reference_url https://access.redhat.com/errata/RHSA-2022:6003
reference_id RHSA-2022:6003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6003
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49418
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gx5c-b8jv-nqae
73
url VCID-h2wd-jwjk-quhr
vulnerability_id VCID-h2wd-jwjk-quhr
summary kernel: RDMA/nldev: Prevent underflow in nldev_stat_set_counter_dynamic_doit()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49199.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49199.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49199
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08382
published_at 2026-04-04T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08329
published_at 2026-04-02T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.21784
published_at 2026-04-09T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.21795
published_at 2026-04-11T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.21755
published_at 2026-04-12T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.21698
published_at 2026-04-16T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.21705
published_at 2026-04-18T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.21674
published_at 2026-04-21T12:55:00Z
8
value 0.00071
scoring_system epss
scoring_elements 0.21526
published_at 2026-04-24T12:55:00Z
9
value 0.00071
scoring_system epss
scoring_elements 0.21651
published_at 2026-04-07T12:55:00Z
10
value 0.00071
scoring_system epss
scoring_elements 0.21727
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49199
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347806
reference_id 2347806
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347806
4
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49199
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h2wd-jwjk-quhr
74
url VCID-h4y4-y8zk-s3aw
vulnerability_id VCID-h4y4-y8zk-s3aw
summary kernel: ALSA: hda: Fix UAF of leds class devs at unbinding
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48735.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48735.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-48735
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.04859
published_at 2026-04-02T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.05036
published_at 2026-04-24T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.0492
published_at 2026-04-12T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.04901
published_at 2026-04-13T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.0485
published_at 2026-04-16T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.04858
published_at 2026-04-18T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.05006
published_at 2026-04-21T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.04886
published_at 2026-04-04T12:55:00Z
8
value 0.00019
scoring_system epss
scoring_elements 0.04904
published_at 2026-04-07T12:55:00Z
9
value 0.00019
scoring_system epss
scoring_elements 0.0494
published_at 2026-04-11T12:55:00Z
10
value 0.00019
scoring_system epss
scoring_elements 0.04957
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-48735
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48735
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/0e629052f013eeb61494d4df2f1f647c2a9aef47
reference_id 0e629052f013eeb61494d4df2f1f647c2a9aef47
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T17:10:50Z/
url https://git.kernel.org/stable/c/0e629052f013eeb61494d4df2f1f647c2a9aef47
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2293324
reference_id 2293324
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2293324
6
reference_url https://git.kernel.org/stable/c/549f8ffc7b2f7561bea7f90930b6c5104318e87b
reference_id 549f8ffc7b2f7561bea7f90930b6c5104318e87b
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T17:10:50Z/
url https://git.kernel.org/stable/c/549f8ffc7b2f7561bea7f90930b6c5104318e87b
7
reference_url https://git.kernel.org/stable/c/813e9f3e06d22e29872d4fd51b54992d89cf66c8
reference_id 813e9f3e06d22e29872d4fd51b54992d89cf66c8
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T17:10:50Z/
url https://git.kernel.org/stable/c/813e9f3e06d22e29872d4fd51b54992d89cf66c8
8
reference_url https://git.kernel.org/stable/c/a7de1002135cf94367748ffc695a29812d7633b5
reference_id a7de1002135cf94367748ffc695a29812d7633b5
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T17:10:50Z/
url https://git.kernel.org/stable/c/a7de1002135cf94367748ffc695a29812d7633b5
9
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
10
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-48735
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h4y4-y8zk-s3aw
75
url VCID-h5yv-de9v-r3hh
vulnerability_id VCID-h5yv-de9v-r3hh
summary kernel: wifi: rtw89: 8852a: rfk: fix div 0 exception
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50178.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50178.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50178
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04693
published_at 2026-04-02T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04734
published_at 2026-04-04T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04751
published_at 2026-04-13T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04784
published_at 2026-04-08T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04796
published_at 2026-04-09T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04788
published_at 2026-04-11T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04768
published_at 2026-04-12T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.15157
published_at 2026-04-24T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.15058
published_at 2026-04-16T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.15068
published_at 2026-04-18T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.15119
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50178
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373427
reference_id 2373427
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373427
4
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-50178
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h5yv-de9v-r3hh
76
url VCID-hhf3-eu8v-9fds
vulnerability_id VCID-hhf3-eu8v-9fds
summary kernel: dm raid: fix address sanitizer warning in raid_status
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50084.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50084.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50084
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04672
published_at 2026-04-02T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04708
published_at 2026-04-04T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04724
published_at 2026-04-13T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04757
published_at 2026-04-08T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04769
published_at 2026-04-09T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.0476
published_at 2026-04-11T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04741
published_at 2026-04-12T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.15095
published_at 2026-04-24T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.14995
published_at 2026-04-16T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.15005
published_at 2026-04-18T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.15056
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50084
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50084
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50084
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373667
reference_id 2373667
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373667
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-50084
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hhf3-eu8v-9fds
77
url VCID-hnr4-z1a1-1bdu
vulnerability_id VCID-hnr4-z1a1-1bdu
summary kernel: netfilter: use get_random_u32 instead of prandom
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49698.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49698.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49698
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11313
published_at 2026-04-02T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11373
published_at 2026-04-04T12:55:00Z
2
value 0.00115
scoring_system epss
scoring_elements 0.30144
published_at 2026-04-09T12:55:00Z
3
value 0.00115
scoring_system epss
scoring_elements 0.30147
published_at 2026-04-11T12:55:00Z
4
value 0.00115
scoring_system epss
scoring_elements 0.30105
published_at 2026-04-12T12:55:00Z
5
value 0.00115
scoring_system epss
scoring_elements 0.30056
published_at 2026-04-13T12:55:00Z
6
value 0.00115
scoring_system epss
scoring_elements 0.30068
published_at 2026-04-16T12:55:00Z
7
value 0.00115
scoring_system epss
scoring_elements 0.30046
published_at 2026-04-18T12:55:00Z
8
value 0.00115
scoring_system epss
scoring_elements 0.30001
published_at 2026-04-21T12:55:00Z
9
value 0.00115
scoring_system epss
scoring_elements 0.29929
published_at 2026-04-24T12:55:00Z
10
value 0.00115
scoring_system epss
scoring_elements 0.30049
published_at 2026-04-07T12:55:00Z
11
value 0.00115
scoring_system epss
scoring_elements 0.30109
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49698
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49698
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347983
reference_id 2347983
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347983
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
7
reference_url https://usn.ubuntu.com/7990-1/
reference_id USN-7990-1
reference_type
scores
url https://usn.ubuntu.com/7990-1/
8
reference_url https://usn.ubuntu.com/7990-2/
reference_id USN-7990-2
reference_type
scores
url https://usn.ubuntu.com/7990-2/
9
reference_url https://usn.ubuntu.com/7990-3/
reference_id USN-7990-3
reference_type
scores
url https://usn.ubuntu.com/7990-3/
10
reference_url https://usn.ubuntu.com/7990-4/
reference_id USN-7990-4
reference_type
scores
url https://usn.ubuntu.com/7990-4/
11
reference_url https://usn.ubuntu.com/7990-5/
reference_id USN-7990-5
reference_type
scores
url https://usn.ubuntu.com/7990-5/
12
reference_url https://usn.ubuntu.com/7990-6/
reference_id USN-7990-6
reference_type
scores
url https://usn.ubuntu.com/7990-6/
fixed_packages
aliases CVE-2022-49698
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hnr4-z1a1-1bdu
78
url VCID-hnyy-rfkm-abec
vulnerability_id VCID-hnyy-rfkm-abec
summary kernel: NULL pointer dereference in udf_expand_file_adinicbdue() during writeback
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0617.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0617.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0617
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05692
published_at 2026-04-24T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05657
published_at 2026-04-21T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06838
published_at 2026-04-02T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.06866
published_at 2026-04-04T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.06852
published_at 2026-04-07T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.06907
published_at 2026-04-08T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.06938
published_at 2026-04-09T12:55:00Z
7
value 0.00025
scoring_system epss
scoring_elements 0.06935
published_at 2026-04-11T12:55:00Z
8
value 0.00025
scoring_system epss
scoring_elements 0.06927
published_at 2026-04-12T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.06923
published_at 2026-04-13T12:55:00Z
10
value 0.00025
scoring_system epss
scoring_elements 0.06862
published_at 2026-04-16T12:55:00Z
11
value 0.00025
scoring_system epss
scoring_elements 0.06845
published_at 2026-04-18T12:55:00Z
12
value 0.00025
scoring_system epss
scoring_elements 0.0676
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0617
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36310
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25636
55
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
56
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2053632
reference_id 2053632
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2053632
57
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
58
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
59
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
60
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
61
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
62
reference_url https://usn.ubuntu.com/5383-1/
reference_id USN-5383-1
reference_type
scores
url https://usn.ubuntu.com/5383-1/
63
reference_url https://usn.ubuntu.com/5384-1/
reference_id USN-5384-1
reference_type
scores
url https://usn.ubuntu.com/5384-1/
64
reference_url https://usn.ubuntu.com/5385-1/
reference_id USN-5385-1
reference_type
scores
url https://usn.ubuntu.com/5385-1/
65
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
66
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
67
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
fixed_packages
aliases CVE-2022-0617
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hnyy-rfkm-abec
79
url VCID-hwm7-av99-87gg
vulnerability_id VCID-hwm7-av99-87gg
summary kernel: use-after-free when psi trigger is destroyed while being polled
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2938.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2938.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2938
reference_id
reference_type
scores
0
value 0.0003
scoring_system epss
scoring_elements 0.08508
published_at 2026-04-02T12:55:00Z
1
value 0.0003
scoring_system epss
scoring_elements 0.08563
published_at 2026-04-04T12:55:00Z
2
value 0.0003
scoring_system epss
scoring_elements 0.08482
published_at 2026-04-07T12:55:00Z
3
value 0.0003
scoring_system epss
scoring_elements 0.08555
published_at 2026-04-08T12:55:00Z
4
value 0.0003
scoring_system epss
scoring_elements 0.08576
published_at 2026-04-09T12:55:00Z
5
value 0.0003
scoring_system epss
scoring_elements 0.0857
published_at 2026-04-21T12:55:00Z
6
value 0.0003
scoring_system epss
scoring_elements 0.08549
published_at 2026-04-12T12:55:00Z
7
value 0.0003
scoring_system epss
scoring_elements 0.08533
published_at 2026-04-13T12:55:00Z
8
value 0.0003
scoring_system epss
scoring_elements 0.08425
published_at 2026-04-16T12:55:00Z
9
value 0.0003
scoring_system epss
scoring_elements 0.08409
published_at 2026-04-18T12:55:00Z
10
value 0.0003
scoring_system epss
scoring_elements 0.08582
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2938
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2938
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2120175
reference_id 2120175
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2120175
5
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
6
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
7
reference_url https://access.redhat.com/errata/RHSA-2024:1188
reference_id RHSA-2024:1188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1188
fixed_packages
aliases CVE-2022-2938
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hwm7-av99-87gg
80
url VCID-j9ry-7pb3-27ff
vulnerability_id VCID-j9ry-7pb3-27ff
summary kernel: ALSA: jack: Access input_dev under mutex
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49538.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49538.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49538
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07569
published_at 2026-04-04T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07529
published_at 2026-04-02T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12526
published_at 2026-04-24T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12478
published_at 2026-04-07T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.12556
published_at 2026-04-08T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.12607
published_at 2026-04-09T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12575
published_at 2026-04-11T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.12534
published_at 2026-04-12T12:55:00Z
8
value 0.00041
scoring_system epss
scoring_elements 0.12495
published_at 2026-04-13T12:55:00Z
9
value 0.00041
scoring_system epss
scoring_elements 0.12398
published_at 2026-04-16T12:55:00Z
10
value 0.00041
scoring_system epss
scoring_elements 0.12403
published_at 2026-04-18T12:55:00Z
11
value 0.00041
scoring_system epss
scoring_elements 0.12518
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49538
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49538
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/1b6a6fc5280e97559287b61eade2d4b363e836f2
reference_id 1b6a6fc5280e97559287b61eade2d4b363e836f2
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:37:42Z/
url https://git.kernel.org/stable/c/1b6a6fc5280e97559287b61eade2d4b363e836f2
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347946
reference_id 2347946
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347946
6
reference_url https://git.kernel.org/stable/c/582aea6084cc59fec881204f026816d1219f2348
reference_id 582aea6084cc59fec881204f026816d1219f2348
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:37:42Z/
url https://git.kernel.org/stable/c/582aea6084cc59fec881204f026816d1219f2348
7
reference_url https://git.kernel.org/stable/c/5cc6f623f4818c7d7e9e966a45ebf324901ca9c5
reference_id 5cc6f623f4818c7d7e9e966a45ebf324901ca9c5
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:37:42Z/
url https://git.kernel.org/stable/c/5cc6f623f4818c7d7e9e966a45ebf324901ca9c5
8
reference_url https://git.kernel.org/stable/c/74bab3bcf422593c582e47130aa8eb41ebb2dc09
reference_id 74bab3bcf422593c582e47130aa8eb41ebb2dc09
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:37:42Z/
url https://git.kernel.org/stable/c/74bab3bcf422593c582e47130aa8eb41ebb2dc09
9
reference_url https://git.kernel.org/stable/c/8487a88136d54a1a4d3f26f1399685db648ab879
