Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@5.14.0-162.12.1?arch=el9_1
Typerpm
Namespaceredhat
Namekernel
Version5.14.0-162.12.1
Qualifiers
arch el9_1
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-2s15-39et-qyar
vulnerability_id VCID-2s15-39et-qyar
summary kernel: memory corruption in AX88179_178A based USB ethernet device.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2964.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2964.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2964
reference_id
reference_type
scores
0
value 0.00031
scoring_system epss
scoring_elements 0.08788
published_at 2026-04-02T12:55:00Z
1
value 0.00031
scoring_system epss
scoring_elements 0.08836
published_at 2026-04-04T12:55:00Z
2
value 0.00031
scoring_system epss
scoring_elements 0.08771
published_at 2026-04-07T12:55:00Z
3
value 0.00031
scoring_system epss
scoring_elements 0.08849
published_at 2026-04-08T12:55:00Z
4
value 0.00031
scoring_system epss
scoring_elements 0.08875
published_at 2026-04-09T12:55:00Z
5
value 0.00031
scoring_system epss
scoring_elements 0.08873
published_at 2026-04-11T12:55:00Z
6
value 0.00031
scoring_system epss
scoring_elements 0.08842
published_at 2026-04-12T12:55:00Z
7
value 0.00031
scoring_system epss
scoring_elements 0.08829
published_at 2026-04-13T12:55:00Z
8
value 0.00031
scoring_system epss
scoring_elements 0.08718
published_at 2026-04-16T12:55:00Z
9
value 0.00031
scoring_system epss
scoring_elements 0.08693
published_at 2026-04-18T12:55:00Z
10
value 0.00031
scoring_system epss
scoring_elements 0.08844
published_at 2026-04-21T12:55:00Z
11
value 0.00031
scoring_system epss
scoring_elements 0.0886
published_at 2026-04-24T12:55:00Z
12
value 0.00031
scoring_system epss
scoring_elements 0.08814
published_at 2026-04-26T12:55:00Z
13
value 0.00031
scoring_system epss
scoring_elements 0.08826
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2964
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2964
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2964
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2067482
reference_id 2067482
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2067482
5
reference_url https://access.redhat.com/errata/RHSA-2023:0101
reference_id RHSA-2023:0101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0101
6
reference_url https://access.redhat.com/errata/RHSA-2023:0114
reference_id RHSA-2023:0114
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0114
7
reference_url https://access.redhat.com/errata/RHSA-2023:0123
reference_id RHSA-2023:0123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0123
8
reference_url https://access.redhat.com/errata/RHSA-2023:0300
reference_id RHSA-2023:0300
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0300
9
reference_url https://access.redhat.com/errata/RHSA-2023:0334
reference_id RHSA-2023:0334
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0334
10
reference_url https://access.redhat.com/errata/RHSA-2023:0348
reference_id RHSA-2023:0348
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0348
11
reference_url https://access.redhat.com/errata/RHSA-2023:0392
reference_id