reference_id 8487a88136d54a1a4d3f26f1399685db648ab879
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:37:42Z/
url https://git.kernel.org/stable/c/8487a88136d54a1a4d3f26f1399685db648ab879
10
reference_url https://git.kernel.org/stable/c/9e6a73b0c0f2014eb89249fb1640c5a3d58221c4
reference_id 9e6a73b0c0f2014eb89249fb1640c5a3d58221c4
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:37:42Z/
url https://git.kernel.org/stable/c/9e6a73b0c0f2014eb89249fb1640c5a3d58221c4
11
reference_url https://git.kernel.org/stable/c/c093b62c40027c21d649c5534ad7aa3605a99b00
reference_id c093b62c40027c21d649c5534ad7aa3605a99b00
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:37:42Z/
url https://git.kernel.org/stable/c/c093b62c40027c21d649c5534ad7aa3605a99b00
12
reference_url https://git.kernel.org/stable/c/e2b8681769f6e205382f026b907d28aa5ec9d59a
reference_id e2b8681769f6e205382f026b907d28aa5ec9d59a
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:37:42Z/
url https://git.kernel.org/stable/c/e2b8681769f6e205382f026b907d28aa5ec9d59a
13
reference_url https://git.kernel.org/stable/c/f68bed124c7699e23ffb4ce4fcc84671e9193cde
reference_id f68bed124c7699e23ffb4ce4fcc84671e9193cde
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:37:42Z/
url https://git.kernel.org/stable/c/f68bed124c7699e23ffb4ce4fcc84671e9193cde
14
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
15
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49538
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j9ry-7pb3-27ff
81
url VCID-jar8-nqnp-pqbw
vulnerability_id VCID-jar8-nqnp-pqbw
summary kernel: KVM: x86: Drop WARNs that assert a triple fault never "escapes" from L2
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49559.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49559.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49559
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10785
published_at 2026-04-02T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10848
published_at 2026-04-04T12:55:00Z
2
value 0.00039
scoring_system epss
scoring_elements 0.11704
published_at 2026-04-09T12:55:00Z
3
value 0.00039
scoring_system epss
scoring_elements 0.11716
published_at 2026-04-11T12:55:00Z
4
value 0.00039
scoring_system epss
scoring_elements 0.11679
published_at 2026-04-12T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.11653
published_at 2026-04-13T12:55:00Z
6
value 0.00039
scoring_system epss
scoring_elements 0.1151
published_at 2026-04-16T12:55:00Z
7
value 0.00039
scoring_system epss
scoring_elements 0.11514
published_at 2026-04-18T12:55:00Z
8
value 0.00039
scoring_system epss
scoring_elements 0.11637
published_at 2026-04-21T12:55:00Z
9
value 0.00039
scoring_system epss
scoring_elements 0.11594
published_at 2026-04-24T12:55:00Z
10
value 0.00039
scoring_system epss
scoring_elements 0.11564
published_at 2026-04-07T12:55:00Z
11
value 0.00039
scoring_system epss
scoring_elements 0.1165
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49559
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348281
reference_id 2348281
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348281
4
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49559
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jar8-nqnp-pqbw
82
url VCID-jdjk-pv6p-skct
vulnerability_id VCID-jdjk-pv6p-skct
summary kernel: scsi: qla2xxx: Fix crash during module load unload test
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49160.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49160.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49160
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10785
published_at 2026-04-02T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10848
published_at 2026-04-04T12:55:00Z
2
value 0.0008
scoring_system epss
scoring_elements 0.2376
published_at 2026-04-09T12:55:00Z
3
value 0.0008
scoring_system epss
scoring_elements 0.23775
published_at 2026-04-11T12:55:00Z
4
value 0.0008
scoring_system epss
scoring_elements 0.23731
published_at 2026-04-12T12:55:00Z
5
value 0.0008
scoring_system epss
scoring_elements 0.23675
published_at 2026-04-13T12:55:00Z
6
value 0.0008
scoring_system epss
scoring_elements 0.23687
published_at 2026-04-16T12:55:00Z
7
value 0.0008
scoring_system epss
scoring_elements 0.23677
published_at 2026-04-18T12:55:00Z
8
value 0.0008
scoring_system epss
scoring_elements 0.23656
published_at 2026-04-21T12:55:00Z
9
value 0.0008
scoring_system epss
scoring_elements 0.23544
published_at 2026-04-24T12:55:00Z
10
value 0.0008
scoring_system epss
scoring_elements 0.23644
published_at 2026-04-07T12:55:00Z
11
value 0.0008
scoring_system epss
scoring_elements 0.23713
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49160
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49160
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49160
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347673
reference_id 2347673
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347673
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49160
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jdjk-pv6p-skct
83
url VCID-jv67-34h2-wbfj
vulnerability_id VCID-jv67-34h2-wbfj
summary kernel: ext4: fix bug_on in ext4_writepages
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49347.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49347.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49347
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06177
published_at 2026-04-02T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06208
published_at 2026-04-04T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.08422
published_at 2026-04-09T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.08413
published_at 2026-04-11T12:55:00Z
4
value 0.00029
scoring_system epss
scoring_elements 0.08393
published_at 2026-04-12T12:55:00Z
5
value 0.00029
scoring_system epss
scoring_elements 0.08378
published_at 2026-04-13T12:55:00Z
6
value 0.00029
scoring_system epss
scoring_elements 0.08271
published_at 2026-04-16T12:55:00Z
7
value 0.00029
scoring_system epss
scoring_elements 0.08253
published_at 2026-04-18T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08414
published_at 2026-04-21T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.08384
published_at 2026-04-24T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08334
published_at 2026-04-07T12:55:00Z
11
value 0.00029
scoring_system epss
scoring_elements 0.08405
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49347
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49347
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347821
reference_id 2347821
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347821
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49347
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jv67-34h2-wbfj
84
url VCID-jypn-zeph-bbha
vulnerability_id VCID-jypn-zeph-bbha
summary kernel: sfc: fix kernel panic when creating VF
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49625.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49625.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49625
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.02883
published_at 2026-04-04T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.02868
published_at 2026-04-02T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07592
published_at 2026-04-24T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07504
published_at 2026-04-18T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07645
published_at 2026-04-21T12:55:00Z
5
value 0.00031
scoring_system epss
scoring_elements 0.08823
published_at 2026-04-07T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.10047
published_at 2026-04-11T12:55:00Z
7
value 0.00034
scoring_system epss
scoring_elements 0.10007
published_at 2026-04-12T12:55:00Z
8
value 0.00034
scoring_system epss
scoring_elements 0.09985
published_at 2026-04-13T12:55:00Z
9
value 0.00034
scoring_system epss
scoring_elements 0.0986
published_at 2026-04-16T12:55:00Z
10
value 0.00034
scoring_system epss
scoring_elements 0.09982
published_at 2026-04-08T12:55:00Z
11
value 0.00034
scoring_system epss
scoring_elements 0.10031
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49625
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49625
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49625
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348265
reference_id 2348265
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348265
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49625
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jypn-zeph-bbha
85
url VCID-k4ge-b7mv-8fcv
vulnerability_id VCID-k4ge-b7mv-8fcv
summary kernel: x86/speculation: Fill RSB on vmexit for IBRS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49611.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49611.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49611
reference_id
reference_type
scores
0
value 0.00028
scoring_system epss
scoring_elements 0.08046
published_at 2026-04-02T12:55:00Z
1
value 0.00028
scoring_system epss
scoring_elements 0.08089
published_at 2026-04-04T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.15137
published_at 2026-04-09T12:55:00Z
3
value 0.00049
scoring_system epss
scoring_elements 0.15103
published_at 2026-04-11T12:55:00Z
4
value 0.00049
scoring_system epss
scoring_elements 0.14997
published_at 2026-04-07T12:55:00Z
5
value 0.00049
scoring_system epss
scoring_elements 0.15085
published_at 2026-04-08T12:55:00Z
6
value 0.00049
scoring_system epss
scoring_elements 0.14908
published_at 2026-04-18T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.14962
published_at 2026-04-21T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.15065
published_at 2026-04-12T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.15005
published_at 2026-04-13T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.149
published_at 2026-04-16T12:55:00Z
11
value 0.00055
scoring_system epss
scoring_elements 0.17139
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49611
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49611
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348077
reference_id 2348077
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348077
5
reference_url https://access.redhat.com/errata/RHSA-2022:7110
reference_id RHSA-2022:7110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7110
6
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
7
reference_url https://access.redhat.com/errata/RHSA-2022:8973
reference_id RHSA-2022:8973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8973
fixed_packages
aliases CVE-2022-49611
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k4ge-b7mv-8fcv
86
url VCID-k4hm-xb4b-cbaw
vulnerability_id VCID-k4hm-xb4b-cbaw
summary hw: cpu: arm64: Spectre-BHB
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23960.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23960.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23960
reference_id
reference_type
scores
0
value 0.00195
scoring_system epss
scoring_elements 0.41419
published_at 2026-04-02T12:55:00Z
1
value 0.00195
scoring_system epss
scoring_elements 0.41447
published_at 2026-04-04T12:55:00Z
2
value 0.00195
scoring_system epss
scoring_elements 0.41375
published_at 2026-04-07T12:55:00Z
3
value 0.00195
scoring_system epss
scoring_elements 0.41425
published_at 2026-04-08T12:55:00Z
4
value 0.00195
scoring_system epss
scoring_elements 0.41433
published_at 2026-04-09T12:55:00Z
5
value 0.00195
scoring_system epss
scoring_elements 0.41453
published_at 2026-04-11T12:55:00Z
6
value 0.00195
scoring_system epss
scoring_elements 0.41421
published_at 2026-04-18T12:55:00Z
7
value 0.00195
scoring_system epss
scoring_elements 0.41406
published_at 2026-04-13T12:55:00Z
8
value 0.00195
scoring_system epss
scoring_elements 0.41449
published_at 2026-04-16T12:55:00Z
9
value 0.00195
scoring_system epss
scoring_elements 0.41348
published_at 2026-04-21T12:55:00Z
10
value 0.00195
scoring_system epss
scoring_elements 0.41239
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23960
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
39
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
40
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2062284
reference_id 2062284
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2062284
41
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
42
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
43
reference_url https://usn.ubuntu.com/5317-1/
reference_id USN-5317-1
reference_type
scores
url https://usn.ubuntu.com/5317-1/
44
reference_url https://usn.ubuntu.com/5318-1/
reference_id USN-5318-1
reference_type
scores
url https://usn.ubuntu.com/5318-1/
45
reference_url https://usn.ubuntu.com/5362-1/
reference_id USN-5362-1
reference_type
scores
url https://usn.ubuntu.com/5362-1/
fixed_packages
aliases CVE-2022-23960
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k4hm-xb4b-cbaw
87
url VCID-k883-unu8-1fhx
vulnerability_id VCID-k883-unu8-1fhx
summary kernel: block: don't delete queue kobject before its children
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49259.json
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49259.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49259
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01352
published_at 2026-04-24T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01256
published_at 2026-04-16T12:55:00Z
2
value 0.00011
scoring_system epss
scoring_elements 0.01269
published_at 2026-04-18T12:55:00Z
3
value 0.00011
scoring_system epss
scoring_elements 0.01344
published_at 2026-04-21T12:55:00Z
4
value 0.00011
scoring_system epss
scoring_elements 0.01276
published_at 2026-04-07T12:55:00Z
5
value 0.00011
scoring_system epss
scoring_elements 0.01281
published_at 2026-04-08T12:55:00Z
6
value 0.00011
scoring_system epss
scoring_elements 0.01285
published_at 2026-04-09T12:55:00Z
7
value 0.00011
scoring_system epss
scoring_elements 0.01267
published_at 2026-04-11T12:55:00Z
8
value 0.00011
scoring_system epss
scoring_elements 0.01262
published_at 2026-04-12T12:55:00Z
9
value 0.00011
scoring_system epss
scoring_elements 0.01265
published_at 2026-04-13T12:55:00Z
10
value 0.00052
scoring_system epss
scoring_elements 0.16388
published_at 2026-04-02T12:55:00Z
11
value 0.00052
scoring_system epss
scoring_elements 0.1645
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49259
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49259
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49259
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348360
reference_id 2348360
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348360
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49259
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k883-unu8-1fhx
88
url VCID-kp8q-4wu1-xkbs
vulnerability_id VCID-kp8q-4wu1-xkbs
summary kernel: ASoC: rt711-sdca: fix kernel NULL pointer dereference when IO error
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49615.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49615.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49615
reference_id
reference_type
scores
0
value 0.00047
scoring_system epss
scoring_elements 0.1462
published_at 2026-04-04T12:55:00Z
1
value 0.00047
scoring_system epss
scoring_elements 0.1455
published_at 2026-04-02T12:55:00Z
2
value 0.00125
scoring_system epss
scoring_elements 0.31467
published_at 2026-04-24T12:55:00Z
3
value 0.00125
scoring_system epss
scoring_elements 0.31739
published_at 2026-04-09T12:55:00Z
4
value 0.00125
scoring_system epss
scoring_elements 0.31742
published_at 2026-04-11T12:55:00Z
5
value 0.00125
scoring_system epss
scoring_elements 0.31702
published_at 2026-04-12T12:55:00Z
6
value 0.00125
scoring_system epss
scoring_elements 0.31666
published_at 2026-04-13T12:55:00Z
7
value 0.00125
scoring_system epss
scoring_elements 0.31699
published_at 2026-04-16T12:55:00Z
8
value 0.00125
scoring_system epss
scoring_elements 0.31677
published_at 2026-04-18T12:55:00Z
9
value 0.00125
scoring_system epss
scoring_elements 0.31645
published_at 2026-04-21T12:55:00Z
10
value 0.00125
scoring_system epss
scoring_elements 0.31658
published_at 2026-04-07T12:55:00Z
11
value 0.00125
scoring_system epss
scoring_elements 0.3171
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49615
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://git.kernel.org/stable/c/1df793d479bef546569fc2e409ff8bb3f0fb8e99
reference_id 1df793d479bef546569fc2e409ff8bb3f0fb8e99
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:34:51Z/
url https://git.kernel.org/stable/c/1df793d479bef546569fc2e409ff8bb3f0fb8e99
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347956
reference_id 2347956
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347956
5
reference_url https://git.kernel.org/stable/c/269be8b2907378adf72d7347cfa43ef230351a06
reference_id 269be8b2907378adf72d7347cfa43ef230351a06
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:34:51Z/
url https://git.kernel.org/stable/c/269be8b2907378adf72d7347cfa43ef230351a06
6
reference_url https://git.kernel.org/stable/c/7bb71133cae88d3003a3490b97864af76533072b
reference_id 7bb71133cae88d3003a3490b97864af76533072b
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:34:51Z/
url https://git.kernel.org/stable/c/7bb71133cae88d3003a3490b97864af76533072b
7
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
8
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49615
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kp8q-4wu1-xkbs
89
url VCID-krud-64tx-bqfv
vulnerability_id VCID-krud-64tx-bqfv
summary kernel: iavf: Fix adminq error handling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50055.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50055.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50055
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06223
published_at 2026-04-02T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06263
published_at 2026-04-04T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06244
published_at 2026-04-07T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06289
published_at 2026-04-08T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.0633
published_at 2026-04-09T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06322
published_at 2026-04-11T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06317
published_at 2026-04-12T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06305
published_at 2026-04-13T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.19372
published_at 2026-04-24T12:55:00Z
9
value 0.00063
scoring_system epss
scoring_elements 0.19459
published_at 2026-04-16T12:55:00Z
10
value 0.00063
scoring_system epss
scoring_elements 0.19468
published_at 2026-04-18T12:55:00Z
11
value 0.00063
scoring_system epss
scoring_elements 0.1948
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50055
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50055
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50055
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373670
reference_id 2373670
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373670
5
reference_url https://access.redhat.com/errata/RHSA-2022:7110
reference_id RHSA-2022:7110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7110
6
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
7
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
fixed_packages
aliases CVE-2022-50055
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-krud-64tx-bqfv
90
url VCID-m1yb-dke2-xkb4
vulnerability_id VCID-m1yb-dke2-xkb4
summary kernel: RDMA/hfi1: Prevent use of lock before it is initialized
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49433.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49433.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49433
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.1049
published_at 2026-04-04T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10422
published_at 2026-04-02T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.14406
published_at 2026-04-24T12:55:00Z
3
value 0.00059
scoring_system epss
scoring_elements 0.18377
published_at 2026-04-07T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.18459
published_at 2026-04-08T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.18511
published_at 2026-04-09T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.18512
published_at 2026-04-11T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.18464
published_at 2026-04-12T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.18413
published_at 2026-04-13T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.18357
published_at 2026-04-16T12:55:00Z
10
value 0.00059
scoring_system epss
scoring_elements 0.1837
published_at 2026-04-18T12:55:00Z
11
value 0.00059
scoring_system epss
scoring_elements 0.18395
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49433
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49433
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348214
reference_id 2348214
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348214
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49433
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m1yb-dke2-xkb4
91
url VCID-m5ak-dw88-t3hk
vulnerability_id VCID-m5ak-dw88-t3hk
summary kernel: vmxnet3: use-after-free in vmxnet3_rq_alloc_rx_buf()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4387.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4387.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4387
reference_id
reference_type
scores
0
value 9e-05
scoring_system epss
scoring_elements 0.00928
published_at 2026-04-02T12:55:00Z
1
value 9e-05
scoring_system epss
scoring_elements 0.00929
published_at 2026-04-04T12:55:00Z
2
value 9e-05
scoring_system epss
scoring_elements 0.00932
published_at 2026-04-09T12:55:00Z
3
value 9e-05
scoring_system epss
scoring_elements 0.00936
published_at 2026-04-08T12:55:00Z
4
value 9e-05
scoring_system epss
scoring_elements 0.00921
published_at 2026-04-18T12:55:00Z
5
value 9e-05
scoring_system epss
scoring_elements 0.00916
published_at 2026-04-12T12:55:00Z
6
value 9e-05
scoring_system epss
scoring_elements 0.00917
published_at 2026-04-13T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.00914
published_at 2026-04-16T12:55:00Z
8
value 9e-05
scoring_system epss
scoring_elements 0.00972
published_at 2026-04-21T12:55:00Z
9
value 9e-05
scoring_system epss
scoring_elements 0.00974
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4387
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4387
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4387
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2219270
reference_id 2219270
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2219270
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
7
reference_url https://usn.ubuntu.com/6388-1/
reference_id USN-6388-1
reference_type
scores
url https://usn.ubuntu.com/6388-1/
fixed_packages
aliases CVE-2023-4387
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m5ak-dw88-t3hk
92
url VCID-n8pj-dxe6-hkc9
vulnerability_id VCID-n8pj-dxe6-hkc9
summary kernel: dm integrity: fix memory corruption when tag_size is less than digest size
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49044.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49044.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49044
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02708
published_at 2026-04-24T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03736
published_at 2026-04-12T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03709
published_at 2026-04-13T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03819
published_at 2026-04-21T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03698
published_at 2026-04-18T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03687
published_at 2026-04-16T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03757
published_at 2026-04-11T12:55:00Z
7
value 0.00062
scoring_system epss
scoring_elements 0.19528
published_at 2026-04-02T12:55:00Z
8
value 0.00062
scoring_system epss
scoring_elements 0.19575
published_at 2026-04-04T12:55:00Z
9
value 0.00072
scoring_system epss
scoring_elements 0.22124
published_at 2026-04-09T12:55:00Z
10
value 0.00072
scoring_system epss
scoring_elements 0.22068
published_at 2026-04-08T12:55:00Z
11
value 0.00072
scoring_system epss
scoring_elements 0.21988
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49044
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49044
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49044
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348282
reference_id 2348282
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348282
5
reference_url https://access.redhat.com/errata/RHSA-2022:5249
reference_id RHSA-2022:5249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5249
6
reference_url https://access.redhat.com/errata/RHSA-2022:5564
reference_id RHSA-2022:5564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5564
7
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
fixed_packages
aliases CVE-2022-49044
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n8pj-dxe6-hkc9
93
url VCID-nssg-bpjj-d3be
vulnerability_id VCID-nssg-bpjj-d3be
summary kernel: KVM: x86/mmu: make apf token non-zero to fix bug
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48943.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48943.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-48943
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.0739
published_at 2026-04-16T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07464
published_at 2026-04-24T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.0749
published_at 2026-04-11T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07478
published_at 2026-04-12T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07466
published_at 2026-04-13T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07376
published_at 2026-04-18T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07505
published_at 2026-04-21T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07434
published_at 2026-04-04T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07416
published_at 2026-04-07T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07472
published_at 2026-04-08T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07496
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-48943
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48943
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48943
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2307199
reference_id 2307199
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2307199
5
reference_url https://git.kernel.org/stable/c/4c3644b6c96c5daa5149e5abddc07234eea47c7c
reference_id 4c3644b6c96c5daa5149e5abddc07234eea47c7c
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:33:08Z/
url https://git.kernel.org/stable/c/4c3644b6c96c5daa5149e5abddc07234eea47c7c
6
reference_url https://git.kernel.org/stable/c/62040f5cd7d937de547836e747b6aa8212fec573
reference_id 62040f5cd7d937de547836e747b6aa8212fec573
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:33:08Z/
url https://git.kernel.org/stable/c/62040f5cd7d937de547836e747b6aa8212fec573
7
reference_url https://git.kernel.org/stable/c/6f3c1fc53d86d580d8d6d749c4af23705e4f6f79
reference_id 6f3c1fc53d86d580d8d6d749c4af23705e4f6f79
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:33:08Z/
url https://git.kernel.org/stable/c/6f3c1fc53d86d580d8d6d749c4af23705e4f6f79
8
reference_url https://git.kernel.org/stable/c/72fdfc75d4217b32363cc80def3de2cb3fef3f02
reference_id 72fdfc75d4217b32363cc80def3de2cb3fef3f02
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:33:08Z/
url https://git.kernel.org/stable/c/72fdfc75d4217b32363cc80def3de2cb3fef3f02
9
reference_url https://access.redhat.com/errata/RHSA-2022:6003
reference_id RHSA-2022:6003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6003
10
reference_url https://access.redhat.com/errata/RHSA-2022:6460
reference_id RHSA-2022:6460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6460
11
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
12
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
13
reference_url https://usn.ubuntu.com/7121-1/
reference_id USN-7121-1
reference_type
scores
url https://usn.ubuntu.com/7121-1/
14
reference_url https://usn.ubuntu.com/7121-2/
reference_id USN-7121-2
reference_type
scores
url https://usn.ubuntu.com/7121-2/
15
reference_url https://usn.ubuntu.com/7121-3/
reference_id USN-7121-3
reference_type
scores
url https://usn.ubuntu.com/7121-3/
16
reference_url https://usn.ubuntu.com/7122-1/
reference_id USN-7122-1
reference_type
scores
url https://usn.ubuntu.com/7122-1/
17
reference_url https://usn.ubuntu.com/7148-1/
reference_id USN-7148-1
reference_type
scores
url https://usn.ubuntu.com/7148-1/
18
reference_url https://usn.ubuntu.com/7159-1/
reference_id USN-7159-1
reference_type
scores
url https://usn.ubuntu.com/7159-1/
19
reference_url https://usn.ubuntu.com/7159-2/
reference_id USN-7159-2
reference_type
scores
url https://usn.ubuntu.com/7159-2/
20
reference_url https://usn.ubuntu.com/7159-3/
reference_id USN-7159-3
reference_type
scores
url https://usn.ubuntu.com/7159-3/
21
reference_url https://usn.ubuntu.com/7159-4/
reference_id USN-7159-4
reference_type
scores
url https://usn.ubuntu.com/7159-4/
22
reference_url https://usn.ubuntu.com/7159-5/
reference_id USN-7159-5
reference_type
scores
url https://usn.ubuntu.com/7159-5/
23
reference_url https://usn.ubuntu.com/7195-1/
reference_id USN-7195-1
reference_type
scores
url https://usn.ubuntu.com/7195-1/
24
reference_url https://usn.ubuntu.com/7195-2/
reference_id USN-7195-2
reference_type
scores
url https://usn.ubuntu.com/7195-2/
fixed_packages
aliases CVE-2022-48943
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nssg-bpjj-d3be
94
url VCID-p1h2-jzsz-7fau
vulnerability_id VCID-p1h2-jzsz-7fau
summary kernel: scsi: lpfc: Fix call trace observed during I/O with CMF enabled
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49537.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49537.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49537
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08267
published_at 2026-04-02T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08319
published_at 2026-04-04T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22679
published_at 2026-04-09T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22697
published_at 2026-04-11T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22656
published_at 2026-04-12T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.226
published_at 2026-04-13T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.22615
published_at 2026-04-16T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22612
published_at 2026-04-18T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22561
published_at 2026-04-21T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.22409
published_at 2026-04-24T12:55:00Z
10
value 0.00075
scoring_system epss
scoring_elements 0.2255
published_at 2026-04-07T12:55:00Z
11
value 0.00075
scoring_system epss
scoring_elements 0.22627
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49537
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348079
reference_id 2348079
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348079
4
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49537
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p1h2-jzsz-7fau
95
url VCID-pv2y-hzvr-hyad
vulnerability_id VCID-pv2y-hzvr-hyad
summary kernel: double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28390.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28390.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-28390
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03085
published_at 2026-04-24T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.02991
published_at 2026-04-12T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.02982
published_at 2026-04-13T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.02959
published_at 2026-04-16T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.02969
published_at 2026-04-18T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03089
published_at 2026-04-21T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.03007
published_at 2026-04-02T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03021
published_at 2026-04-04T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.03026
published_at 2026-04-07T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03028
published_at 2026-04-08T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03052
published_at 2026-04-09T12:55:00Z
11
value 0.00015
scoring_system epss
scoring_elements 0.03015
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-28390
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
42
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
43
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2073064
reference_id 2073064
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2073064
44
reference_url https://security.archlinux.org/AVG-2698
reference_id AVG-2698
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2698
45
reference_url https://security.archlinux.org/AVG-2699
reference_id AVG-2699
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2699
46
reference_url https://security.archlinux.org/AVG-2700
reference_id AVG-2700
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2700
47
reference_url https://security.archlinux.org/AVG-2701
reference_id AVG-2701
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2701
48
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
49
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
50
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
51
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
52
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
53
reference_url https://usn.ubuntu.com/5413-1/
reference_id USN-5413-1
reference_type
scores
url https://usn.ubuntu.com/5413-1/
54
reference_url https://usn.ubuntu.com/5416-1/
reference_id USN-5416-1
reference_type
scores
url https://usn.ubuntu.com/5416-1/
55
reference_url https://usn.ubuntu.com/5466-1/
reference_id USN-5466-1
reference_type
scores
url https://usn.ubuntu.com/5466-1/
56
reference_url https://usn.ubuntu.com/5467-1/
reference_id USN-5467-1
reference_type
scores
url https://usn.ubuntu.com/5467-1/
57
reference_url https://usn.ubuntu.com/5468-1/
reference_id USN-5468-1
reference_type
scores
url https://usn.ubuntu.com/5468-1/
58
reference_url https://usn.ubuntu.com/5469-1/
reference_id USN-5469-1
reference_type
scores
url https://usn.ubuntu.com/5469-1/
fixed_packages
aliases CVE-2022-28390
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pv2y-hzvr-hyad
96
url VCID-qhc3-ffew-q7at
vulnerability_id VCID-qhc3-ffew-q7at
summary kernel: scsi: lpfc: Fix SCSI I/O completion and abort handler deadlock
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49536.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49536.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49536
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06014
published_at 2026-04-02T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.0605
published_at 2026-04-04T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.16069
published_at 2026-04-07T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.18085
published_at 2026-04-24T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.18234
published_at 2026-04-08T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18288
published_at 2026-04-09T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.18291
published_at 2026-04-11T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18244
published_at 2026-04-12T12:55:00Z
8
value 0.00058
scoring_system epss
scoring_elements 0.18193
published_at 2026-04-13T12:55:00Z
9
value 0.00058
scoring_system epss
scoring_elements 0.18137
published_at 2026-04-16T12:55:00Z
10
value 0.00058
scoring_system epss
scoring_elements 0.18149
published_at 2026-04-18T12:55:00Z
11
value 0.00058
scoring_system epss
scoring_elements 0.18175
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49536
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49536
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49536
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/03cbbd7c2f5ee288f648f4aeedc765a181188553
reference_id 03cbbd7c2f5ee288f648f4aeedc765a181188553
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:37:45Z/
url https://git.kernel.org/stable/c/03cbbd7c2f5ee288f648f4aeedc765a181188553
5
reference_url https://git.kernel.org/stable/c/0c4eed901285b9cae36a622f32bea3e92490da6c
reference_id 0c4eed901285b9cae36a622f32bea3e92490da6c
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:37:45Z/
url https://git.kernel.org/stable/c/0c4eed901285b9cae36a622f32bea3e92490da6c
6
reference_url https://git.kernel.org/stable/c/21c0d469349957b5dc811c41200a2a998996ca8d
reference_id 21c0d469349957b5dc811c41200a2a998996ca8d
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:37:45Z/
url https://git.kernel.org/stable/c/21c0d469349957b5dc811c41200a2a998996ca8d
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347847
reference_id 2347847
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347847
8
reference_url https://git.kernel.org/stable/c/7625e81de2164a082810e1f27547d388406da610
reference_id 7625e81de2164a082810e1f27547d388406da610
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:37:45Z/
url https://git.kernel.org/stable/c/7625e81de2164a082810e1f27547d388406da610
9
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
10
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49536
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qhc3-ffew-q7at
97
url VCID-qjqg-pjdb-mfch
vulnerability_id VCID-qjqg-pjdb-mfch
summary kernel: Linux kernel: Device Mapper RAID out-of-bounds access
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49674.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49674.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49674
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.0481
published_at 2026-04-02T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.04836
published_at 2026-04-04T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.04853
published_at 2026-04-07T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.04891
published_at 2026-04-08T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.05204
published_at 2026-04-09T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.0489
published_at 2026-04-11T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.0487
published_at 2026-04-12T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.0485
published_at 2026-04-13T12:55:00Z
8
value 0.00019
scoring_system epss
scoring_elements 0.04798
published_at 2026-04-16T12:55:00Z
9
value 0.00019
scoring_system epss
scoring_elements 0.04807
published_at 2026-04-18T12:55:00Z
10
value 0.00019
scoring_system epss
scoring_elements 0.04951
published_at 2026-04-21T12:55:00Z
11
value 0.00019
scoring_system epss
scoring_elements 0.04985
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49674
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49674
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347967
reference_id 2347967
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347967
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2026:6953
reference_id RHSA-2026:6953
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6953
7
reference_url https://access.redhat.com/errata/RHSA-2026:6961
reference_id RHSA-2026:6961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6961
8
reference_url https://access.redhat.com/errata/RHSA-2026:7003
reference_id RHSA-2026:7003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7003
fixed_packages
aliases CVE-2022-49674
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qjqg-pjdb-mfch
98
url VCID-qmdw-hcza-cycq
vulnerability_id VCID-qmdw-hcza-cycq
summary kernel: use-after-free and memory errors in ext4 when mounting and operating on a corrupted image
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1184.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1184.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1184
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.0628
published_at 2026-04-01T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06313
published_at 2026-04-02T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06346
published_at 2026-04-04T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06327
published_at 2026-04-07T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06374
published_at 2026-04-08T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06416
published_at 2026-04-09T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06409
published_at 2026-04-11T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06403
published_at 2026-04-12T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06392
published_at 2026-04-13T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06332
published_at 2026-04-16T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06343
published_at 2026-04-18T12:55:00Z
11
value 0.00024
scoring_system epss
scoring_elements 0.0649
published_at 2026-04-21T12:55:00Z
12
value 0.00024
scoring_system epss
scoring_elements 0.06503
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1184
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
19
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2070205
reference_id 2070205
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2070205
21
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
22
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
23
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
24
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
25
reference_url https://access.redhat.com/errata/RHSA-2024:1877
reference_id RHSA-2024:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1877
26
reference_url https://usn.ubuntu.com/6221-1/
reference_id USN-6221-1
reference_type
scores
url https://usn.ubuntu.com/6221-1/
27
reference_url https://usn.ubuntu.com/6252-1/
reference_id USN-6252-1
reference_type
scores
url https://usn.ubuntu.com/6252-1/
28
reference_url https://usn.ubuntu.com/6284-1/
reference_id USN-6284-1
reference_type
scores
url https://usn.ubuntu.com/6284-1/
29
reference_url https://usn.ubuntu.com/6301-1/
reference_id USN-6301-1
reference_type
scores
url https://usn.ubuntu.com/6301-1/
30
reference_url https://usn.ubuntu.com/6312-1/
reference_id USN-6312-1
reference_type
scores
url https://usn.ubuntu.com/6312-1/
31
reference_url https://usn.ubuntu.com/6314-1/
reference_id USN-6314-1
reference_type
scores
url https://usn.ubuntu.com/6314-1/
32
reference_url https://usn.ubuntu.com/6331-1/
reference_id USN-6331-1
reference_type
scores
url https://usn.ubuntu.com/6331-1/
33
reference_url https://usn.ubuntu.com/6337-1/
reference_id USN-6337-1
reference_type
scores
url https://usn.ubuntu.com/6337-1/
fixed_packages
aliases CVE-2022-1184
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qmdw-hcza-cycq
99
url VCID-rcv2-9tnc-dqbp
vulnerability_id VCID-rcv2-9tnc-dqbp
summary kernel: drm/virtio: Ensure that objs is not NULL in virtio_gpu_array_put_free()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47657.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47657.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-47657
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10848
published_at 2026-04-04T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10646
published_at 2026-04-01T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.10785
published_at 2026-04-02T12:55:00Z
3
value 0.00054
scoring_system epss
scoring_elements 0.16872
published_at 2026-04-24T12:55:00Z
4
value 0.00054
scoring_system epss
scoring_elements 0.17058
published_at 2026-04-12T12:55:00Z
5
value 0.00054
scoring_system epss
scoring_elements 0.16996
published_at 2026-04-13T12:55:00Z
6
value 0.00054
scoring_system epss
scoring_elements 0.16933
published_at 2026-04-16T12:55:00Z
7
value 0.00054
scoring_system epss
scoring_elements 0.16934
published_at 2026-04-18T12:55:00Z
8
value 0.00054
scoring_system epss
scoring_elements 0.1697
published_at 2026-04-21T12:55:00Z
9
value 0.00071
scoring_system epss
scoring_elements 0.21651
published_at 2026-04-07T12:55:00Z
10
value 0.00071
scoring_system epss
scoring_elements 0.21727
published_at 2026-04-08T12:55:00Z
11
value 0.00071
scoring_system epss
scoring_elements 0.21784
published_at 2026-04-09T12:55:00Z
12
value 0.0008
scoring_system epss
scoring_elements 0.23775
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-47657
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348201
reference_id 2348201
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348201
4
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2021-47657
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rcv2-9tnc-dqbp
100
url VCID-rw9z-gey2-u7bh
vulnerability_id VCID-rw9z-gey2-u7bh
summary kernel: igb: fix a use-after-free issue in igb_clean_tx_ring
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49695.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49695.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49695
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11313
published_at 2026-04-02T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11373
published_at 2026-04-04T12:55:00Z
2
value 0.00091
scoring_system epss
scoring_elements 0.25599
published_at 2026-04-24T12:55:00Z
3
value 0.00091
scoring_system epss
scoring_elements 0.25665
published_at 2026-04-07T12:55:00Z
4
value 0.00091
scoring_system epss
scoring_elements 0.25736
published_at 2026-04-08T12:55:00Z
5
value 0.00091
scoring_system epss
scoring_elements 0.25784
published_at 2026-04-09T12:55:00Z
6
value 0.00091
scoring_system epss
scoring_elements 0.25794
published_at 2026-04-11T12:55:00Z
7
value 0.00091
scoring_system epss
scoring_elements 0.25753
published_at 2026-04-12T12:55:00Z
8
value 0.00091
scoring_system epss
scoring_elements 0.25695
published_at 2026-04-13T12:55:00Z
9
value 0.00091
scoring_system epss
scoring_elements 0.25696
published_at 2026-04-16T12:55:00Z
10
value 0.00091
scoring_system epss
scoring_elements 0.25679
published_at 2026-04-18T12:55:00Z
11
value 0.00091
scoring_system epss
scoring_elements 0.25655
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49695
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49695
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347672
reference_id 2347672
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347672
5
reference_url https://git.kernel.org/stable/c/2af944210dc23d43d8208dafac4df7be7e3c168b
reference_id 2af944210dc23d43d8208dafac4df7be7e3c168b
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:15:05Z/
url https://git.kernel.org/stable/c/2af944210dc23d43d8208dafac4df7be7e3c168b
6
reference_url https://git.kernel.org/stable/c/3f6a57ee8544ec3982f8a3cbcbf4aea7d47eb9ec
reference_id 3f6a57ee8544ec3982f8a3cbcbf4aea7d47eb9ec
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:15:05Z/
url https://git.kernel.org/stable/c/3f6a57ee8544ec3982f8a3cbcbf4aea7d47eb9ec
7
reference_url https://git.kernel.org/stable/c/68a0ed06dcd5d3ea732d011c0b83d66e4791f521
reference_id 68a0ed06dcd5d3ea732d011c0b83d66e4791f521
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:15:05Z/
url https://git.kernel.org/stable/c/68a0ed06dcd5d3ea732d011c0b83d66e4791f521
8
reference_url https://git.kernel.org/stable/c/c12a2c9b1b460ed72e6b3c33aac1ef51b0329b66
reference_id c12a2c9b1b460ed72e6b3c33aac1ef51b0329b66
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:15:05Z/
url https://git.kernel.org/stable/c/c12a2c9b1b460ed72e6b3c33aac1ef51b0329b66
9
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
10
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49695
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rw9z-gey2-u7bh
101
url VCID-rynn-q2u9-v7h1
vulnerability_id VCID-rynn-q2u9-v7h1
summary kernel: vsock: remove vsock from connected table when connect is interrupted by a signal
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48786.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48786.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-48786
reference_id
reference_type
scores
0
value 8e-05
scoring_system epss
scoring_elements 0.00743
published_at 2026-04-02T12:55:00Z
1
value 8e-05
scoring_system epss
scoring_elements 0.0077
published_at 2026-04-24T12:55:00Z
2
value 8e-05
scoring_system epss
scoring_elements 0.0074
published_at 2026-04-04T12:55:00Z
3
value 8e-05
scoring_system epss
scoring_elements 0.00745
published_at 2026-04-07T12:55:00Z
4
value 8e-05
scoring_system epss
scoring_elements 0.00744
published_at 2026-04-08T12:55:00Z
5
value 8e-05
scoring_system epss
scoring_elements 0.00736
published_at 2026-04-09T12:55:00Z
6
value 8e-05
scoring_system epss
scoring_elements 0.00732
published_at 2026-04-11T12:55:00Z
7
value 8e-05
scoring_system epss
scoring_elements 0.00726
published_at 2026-04-16T12:55:00Z
8
value 8e-05
scoring_system epss
scoring_elements 0.0073
published_at 2026-04-18T12:55:00Z
9
value 8e-05
scoring_system epss
scoring_elements 0.00771
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-48786
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48786
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/0bb88f3f7e8d506f3efe46d694964117e20efbfc
reference_id 0bb88f3f7e8d506f3efe46d694964117e20efbfc
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:59:52Z/
url https://git.kernel.org/stable/c/0bb88f3f7e8d506f3efe46d694964117e20efbfc
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2298122
reference_id 2298122
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2298122
6
reference_url https://git.kernel.org/stable/c/2910bcb9f67551a45397735e47b6d456eb8cd549
reference_id 2910bcb9f67551a45397735e47b6d456eb8cd549
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:59:52Z/
url https://git.kernel.org/stable/c/2910bcb9f67551a45397735e47b6d456eb8cd549
7
reference_url https://git.kernel.org/stable/c/5f326fe2aef411a6575628f92bd861463ea91df7
reference_id 5f326fe2aef411a6575628f92bd861463ea91df7
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:59:52Z/
url https://git.kernel.org/stable/c/5f326fe2aef411a6575628f92bd861463ea91df7
8
reference_url https://git.kernel.org/stable/c/787468ee7a435777521d33399d012fd591ae2f94
reference_id 787468ee7a435777521d33399d012fd591ae2f94
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:59:52Z/
url https://git.kernel.org/stable/c/787468ee7a435777521d33399d012fd591ae2f94
9
reference_url https://git.kernel.org/stable/c/87cd1bbd6677411e17369cd4b7389ab1e1fdba44
reference_id 87cd1bbd6677411e17369cd4b7389ab1e1fdba44
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:59:52Z/
url https://git.kernel.org/stable/c/87cd1bbd6677411e17369cd4b7389ab1e1fdba44
10
reference_url https://git.kernel.org/stable/c/addd62a8cb6fa90aa322365c62487da61f6baab8
reference_id addd62a8cb6fa90aa322365c62487da61f6baab8
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:59:52Z/
url https://git.kernel.org/stable/c/addd62a8cb6fa90aa322365c62487da61f6baab8
11
reference_url https://git.kernel.org/stable/c/b9208492fcaecff8f43915529ae34b3bcb03877c
reference_id b9208492fcaecff8f43915529ae34b3bcb03877c
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:59:52Z/
url https://git.kernel.org/stable/c/b9208492fcaecff8f43915529ae34b3bcb03877c
12
reference_url https://git.kernel.org/stable/c/e3b3939fd137aab6d00d54bee0ee9244b286a608
reference_id e3b3939fd137aab6d00d54bee0ee9244b286a608
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:59:52Z/
url https://git.kernel.org/stable/c/e3b3939fd137aab6d00d54bee0ee9244b286a608
13
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
14
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
15
reference_url https://access.redhat.com/errata/RHSA-2024:10273
reference_id RHSA-2024:10273
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10273
16
reference_url https://access.redhat.com/errata/RHSA-2024:6990
reference_id RHSA-2024:6990
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6990
17
reference_url https://access.redhat.com/errata/RHSA-2024:6991
reference_id RHSA-2024:6991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6991
fixed_packages
aliases CVE-2022-48786
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rynn-q2u9-v7h1
102
url VCID-s58d-5gm5-43ck
vulnerability_id VCID-s58d-5gm5-43ck
summary kernel: sfc: fix considering that all channels have TX queues
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49378.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49378.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49378
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10351
published_at 2026-04-02T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10417
published_at 2026-04-04T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20272
published_at 2026-04-09T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20297
published_at 2026-04-11T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.20251
published_at 2026-04-12T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.20192
published_at 2026-04-13T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.20184
published_at 2026-04-16T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.20188
published_at 2026-04-18T12:55:00Z
8
value 0.00065
scoring_system epss
scoring_elements 0.20187
published_at 2026-04-21T12:55:00Z
9
value 0.00065
scoring_system epss
scoring_elements 0.20065
published_at 2026-04-24T12:55:00Z
10
value 0.00065
scoring_system epss
scoring_elements 0.20132
published_at 2026-04-07T12:55:00Z
11
value 0.00065
scoring_system epss
scoring_elements 0.20213
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49378
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49378
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347679
reference_id 2347679
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347679
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49378
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s58d-5gm5-43ck
103
url VCID-sbya-z3j7-jbh3
vulnerability_id VCID-sbya-z3j7-jbh3
summary kernel: udmabuf: validate ubuf->pagecount
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47649.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47649.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-47649
reference_id
reference_type
scores
0
value 0.0001
scoring_system epss
scoring_elements 0.01118
published_at 2026-04-11T12:55:00Z
1
value 0.0001
scoring_system epss
scoring_elements 0.01112
published_at 2026-04-12T12:55:00Z
2
value 0.0001
scoring_system epss
scoring_elements 0.01114
published_at 2026-04-13T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.10422
published_at 2026-04-02T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.1049
published_at 2026-04-04T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10303
published_at 2026-04-01T12:55:00Z
6
value 0.00044
scoring_system epss
scoring_elements 0.13568
published_at 2026-04-09T12:55:00Z
7
value 0.00044
scoring_system epss
scoring_elements 0.13437
published_at 2026-04-07T12:55:00Z
8
value 0.00044
scoring_system epss
scoring_elements 0.13519
published_at 2026-04-08T12:55:00Z
9
value 9e-05
scoring_system epss
scoring_elements 0.00897
published_at 2026-04-16T12:55:00Z
10
value 9e-05
scoring_system epss
scoring_elements 0.00905
published_at 2026-04-18T12:55:00Z
11
value 9e-05
scoring_system epss
scoring_elements 0.00954
published_at 2026-04-21T12:55:00Z
12
value 9e-05
scoring_system epss
scoring_elements 0.00957
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-47649
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47649
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348193
reference_id 2348193
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348193
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2021-47649
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sbya-z3j7-jbh3
104
url VCID-sc7v-2hz2-cfde
vulnerability_id VCID-sc7v-2hz2-cfde
summary kernel: ASoC: SOF: Intel: Fix NULL ptr dereference when ENOMEM
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49268.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49268.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49268
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04924
published_at 2026-04-24T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04736
published_at 2026-04-16T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04746
published_at 2026-04-18T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.0489
published_at 2026-04-21T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04792
published_at 2026-04-07T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04825
published_at 2026-04-11T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04836
published_at 2026-04-09T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04803
published_at 2026-04-12T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04783
published_at 2026-04-13T12:55:00Z
9
value 0.00035
scoring_system epss
scoring_elements 0.10422
published_at 2026-04-02T12:55:00Z
10
value 0.00035
scoring_system epss
scoring_elements 0.1049
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49268
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49268
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348329
reference_id 2348329
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348329
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49268
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sc7v-2hz2-cfde
105
url VCID-sqcc-yf7h-83g7
vulnerability_id VCID-sqcc-yf7h-83g7
summary kernel: NFSD: Fix exposure in nfsd4_decode_bitmap()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47213.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47213.json
1
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2274573
reference_id 2274573
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2274573
2
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
fixed_packages
aliases CVE-2021-47213
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sqcc-yf7h-83g7
106
url VCID-sxuq-3azc-fqa2
vulnerability_id VCID-sxuq-3azc-fqa2
summary kernel: iavf: Fix reset error handling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50053.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50053.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50053
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02662
published_at 2026-04-02T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02691
published_at 2026-04-04T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02699
published_at 2026-04-07T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02701
published_at 2026-04-08T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02722
published_at 2026-04-09T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02695
published_at 2026-04-11T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.0268
published_at 2026-04-12T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02677
published_at 2026-04-13T12:55:00Z
8
value 0.00038
scoring_system epss
scoring_elements 0.11339
published_at 2026-04-24T12:55:00Z
9
value 0.00038
scoring_system epss
scoring_elements 0.11269
published_at 2026-04-16T12:55:00Z
10
value 0.00038
scoring_system epss
scoring_elements 0.1127
published_at 2026-04-18T12:55:00Z
11
value 0.00038
scoring_system epss
scoring_elements 0.11397
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50053
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50053
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373553
reference_id 2373553
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373553
5
reference_url https://access.redhat.com/errata/RHSA-2022:7110
reference_id RHSA-2022:7110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7110
6
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
7
reference_url https://access.redhat.com/errata/RHSA-2023:0334
reference_id RHSA-2023:0334
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0334
8
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
9
reference_url https://access.redhat.com/errata/RHSA-2026:9870
reference_id RHSA-2026:9870
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9870
fixed_packages
aliases CVE-2022-50053
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sxuq-3azc-fqa2
107
url VCID-szsu-zzs2-k7a2
vulnerability_id VCID-szsu-zzs2-k7a2
summary kernel: ath11k: Fix frames flush failure caused by deadlock
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49123.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49123.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49123
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.0683
published_at 2026-04-02T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.06873
published_at 2026-04-04T12:55:00Z
2
value 0.00037
scoring_system epss
scoring_elements 0.11115
published_at 2026-04-13T12:55:00Z
3
value 0.00037
scoring_system epss
scoring_elements 0.10994
published_at 2026-04-18T12:55:00Z
4
value 0.00037
scoring_system epss
scoring_elements 0.11138
published_at 2026-04-12T12:55:00Z
5
value 0.00037
scoring_system epss
scoring_elements 0.1098
published_at 2026-04-16T12:55:00Z
6
value 0.00038
scoring_system epss
scoring_elements 0.11486
published_at 2026-04-21T12:55:00Z
7
value 0.00055
scoring_system epss
scoring_elements 0.17386
published_at 2026-04-11T12:55:00Z
8
value 0.00066
scoring_system epss
scoring_elements 0.20538
published_at 2026-04-09T12:55:00Z
9
value 0.00066
scoring_system epss
scoring_elements 0.2048
published_at 2026-04-08T12:55:00Z
10
value 0.00066
scoring_system epss
scoring_elements 0.20399
published_at 2026-04-07T12:55:00Z
11
value 8e-05
scoring_system epss
scoring_elements 0.0073
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49123
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49123
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348213
reference_id 2348213
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348213
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49123
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-szsu-zzs2-k7a2
108
url VCID-t5af-qk3e-qyfa
vulnerability_id VCID-t5af-qk3e-qyfa
summary kernel: off-path attacker may inject data or terminate victim's TCP session
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36516.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36516.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-36516
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.11899
published_at 2026-04-24T12:55:00Z
1
value 0.00039
scoring_system epss
scoring_elements 0.11814
published_at 2026-04-16T12:55:00Z
2
value 0.00039
scoring_system epss
scoring_elements 0.1181
published_at 2026-04-18T12:55:00Z
3
value 0.00039
scoring_system epss
scoring_elements 0.11929
published_at 2026-04-21T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.12129
published_at 2026-04-04T12:55:00Z
5
value 0.0004
scoring_system epss
scoring_elements 0.12015
published_at 2026-04-08T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.12067
published_at 2026-04-09T12:55:00Z
7
value 0.0004
scoring_system epss
scoring_elements 0.12074
published_at 2026-04-11T12:55:00Z
8
value 0.0004
scoring_system epss
scoring_elements 0.12037
published_at 2026-04-12T12:55:00Z
9
value 0.0004
scoring_system epss
scoring_elements 0.12009
published_at 2026-04-13T12:55:00Z
10
value 0.0004
scoring_system epss
scoring_elements 0.1197
published_at 2026-04-01T12:55:00Z
11
value 0.0004
scoring_system epss
scoring_elements 0.11932
published_at 2026-04-07T12:55:00Z
12
value 0.0004
scoring_system epss
scoring_elements 0.12084
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-36516
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36516
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2059928
reference_id 2059928
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2059928
5
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
6
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
7
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
8
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
9
reference_url https://access.redhat.com/errata/RHSA-2024:2674
reference_id RHSA-2024:2674
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2674
10
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
11
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
12
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
fixed_packages
aliases CVE-2020-36516
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t5af-qk3e-qyfa
109
url VCID-t8e6-h3p4-sfar
vulnerability_id VCID-t8e6-h3p4-sfar
summary kernel: use-after-free in tc_new_tfilter() in net/sched/cls_api.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1055.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1055.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1055
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06456
published_at 2026-04-24T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06301
published_at 2026-04-04T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06278
published_at 2026-04-07T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06324
published_at 2026-04-08T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06364
published_at 2026-04-09T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06357
published_at 2026-04-11T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06351
published_at 2026-04-12T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06341
published_at 2026-04-13T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06279
published_at 2026-04-16T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06292
published_at 2026-04-18T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06441
published_at 2026-04-21T12:55:00Z
11
value 0.00025
scoring_system epss
scoring_elements 0.06979
published_at 2026-04-02T12:55:00Z
12
value 0.00025
scoring_system epss
scoring_elements 0.06875
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1055
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1055
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1055
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://kernel.dance/#04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5
reference_id #04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-21T17:47:41Z/
url https://kernel.dance/#04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2070220
reference_id 2070220
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2070220
6
reference_url https://syzkaller.appspot.com/bug?id=2212474c958978ab86525fe6832ac8102c309ffc
reference_id bug?id=2212474c958978ab86525fe6832ac8102c309ffc
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-21T17:47:41Z/
url https://syzkaller.appspot.com/bug?id=2212474c958978ab86525fe6832ac8102c309ffc
7
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5
reference_id ?id=04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-21T17:47:41Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5
8
reference_url http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html
reference_id Kernel-Live-Patch-Security-Notice-LSN-0086-1.html
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-21T17:47:41Z/
url http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html
9
reference_url https://security.netapp.com/advisory/ntap-20220506-0007/
reference_id ntap-20220506-0007
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-21T17:47:41Z/
url https://security.netapp.com/advisory/ntap-20220506-0007/
10
reference_url https://access.redhat.com/errata/RHSA-2022:6002
reference_id RHSA-2022:6002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6002
11
reference_url https://access.redhat.com/errata/RHSA-2022:6003
reference_id RHSA-2022:6003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6003
12
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
13
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
14
reference_url https://access.redhat.com/errata/RHSA-2024:1188
reference_id RHSA-2024:1188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1188
15
reference_url https://usn.ubuntu.com/5358-1/
reference_id USN-5358-1
reference_type
scores
url https://usn.ubuntu.com/5358-1/
16
reference_url https://usn.ubuntu.com/5358-2/
reference_id USN-5358-2
reference_type
scores
url https://usn.ubuntu.com/5358-2/
17
reference_url https://usn.ubuntu.com/5368-1/
reference_id USN-5368-1
reference_type
scores
url https://usn.ubuntu.com/5368-1/
18
reference_url https://usn.ubuntu.com/5377-1/
reference_id USN-5377-1
reference_type
scores
url https://usn.ubuntu.com/5377-1/
fixed_packages
aliases CVE-2022-1055
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t8e6-h3p4-sfar
110
url VCID-ugae-c268-37de
vulnerability_id VCID-ugae-c268-37de
summary kernel: ALSA: oss: Fix PCM OSS buffer allocation overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49292.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49292.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49292
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02594
published_at 2026-04-24T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02498
published_at 2026-04-16T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02503
published_at 2026-04-18T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02609
published_at 2026-04-21T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02519
published_at 2026-04-07T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02523
published_at 2026-04-08T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02544
published_at 2026-04-09T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02524
published_at 2026-04-11T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02513
published_at 2026-04-12T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02512
published_at 2026-04-13T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08186
published_at 2026-04-02T12:55:00Z
11
value 0.00029
scoring_system epss
scoring_elements 0.08241
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49292
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49292
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49292
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348302
reference_id 2348302
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348302
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49292
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ugae-c268-37de
111
url VCID-uste-4tg4-tbg2
vulnerability_id VCID-uste-4tg4-tbg2
summary kernel: PM: core: keep irq flags in device_pm_check_callbacks()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49175.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49175.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49175
reference_id
reference_type
scores
0
value 0.0001
scoring_system epss
scoring_elements 0.01236
published_at 2026-04-24T12:55:00Z
1
value 0.0001
scoring_system epss
scoring_elements 0.01162
published_at 2026-04-18T12:55:00Z
2
value 0.0001
scoring_system epss
scoring_elements 0.0115
published_at 2026-04-16T12:55:00Z
3
value 0.0001
scoring_system epss
scoring_elements 0.01232
published_at 2026-04-21T12:55:00Z
4
value 0.0001
scoring_system epss
scoring_elements 0.01173
published_at 2026-04-07T12:55:00Z
5
value 0.0001
scoring_system epss
scoring_elements 0.01179
published_at 2026-04-08T12:55:00Z
6
value 0.0001
scoring_system epss
scoring_elements 0.0118
published_at 2026-04-09T12:55:00Z
7
value 0.0001
scoring_system epss
scoring_elements 0.01166
published_at 2026-04-11T12:55:00Z
8
value 0.0001
scoring_system epss
scoring_elements 0.01158
published_at 2026-04-12T12:55:00Z
9
value 0.00052
scoring_system epss
scoring_elements 0.16502
published_at 2026-04-02T12:55:00Z
10
value 0.00052
scoring_system epss
scoring_elements 0.16563
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49175
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49175
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49175
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348314
reference_id 2348314
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348314
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49175
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uste-4tg4-tbg2
112
url VCID-uvqn-vktu-fkdt
vulnerability_id VCID-uvqn-vktu-fkdt
summary kernel: tipc: check attribute length for bearer name
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49374.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49374.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49374
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.1049
published_at 2026-04-04T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10422
published_at 2026-04-02T12:55:00Z
2
value 0.00059
scoring_system epss
scoring_elements 0.18294
published_at 2026-04-24T12:55:00Z
3
value 0.00059
scoring_system epss
scoring_elements 0.18377
published_at 2026-04-07T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.18459
published_at 2026-04-08T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.18511
published_at 2026-04-09T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.18512
published_at 2026-04-11T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.18464
published_at 2026-04-12T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.18413
published_at 2026-04-13T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.18357
published_at 2026-04-16T12:55:00Z
10
value 0.00059
scoring_system epss
scoring_elements 0.1837
published_at 2026-04-18T12:55:00Z
11
value 0.00059
scoring_system epss
scoring_elements 0.18395
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49374
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49374
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347724
reference_id 2347724
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347724
5
reference_url https://git.kernel.org/stable/c/292be63c382ce20673ee61dff1ee9ed4a3dcaae7
reference_id 292be63c382ce20673ee61dff1ee9ed4a3dcaae7
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:42:07Z/
url https://git.kernel.org/stable/c/292be63c382ce20673ee61dff1ee9ed4a3dcaae7
6
reference_url https://git.kernel.org/stable/c/3af15272cde28fe5c8489174b8624e232c1775ec
reference_id 3af15272cde28fe5c8489174b8624e232c1775ec
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:42:07Z/
url https://git.kernel.org/stable/c/3af15272cde28fe5c8489174b8624e232c1775ec
7
reference_url https://git.kernel.org/stable/c/7f36f798f89bf32c0164049cb0e3fd1af613d0bb
reference_id 7f36f798f89bf32c0164049cb0e3fd1af613d0bb
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:42:07Z/
url https://git.kernel.org/stable/c/7f36f798f89bf32c0164049cb0e3fd1af613d0bb
8
reference_url https://git.kernel.org/stable/c/8b91d0dfc839e67708c905648cd0e7507a2263e5
reference_id 8b91d0dfc839e67708c905648cd0e7507a2263e5
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:42:07Z/
url https://git.kernel.org/stable/c/8b91d0dfc839e67708c905648cd0e7507a2263e5
9
reference_url https://git.kernel.org/stable/c/92a930fcf4250fe961f6238b99af0bc405799f39
reference_id 92a930fcf4250fe961f6238b99af0bc405799f39
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:42:07Z/
url https://git.kernel.org/stable/c/92a930fcf4250fe961f6238b99af0bc405799f39
10
reference_url https://git.kernel.org/stable/c/b8fac8e321044a9ac50f7185b4e9d91a7745e4b0
reference_id b8fac8e321044a9ac50f7185b4e9d91a7745e4b0
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:42:07Z/
url https://git.kernel.org/stable/c/b8fac8e321044a9ac50f7185b4e9d91a7745e4b0
11
reference_url https://git.kernel.org/stable/c/f07670871f4d19e613740eebe210e7e9ea535973
reference_id f07670871f4d19e613740eebe210e7e9ea535973
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:42:07Z/
url https://git.kernel.org/stable/c/f07670871f4d19e613740eebe210e7e9ea535973
12
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
13
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49374
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uvqn-vktu-fkdt
113
url VCID-wdrm-2ct7-7bg5
vulnerability_id VCID-wdrm-2ct7-7bg5
summary kernel: hv_netvsc: NULL pointer dereference in netvsc_get_ethtool_stats()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3107.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3107.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3107
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.02106
published_at 2026-04-02T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02109
published_at 2026-04-08T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.02113
published_at 2026-04-04T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02108
published_at 2026-04-07T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02127
published_at 2026-04-09T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02104
published_at 2026-04-11T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02089
published_at 2026-04-12T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02084
published_at 2026-04-13T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02443
published_at 2026-04-16T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.0245
published_at 2026-04-18T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02542
published_at 2026-04-24T12:55:00Z
11
value 0.00014
scoring_system epss
scoring_elements 0.02555
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3107
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3107
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2153060
reference_id 2153060
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T14:19:03Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2153060
5
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=886e44c9298a6b428ae046e2fa092ca52e822e6a
reference_id ?h=v5.19-rc2&id=886e44c9298a6b428ae046e2fa092ca52e822e6a
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T14:19:03Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=886e44c9298a6b428ae046e2fa092ca52e822e6a
6
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
7
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
8
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
9
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-3107
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wdrm-2ct7-7bg5
114
url VCID-wgzq-sfgs-tuae
vulnerability_id VCID-wgzq-sfgs-tuae
summary kernel: ath11k: fix netdev open race
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50187.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50187.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50187
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04629
published_at 2026-04-02T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04663
published_at 2026-04-04T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04676
published_at 2026-04-07T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.0471
published_at 2026-04-08T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04723
published_at 2026-04-09T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04716
published_at 2026-04-11T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04699
published_at 2026-04-12T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04682
published_at 2026-04-13T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.14986
published_at 2026-04-24T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.14886
published_at 2026-04-16T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.14893
published_at 2026-04-18T12:55:00Z
11
value 0.00049
scoring_system epss
scoring_elements 0.14948
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50187
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50187
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373675
reference_id 2373675
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373675
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-50187
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wgzq-sfgs-tuae
115
url VCID-wmj2-k6ca-yyet
vulnerability_id VCID-wmj2-k6ca-yyet
summary kernel: ath11k: mhi: use mhi_sync_power_up()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49130.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49130.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49130
reference_id
reference_type
scores
0
value 0.00052
scoring_system epss
scoring_elements 0.16446
published_at 2026-04-04T12:55:00Z
1
value 0.00052
scoring_system epss
scoring_elements 0.16383
published_at 2026-04-02T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.22943
published_at 2026-04-24T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.23206
published_at 2026-04-12T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.23148
published_at 2026-04-13T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23164
published_at 2026-04-16T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.23156
published_at 2026-04-18T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.23118
published_at 2026-04-21T12:55:00Z
8
value 0.00092
scoring_system epss
scoring_elements 0.25756
published_at 2026-04-07T12:55:00Z
9
value 0.00092
scoring_system epss
scoring_elements 0.25878
published_at 2026-04-09T12:55:00Z
10
value 0.00092
scoring_system epss
scoring_elements 0.25827
published_at 2026-04-08T12:55:00Z
11
value 0.00104
scoring_system epss
scoring_elements 0.28424
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49130
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49130
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49130
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/20d01a11efde2e05e47d5c66101f5c26eaca68e2
reference_id 20d01a11efde2e05e47d5c66101f5c26eaca68e2
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:48:20Z/
url https://git.kernel.org/stable/c/20d01a11efde2e05e47d5c66101f5c26eaca68e2
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348275
reference_id 2348275
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348275
6
reference_url https://git.kernel.org/stable/c/339bd0b55ecdd0f7f341e9357c4cfde799de9418
reference_id 339bd0b55ecdd0f7f341e9357c4cfde799de9418
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:48:20Z/
url https://git.kernel.org/stable/c/339bd0b55ecdd0f7f341e9357c4cfde799de9418
7
reference_url https://git.kernel.org/stable/c/3df6d74aedfdca919cca475d15dfdbc8b05c9e5d
reference_id 3df6d74aedfdca919cca475d15dfdbc8b05c9e5d
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:48:20Z/
url https://git.kernel.org/stable/c/3df6d74aedfdca919cca475d15dfdbc8b05c9e5d
8
reference_url https://git.kernel.org/stable/c/3fd7d50384c3808b7f7fa135aa9bb5feb1cb9849
reference_id 3fd7d50384c3808b7f7fa135aa9bb5feb1cb9849
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:48:20Z/
url https://git.kernel.org/stable/c/3fd7d50384c3808b7f7fa135aa9bb5feb1cb9849
9
reference_url https://git.kernel.org/stable/c/646d533af2911be1184eaee8c900b7eb8ecc4396
reference_id 646d533af2911be1184eaee8c900b7eb8ecc4396
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:48:20Z/
url https://git.kernel.org/stable/c/646d533af2911be1184eaee8c900b7eb8ecc4396
10
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
11
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49130
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wmj2-k6ca-yyet
116
url VCID-wxvj-5nzz-9ybq
vulnerability_id VCID-wxvj-5nzz-9ybq
summary kernel: cifs: fix potential double free during failed mount
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49541.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49541.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49541
reference_id
reference_type
scores
0
value 0.0003
scoring_system epss
scoring_elements 0.08591
published_at 2026-04-02T12:55:00Z
1
value 0.0003
scoring_system epss
scoring_elements 0.08643
published_at 2026-04-04T12:55:00Z
2
value 0.00069
scoring_system epss
scoring_elements 0.21008
published_at 2026-04-24T12:55:00Z
3
value 0.00069
scoring_system epss
scoring_elements 0.21098
published_at 2026-04-07T12:55:00Z
4
value 0.00069
scoring_system epss
scoring_elements 0.21178
published_at 2026-04-08T12:55:00Z
5
value 0.00069
scoring_system epss
scoring_elements 0.21238
published_at 2026-04-09T12:55:00Z
6
value 0.00069
scoring_system epss
scoring_elements 0.21248
published_at 2026-04-11T12:55:00Z
7
value 0.00069
scoring_system epss
scoring_elements 0.21206
published_at 2026-04-12T12:55:00Z
8
value 0.00069
scoring_system epss
scoring_elements 0.21152
published_at 2026-04-13T12:55:00Z
9
value 0.00069
scoring_system epss
scoring_elements 0.21146
published_at 2026-04-16T12:55:00Z
10
value 0.00069
scoring_system epss
scoring_elements 0.21156
published_at 2026-04-18T12:55:00Z
11
value 0.00069
scoring_system epss
scoring_elements 0.21134
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49541
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348119
reference_id 2348119
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348119
4
reference_url https://git.kernel.org/stable/c/8378a51e3f8140f60901fb27208cc7a6e47047b5
reference_id 8378a51e3f8140f60901fb27208cc7a6e47047b5
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T19:37:38Z/
url https://git.kernel.org/stable/c/8378a51e3f8140f60901fb27208cc7a6e47047b5
5
reference_url https://git.kernel.org/stable/c/9a167fc440e5693c1cdd7f07071e05658bd9d89d
reference_id 9a167fc440e5693c1cdd7f07071e05658bd9d89d
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T19:37:38Z/
url https://git.kernel.org/stable/c/9a167fc440e5693c1cdd7f07071e05658bd9d89d
6
reference_url https://git.kernel.org/stable/c/ce0008a0e410cdd95f0d8cd81b2902ec10a660c4
reference_id ce0008a0e410cdd95f0d8cd81b2902ec10a660c4
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T19:37:38Z/
url https://git.kernel.org/stable/c/ce0008a0e410cdd95f0d8cd81b2902ec10a660c4
7
reference_url https://git.kernel.org/stable/c/ee71f8f1cd3c8c4a251fd3e8abc89215ae3457cb
reference_id ee71f8f1cd3c8c4a251fd3e8abc89215ae3457cb
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T19:37:38Z/
url https://git.kernel.org/stable/c/ee71f8f1cd3c8c4a251fd3e8abc89215ae3457cb
8
reference_url https://access.redhat.com/errata/RHSA-2022:5819
reference_id RHSA-2022:5819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5819
9
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
10
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
11
reference_url https://access.redhat.com/errata/RHSA-2025:3838
reference_id RHSA-2025:3838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3838
12
reference_url https://access.redhat.com/errata/RHSA-2025:3839
reference_id RHSA-2025:3839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3839
13
reference_url https://access.redhat.com/errata/RHSA-2025:3961
reference_id RHSA-2025:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3961
fixed_packages
aliases CVE-2022-49541
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wxvj-5nzz-9ybq
117
url VCID-xbaa-2t96-w3dp
vulnerability_id VCID-xbaa-2t96-w3dp
summary kernel: ixgbe: Add locking to prevent panic when setting sriov_numvfs to zero
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49584.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49584.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49584
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07626
published_at 2026-04-02T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07669
published_at 2026-04-04T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19758
published_at 2026-04-09T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19762
published_at 2026-04-11T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.19713
published_at 2026-04-12T12:55:00Z
5
value 0.00063
scoring_system epss
scoring_elements 0.19656
published_at 2026-04-13T12:55:00Z
6
value 0.00063
scoring_system epss
scoring_elements 0.19632
published_at 2026-04-16T12:55:00Z
7
value 0.00063
scoring_system epss
scoring_elements 0.19634
published_at 2026-04-18T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.19648
published_at 2026-04-21T12:55:00Z
9
value 0.00063
scoring_system epss
scoring_elements 0.19539
published_at 2026-04-24T12:55:00Z
10
value 0.00063
scoring_system epss
scoring_elements 0.19627
published_at 2026-04-07T12:55:00Z
11
value 0.00063
scoring_system epss
scoring_elements 0.19707
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49584
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49584
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347764
reference_id 2347764
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347764
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49584
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xbaa-2t96-w3dp
118
url VCID-xm9f-adzk-6bg9
vulnerability_id VCID-xm9f-adzk-6bg9
summary kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36558.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36558.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-36558
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03525
published_at 2026-04-01T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03569
published_at 2026-04-02T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03583
published_at 2026-04-04T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03593
published_at 2026-04-07T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03595
published_at 2026-04-08T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03617
published_at 2026-04-09T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03574
published_at 2026-04-11T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03545
published_at 2026-04-12T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.0352
published_at 2026-04-13T12:55:00Z
9
value 0.00016
scoring_system epss
scoring_elements 0.03495
published_at 2026-04-16T12:55:00Z
10
value 0.00016
scoring_system epss
scoring_elements 0.03507
published_at 2026-04-18T12:55:00Z
11
value 0.00016
scoring_system epss
scoring_elements 0.03632
published_at 2026-04-21T12:55:00Z
12
value 0.00016
scoring_system epss
scoring_elements 0.03638
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-36558
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36558
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2112693
reference_id 2112693
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2112693
5
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
6
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
7
reference_url https://access.redhat.com/errata/RHSA-2023:5627
reference_id RHSA-2023:5627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5627
8
reference_url https://access.redhat.com/errata/RHSA-2024:2003
reference_id RHSA-2024:2003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2003
9
reference_url https://access.redhat.com/errata/RHSA-2024:2004
reference_id RHSA-2024:2004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2004
fixed_packages
aliases CVE-2020-36558
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xm9f-adzk-6bg9
119
url VCID-xt2w-myh3-s7eu
vulnerability_id VCID-xt2w-myh3-s7eu
summary kernel: ASoC: cs35l41: Fix an out-of-bounds access in otp_packed_element_t
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49515.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49515.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49515
reference_id
reference_type
scores
0
value 0.00031
scoring_system epss
scoring_elements 0.08793
published_at 2026-04-02T12:55:00Z
1
value 0.00031
scoring_system epss
scoring_elements 0.08842
published_at 2026-04-04T12:55:00Z
2
value 0.00138
scoring_system epss
scoring_elements 0.33892
published_at 2026-04-09T12:55:00Z
3
value 0.00138
scoring_system epss
scoring_elements 0.33891
published_at 2026-04-11T12:55:00Z
4
value 0.00138
scoring_system epss
scoring_elements 0.33849
published_at 2026-04-12T12:55:00Z
5
value 0.00138
scoring_system epss
scoring_elements 0.33824
published_at 2026-04-13T12:55:00Z
6
value 0.00138
scoring_system epss
scoring_elements 0.33862
published_at 2026-04-16T12:55:00Z
7
value 0.00138
scoring_system epss
scoring_elements 0.33847
published_at 2026-04-18T12:55:00Z
8
value 0.00138
scoring_system epss
scoring_elements 0.33816
published_at 2026-04-21T12:55:00Z
9
value 0.00138
scoring_system epss
scoring_elements 0.33454
published_at 2026-04-24T12:55:00Z
10
value 0.00138
scoring_system epss
scoring_elements 0.33818
published_at 2026-04-07T12:55:00Z
11
value 0.00138
scoring_system epss
scoring_elements 0.3386
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49515
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347879
reference_id 2347879
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347879
4
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49515
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xt2w-myh3-s7eu
120
url VCID-xv1q-1ump-cfgv
vulnerability_id VCID-xv1q-1ump-cfgv
summary kernel: bpf: Fix request_sock leak in sk lookup helpers
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49697.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49697.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49697
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10351
published_at 2026-04-02T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10417
published_at 2026-04-04T12:55:00Z
2
value 0.00136
scoring_system epss
scoring_elements 0.33316
published_at 2026-04-09T12:55:00Z
3
value 0.00136
scoring_system epss
scoring_elements 0.33319
published_at 2026-04-11T12:55:00Z
4
value 0.00136
scoring_system epss
scoring_elements 0.33278
published_at 2026-04-12T12:55:00Z
5
value 0.00136
scoring_system epss
scoring_elements 0.33255
published_at 2026-04-13T12:55:00Z
6
value 0.00136
scoring_system epss
scoring_elements 0.33294
published_at 2026-04-16T12:55:00Z
7
value 0.00136
scoring_system epss
scoring_elements 0.33271
published_at 2026-04-18T12:55:00Z
8
value 0.00136
scoring_system epss
scoring_elements 0.33235
published_at 2026-04-21T12:55:00Z
9
value 0.00136
scoring_system epss
scoring_elements 0.33086
published_at 2026-04-24T12:55:00Z
10
value 0.00136
scoring_system epss
scoring_elements 0.33238
published_at 2026-04-07T12:55:00Z
11
value 0.00136
scoring_system epss
scoring_elements 0.33281
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49697
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49697
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49697
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347938
reference_id 2347938
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347938
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49697
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xv1q-1ump-cfgv
121
url VCID-yec9-84hq-h3a9
vulnerability_id VCID-yec9-84hq-h3a9
summary kernel: scsi: qla2xxx: Fix warning message due to adisc being flushed
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49158.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49158.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49158
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.06838
published_at 2026-04-02T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.06886
published_at 2026-04-04T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.17926
published_at 2026-04-09T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.17942
published_at 2026-04-11T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.17898
published_at 2026-04-12T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.17849
published_at 2026-04-13T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.17791
published_at 2026-04-16T12:55:00Z
7
value 0.00057
scoring_system epss
scoring_elements 0.17801
published_at 2026-04-18T12:55:00Z
8
value 0.00057
scoring_system epss
scoring_elements 0.17838
published_at 2026-04-21T12:55:00Z
9
value 0.00057
scoring_system epss
scoring_elements 0.17746
published_at 2026-04-24T12:55:00Z
10
value 0.00057
scoring_system epss
scoring_elements 0.17778
published_at 2026-04-07T12:55:00Z
11
value 0.00057
scoring_system epss
scoring_elements 0.17866
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49158
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49158
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49158
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348055
reference_id 2348055
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348055
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49158
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yec9-84hq-h3a9
122
url VCID-yemh-xwuf-myaq
vulnerability_id VCID-yemh-xwuf-myaq
summary kernel: netfilter: nf_tables: do not allow SET_ID to refer to another table
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50213.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50213.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50213
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06385
published_at 2026-04-02T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06428
published_at 2026-04-04T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06416
published_at 2026-04-07T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06466
published_at 2026-04-08T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06508
published_at 2026-04-09T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06505
published_at 2026-04-11T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06498
published_at 2026-04-12T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06488
published_at 2026-04-13T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.19811
published_at 2026-04-24T12:55:00Z
9
value 0.00064
scoring_system epss
scoring_elements 0.19917
published_at 2026-04-16T12:55:00Z
10
value 0.00064
scoring_system epss
scoring_elements 0.19921
published_at 2026-04-18T12:55:00Z
11
value 0.00064
scoring_system epss
scoring_elements 0.19918
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50213
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50213
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373522
reference_id 2373522
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373522
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
7
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
8
reference_url https://access.redhat.com/errata/RHSA-2024:3421
reference_id RHSA-2024:3421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3421
fixed_packages
aliases CVE-2022-50213
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yemh-xwuf-myaq
123
url VCID-ymdz-x8ab-kuat
vulnerability_id VCID-ymdz-x8ab-kuat
summary kernel: ath11k: fix the warning of dev_wake in mhi_pm_disable_transition()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49543.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49543.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49543
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11596
published_at 2026-04-02T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.1165
published_at 2026-04-04T12:55:00Z
2
value 0.00093
scoring_system epss
scoring_elements 0.26122
published_at 2026-04-09T12:55:00Z
3
value 0.00093
scoring_system epss
scoring_elements 0.26132
published_at 2026-04-11T12:55:00Z
4
value 0.00093
scoring_system epss
scoring_elements 0.26086
published_at 2026-04-12T12:55:00Z
5
value 0.00093
scoring_system epss
scoring_elements 0.26027
published_at 2026-04-13T12:55:00Z
6
value 0.00093
scoring_system epss
scoring_elements 0.26031
published_at 2026-04-16T12:55:00Z
7
value 0.00093
scoring_system epss
scoring_elements 0.26008
published_at 2026-04-18T12:55:00Z
8
value 0.00093
scoring_system epss
scoring_elements 0.25974
published_at 2026-04-21T12:55:00Z
9
value 0.00093
scoring_system epss
scoring_elements 0.25913
published_at 2026-04-24T12:55:00Z
10
value 0.00093
scoring_system epss
scoring_elements 0.26004
published_at 2026-04-07T12:55:00Z
11
value 0.00093
scoring_system epss
scoring_elements 0.2607
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49543
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49543
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348015
reference_id 2348015
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348015
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49543
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ymdz-x8ab-kuat
124
url VCID-yqat-sxev-bfdt
vulnerability_id VCID-yqat-sxev-bfdt
summary kernel: missing DM_TARGET_IMMUTABLE feature flag in verity_target in drivers/md/dm-verity-target.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-20572.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-20572.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-20572
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.0232
published_at 2026-04-01T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02389
published_at 2026-04-02T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02402
published_at 2026-04-08T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02397
published_at 2026-04-07T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02422
published_at 2026-04-09T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02404
published_at 2026-04-11T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02394
published_at 2026-04-12T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02393
published_at 2026-04-13T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02377
published_at 2026-04-16T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02399
published_at 2026-04-04T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.0287
published_at 2026-04-24T12:55:00Z
11
value 0.00015
scoring_system epss
scoring_elements 0.02762
published_at 2026-04-18T12:55:00Z
12
value 0.00015
scoring_system epss
scoring_elements 0.02874
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-20572
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20572
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://source.android.com/security/bulletin/pixel/2022-12-01
reference_id 2022-12-01
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-18T14:54:56Z/
url https://source.android.com/security/bulletin/pixel/2022-12-01
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2186545
reference_id 2186545
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2186545
6
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
7
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
8
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
9
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
10
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
11
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
12
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
fixed_packages
aliases CVE-2022-20572
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yqat-sxev-bfdt
125
url VCID-yv2c-29cg-e3cp
vulnerability_id VCID-yv2c-29cg-e3cp
summary kernel: RDMA/irdma: Fix sleep from invalid context BUG
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49606.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49606.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49606
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06039
published_at 2026-04-02T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06073
published_at 2026-04-04T12:55:00Z
2
value 0.00111
scoring_system epss
scoring_elements 0.29559
published_at 2026-04-09T12:55:00Z
3
value 0.00111
scoring_system epss
scoring_elements 0.29561
published_at 2026-04-11T12:55:00Z
4
value 0.00111
scoring_system epss
scoring_elements 0.29516
published_at 2026-04-12T12:55:00Z
5
value 0.00111
scoring_system epss
scoring_elements 0.29464
published_at 2026-04-13T12:55:00Z
6
value 0.00111
scoring_system epss
scoring_elements 0.29483
published_at 2026-04-16T12:55:00Z
7
value 0.00111
scoring_system epss
scoring_elements 0.29455
published_at 2026-04-18T12:55:00Z
8
value 0.00111
scoring_system epss
scoring_elements 0.29409
published_at 2026-04-21T12:55:00Z
9
value 0.00111
scoring_system epss
scoring_elements 0.29293
published_at 2026-04-24T12:55:00Z
10
value 0.00111
scoring_system epss
scoring_elements 0.29456
published_at 2026-04-07T12:55:00Z
11
value 0.00111
scoring_system epss
scoring_elements 0.29519
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49606
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348277
reference_id 2348277
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348277
4
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49606
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yv2c-29cg-e3cp
126
url VCID-yvf9-x49e-vba9
vulnerability_id VCID-yvf9-x49e-vba9
summary kernel: sfc: fix use after free when disabling sriov
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49626.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49626.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49626
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03567
published_at 2026-04-24T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03559
published_at 2026-04-21T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.10701
published_at 2026-04-04T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10638
published_at 2026-04-02T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.18286
published_at 2026-04-16T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.18342
published_at 2026-04-13T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.18393
published_at 2026-04-12T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.1844
published_at 2026-04-11T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.18441
published_at 2026-04-09T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.18388
published_at 2026-04-08T12:55:00Z
10
value 0.00059
scoring_system epss
scoring_elements 0.18305
published_at 2026-04-07T12:55:00Z
11
value 0.00059
scoring_system epss
scoring_elements 0.18298
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49626
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49626
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348032
reference_id 2348032
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348032
5
reference_url https://git.kernel.org/stable/c/3199e34912d84cdfb8a93a984c5ae5c73fb13e84
reference_id 3199e34912d84cdfb8a93a984c5ae5c73fb13e84
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:15:26Z/
url https://git.kernel.org/stable/c/3199e34912d84cdfb8a93a984c5ae5c73fb13e84
6
reference_url https://git.kernel.org/stable/c/58d93e9d160c0de6d867c7eb4c2206671a351eb1
reference_id 58d93e9d160c0de6d867c7eb4c2206671a351eb1
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:15:26Z/
url https://git.kernel.org/stable/c/58d93e9d160c0de6d867c7eb4c2206671a351eb1
7
reference_url https://git.kernel.org/stable/c/9c854ae512b89229aeee93849e9bd4c115b37909
reference_id 9c854ae512b89229aeee93849e9bd4c115b37909
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:15:26Z/
url https://git.kernel.org/stable/c/9c854ae512b89229aeee93849e9bd4c115b37909
8
reference_url https://git.kernel.org/stable/c/bcad880865bfb421885364b1f0c7351280fe2b97
reference_id bcad880865bfb421885364b1f0c7351280fe2b97
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:15:26Z/
url https://git.kernel.org/stable/c/bcad880865bfb421885364b1f0c7351280fe2b97
9
reference_url https://git.kernel.org/stable/c/c2240500817b3b4b996cdf2a461a3a5679f49b94
reference_id c2240500817b3b4b996cdf2a461a3a5679f49b94
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:15:26Z/
url https://git.kernel.org/stable/c/c2240500817b3b4b996cdf2a461a3a5679f49b94
10
reference_url https://git.kernel.org/stable/c/c9e75bb22a26e391f189f5a5133dd63dcb57fdaa
reference_id c9e75bb22a26e391f189f5a5133dd63dcb57fdaa
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:15:26Z/
url https://git.kernel.org/stable/c/c9e75bb22a26e391f189f5a5133dd63dcb57fdaa
11
reference_url https://git.kernel.org/stable/c/e435c4aeeaa073091f7f3b7735af2ef5c97d63f2
reference_id e435c4aeeaa073091f7f3b7735af2ef5c97d63f2
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:15:26Z/
url https://git.kernel.org/stable/c/e435c4aeeaa073091f7f3b7735af2ef5c97d63f2
12
reference_url https://git.kernel.org/stable/c/ebe41da5d47ac0fff877e57bd14c54dccf168827
reference_id ebe41da5d47ac0fff877e57bd14c54dccf168827
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:15:26Z/
url https://git.kernel.org/stable/c/ebe41da5d47ac0fff877e57bd14c54dccf168827
13
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
14
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49626
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yvf9-x49e-vba9
127
url VCID-z4we-1au6-gqh4
vulnerability_id VCID-z4we-1au6-gqh4
summary kernel: ALSA: pcm: Fix potential AB/BA lock with buffer_mutex and mmap_lock
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49272.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49272.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49272
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07706
published_at 2026-04-04T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07663
published_at 2026-04-02T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09411
published_at 2026-04-09T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09424
published_at 2026-04-11T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09394
published_at 2026-04-12T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.0938
published_at 2026-04-13T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09271
published_at 2026-04-18T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09421
published_at 2026-04-21T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.09476
published_at 2026-04-24T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.09288
published_at 2026-04-07T12:55:00Z
10
value 0.00032
scoring_system epss
scoring_elements 0.09364
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49272
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49272
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49272
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348064
reference_id 2348064
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348064
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49272
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z4we-1au6-gqh4
128
url VCID-zasw-wwu3-xkaf
vulnerability_id VCID-zasw-wwu3-xkaf
summary kernel: nf_tables cross-table potential use-after-free may lead to local privilege escalation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2586.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2586.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2586
reference_id
reference_type
scores
0
value 0.02217
scoring_system epss
scoring_elements 0.84427
published_at 2026-04-02T12:55:00Z
1
value 0.02217
scoring_system epss
scoring_elements 0.84534
published_at 2026-04-24T12:55:00Z
2
value 0.02217
scoring_system epss
scoring_elements 0.84446
published_at 2026-04-04T12:55:00Z
3
value 0.02217
scoring_system epss
scoring_elements 0.84447
published_at 2026-04-07T12:55:00Z
4
value 0.02217
scoring_system epss
scoring_elements 0.84469
published_at 2026-04-08T12:55:00Z
5
value 0.02217
scoring_system epss
scoring_elements 0.84475
published_at 2026-04-09T12:55:00Z
6
value 0.02217
scoring_system epss
scoring_elements 0.84493
published_at 2026-04-11T12:55:00Z
7
value 0.02217
scoring_system epss
scoring_elements 0.84488
published_at 2026-04-12T12:55:00Z
8
value 0.02217
scoring_system epss
scoring_elements 0.84483
published_at 2026-04-13T12:55:00Z
9
value 0.02217
scoring_system epss
scoring_elements 0.84505
published_at 2026-04-18T12:55:00Z
10
value 0.02217
scoring_system epss
scoring_elements 0.84507
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2586
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-26T15:34:35Z/
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2114878
reference_id 2114878
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2114878
12
reference_url https://www.openwall.com/lists/oss-security/2022/08/09/5
reference_id 5
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-26T15:34:35Z/
url https://www.openwall.com/lists/oss-security/2022/08/09/5
13
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
14
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
15
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
16
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
17
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
18
reference_url https://lore.kernel.org/netfilter-devel/20220809170148.164591-1-cascardo@canonical.com/T/#t
reference_id #t
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-26T15:34:35Z/
url https://lore.kernel.org/netfilter-devel/20220809170148.164591-1-cascardo@canonical.com/T/#t
19
reference_url https://ubuntu.com/security/notices/USN-5557-1
reference_id USN-5557-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-26T15:34:35Z/
url https://ubuntu.com/security/notices/USN-5557-1
20
reference_url https://usn.ubuntu.com/5557-1/
reference_id USN-5557-1
reference_type
scores
url https://usn.ubuntu.com/5557-1/
21
reference_url https://ubuntu.com/security/notices/USN-5560-1
reference_id USN-5560-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-26T15:34:35Z/
url https://ubuntu.com/security/notices/USN-5560-1
22
reference_url https://usn.ubuntu.com/5560-1/
reference_id USN-5560-1
reference_type
scores
url https://usn.ubuntu.com/5560-1/
23
reference_url https://ubuntu.com/security/notices/USN-5560-2
reference_id USN-5560-2
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-26T15:34:35Z/
url https://ubuntu.com/security/notices/USN-5560-2
24
reference_url https://usn.ubuntu.com/5560-2/
reference_id USN-5560-2
reference_type
scores
url https://usn.ubuntu.com/5560-2/
25
reference_url https://ubuntu.com/security/notices/USN-5562-1
reference_id USN-5562-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-26T15:34:35Z/
url https://ubuntu.com/security/notices/USN-5562-1
26
reference_url https://usn.ubuntu.com/5562-1/
reference_id USN-5562-1
reference_type
scores
url https://usn.ubuntu.com/5562-1/
27
reference_url https://ubuntu.com/security/notices/USN-5564-1
reference_id USN-5564-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-26T15:34:35Z/
url https://ubuntu.com/security/notices/USN-5564-1
28
reference_url https://usn.ubuntu.com/5564-1/
reference_id USN-5564-1
reference_type
scores
url https://usn.ubuntu.com/5564-1/
29
reference_url https://ubuntu.com/security/notices/USN-5565-1
reference_id USN-5565-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-26T15:34:35Z/
url https://ubuntu.com/security/notices/USN-5565-1
30
reference_url https://usn.ubuntu.com/5565-1/
reference_id USN-5565-1
reference_type
scores
url https://usn.ubuntu.com/5565-1/
31
reference_url https://ubuntu.com/security/notices/USN-5566-1
reference_id USN-5566-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-26T15:34:35Z/
url https://ubuntu.com/security/notices/USN-5566-1
32
reference_url https://usn.ubuntu.com/5566-1/
reference_id USN-5566-1
reference_type
scores
url https://usn.ubuntu.com/5566-1/
33
reference_url https://ubuntu.com/security/notices/USN-5567-1
reference_id USN-5567-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-26T15:34:35Z/
url https://ubuntu.com/security/notices/USN-5567-1
34
reference_url https://usn.ubuntu.com/5567-1/
reference_id USN-5567-1
reference_type
scores
url https://usn.ubuntu.com/5567-1/
35
reference_url https://ubuntu.com/security/notices/USN-5582-1
reference_id USN-5582-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-26T15:34:35Z/
url https://ubuntu.com/security/notices/USN-5582-1
36
reference_url https://usn.ubuntu.com/5582-1/
reference_id USN-5582-1
reference_type
scores
url https://usn.ubuntu.com/5582-1/
37
reference_url https://www.zerodayinitiative.com/advisories/ZDI-22-1118/
reference_id ZDI-22-1118
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-26T15:34:35Z/
url https://www.zerodayinitiative.com/advisories/ZDI-22-1118/
fixed_packages
aliases CVE-2022-2586
risk_score 10.0
exploitability 2.0
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zasw-wwu3-xkaf
129
url VCID-zb92-vd24-8yhk
vulnerability_id VCID-zb92-vd24-8yhk
summary kernel: KVM: NULL pointer dereference in kvm_dirty_ring_push in virt/kvm/dirty_ring.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1263.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1263.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1263
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.20916
published_at 2026-04-01T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.21067
published_at 2026-04-02T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.2112
published_at 2026-04-04T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.20835
published_at 2026-04-07T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.20915
published_at 2026-04-08T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.20976
published_at 2026-04-09T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.20993
published_at 2026-04-11T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.2095
published_at 2026-04-12T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.20896
published_at 2026-04-13T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.20887
published_at 2026-04-16T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.20888
published_at 2026-04-18T12:55:00Z
11
value 0.00068
scoring_system epss
scoring_elements 0.20868
published_at 2026-04-21T12:55:00Z
12
value 0.00068
scoring_system epss
scoring_elements 0.20739
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1263
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2072698
reference_id 2072698
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2072698
4
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
7
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
8
reference_url https://usn.ubuntu.com/5469-1/
reference_id USN-5469-1
reference_type
scores
url https://usn.ubuntu.com/5469-1/
fixed_packages
aliases CVE-2022-1263
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zb92-vd24-8yhk
130
url VCID-ze3e-978b-pfbt
vulnerability_id VCID-ze3e-978b-pfbt
summary kernel: KVM: Unconditionally get a ref to /dev/kvm module when creating a VM
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50081.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50081.json
1
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373518
reference_id 2373518
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373518
2
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
3
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
fixed_packages
aliases CVE-2022-50081
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ze3e-978b-pfbt
131
url VCID-zr5e-e394-1fb4
vulnerability_id VCID-zr5e-e394-1fb4
summary kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2639.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2639.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2639
reference_id
reference_type
scores
0
value 0.01101
scoring_system epss
scoring_elements 0.78005
published_at 2026-04-02T12:55:00Z
1
value 0.01101
scoring_system epss
scoring_elements 0.78035
published_at 2026-04-04T12:55:00Z
2
value 0.01101
scoring_system epss
scoring_elements 0.78018
published_at 2026-04-07T12:55:00Z
3
value 0.01101
scoring_system epss
scoring_elements 0.78044
published_at 2026-04-08T12:55:00Z
4
value 0.01101
scoring_system epss
scoring_elements 0.78049
published_at 2026-04-09T12:55:00Z
5
value 0.01101
scoring_system epss
scoring_elements 0.78075
published_at 2026-04-11T12:55:00Z
6
value 0.01101
scoring_system epss
scoring_elements 0.78057
published_at 2026-04-12T12:55:00Z
7
value 0.01101
scoring_system epss
scoring_elements 0.78054
published_at 2026-04-13T12:55:00Z
8
value 0.01101
scoring_system epss
scoring_elements 0.78089
published_at 2026-04-16T12:55:00Z
9
value 0.01101
scoring_system epss
scoring_elements 0.78088
published_at 2026-04-18T12:55:00Z
10
value 0.01101
scoring_system epss
scoring_elements 0.78081
published_at 2026-04-21T12:55:00Z
11
value 0.01101
scoring_system epss
scoring_elements 0.78115
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2639
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2639
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2639
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2084479
reference_id 2084479
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2084479
5
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
6
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
7
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
8
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
9
reference_url https://access.redhat.com/errata/RHSA-2022:8765
reference_id RHSA-2022:8765
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8765
10
reference_url https://access.redhat.com/errata/RHSA-2022:8767
reference_id RHSA-2022:8767
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8767
11
reference_url https://access.redhat.com/errata/RHSA-2022:8768
reference_id RHSA-2022:8768
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8768
12
reference_url https://access.redhat.com/errata/RHSA-2022:8809
reference_id RHSA-2022:8809
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8809
13
reference_url https://access.redhat.com/errata/RHSA-2022:8831
reference_id RHSA-2022:8831
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8831
14
reference_url https://access.redhat.com/errata/RHSA-2022:8940
reference_id RHSA-2022:8940
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8940
15
reference_url https://access.redhat.com/errata/RHSA-2022:8941
reference_id RHSA-2022:8941
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8941
16
reference_url https://access.redhat.com/errata/RHSA-2022:8973
reference_id RHSA-2022:8973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8973
17
reference_url https://access.redhat.com/errata/RHSA-2022:8974
reference_id RHSA-2022:8974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8974
18
reference_url https://access.redhat.com/errata/RHSA-2022:8989
reference_id RHSA-2022:8989
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8989
19
reference_url https://access.redhat.com/errata/RHSA-2022:9082
reference_id RHSA-2022:9082
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9082
20
reference_url https://access.redhat.com/errata/RHSA-2023:0058
reference_id RHSA-2023:0058
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0058
21
reference_url https://access.redhat.com/errata/RHSA-2023:0059
reference_id RHSA-2023:0059
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0059
22
reference_url https://usn.ubuntu.com/5650-1/
reference_id USN-5650-1
reference_type
scores
url https://usn.ubuntu.com/5650-1/
fixed_packages
aliases CVE-2022-2639
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zr5e-e394-1fb4
132
url VCID-zrjz-h3jk-wuan
vulnerability_id VCID-zrjz-h3jk-wuan
summary kernel: brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49263.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49263.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49263
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10422
published_at 2026-04-02T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.1049
published_at 2026-04-04T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.16387
published_at 2026-04-09T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.1637
published_at 2026-04-11T12:55:00Z
4
value 0.00052
scoring_system epss
scoring_elements 0.16331
published_at 2026-04-12T12:55:00Z
5
value 0.00052
scoring_system epss
scoring_elements 0.16263
published_at 2026-04-13T12:55:00Z
6
value 0.00052
scoring_system epss
scoring_elements 0.16199
published_at 2026-04-16T12:55:00Z
7
value 0.00052
scoring_system epss
scoring_elements 0.16218
published_at 2026-04-18T12:55:00Z
8
value 0.00052
scoring_system epss
scoring_elements 0.16256
published_at 2026-04-21T12:55:00Z
9
value 0.00052
scoring_system epss
scoring_elements 0.16147
published_at 2026-04-24T12:55:00Z
10
value 0.00052
scoring_system epss
scoring_elements 0.16239
published_at 2026-04-07T12:55:00Z
11
value 0.00052
scoring_system epss
scoring_elements 0.16324
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49263
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49263
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49263
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348286
reference_id 2348286
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348286
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49263
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zrjz-h3jk-wuan
133
url VCID-zymq-kwzh-2kfh
vulnerability_id VCID-zymq-kwzh-2kfh
summary kernel: tipc: move bc link creation back to tipc_node_create
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49664.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49664.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49664
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10785
published_at 2026-04-02T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10848
published_at 2026-04-04T12:55:00Z
2
value 0.00133
scoring_system epss
scoring_elements 0.32945
published_at 2026-04-09T12:55:00Z
3
value 0.00133
scoring_system epss
scoring_elements 0.32948
published_at 2026-04-11T12:55:00Z
4
value 0.00133
scoring_system epss
scoring_elements 0.3291
published_at 2026-04-12T12:55:00Z
5
value 0.00133
scoring_system epss
scoring_elements 0.32885
published_at 2026-04-13T12:55:00Z
6
value 0.00133
scoring_system epss
scoring_elements 0.32924
published_at 2026-04-16T12:55:00Z
7
value 0.00133
scoring_system epss
scoring_elements 0.32903
published_at 2026-04-18T12:55:00Z
8
value 0.00133
scoring_system epss
scoring_elements 0.32867
published_at 2026-04-21T12:55:00Z
9
value 0.00133
scoring_system epss
scoring_elements 0.32719
published_at 2026-04-24T12:55:00Z
10
value 0.00133
scoring_system epss
scoring_elements 0.32869
published_at 2026-04-07T12:55:00Z
11
value 0.00133
scoring_system epss
scoring_elements 0.32916
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49664
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49664
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348070
reference_id 2348070
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348070
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49664
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zymq-kwzh-2kfh
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-425.3.1%3Farch=el8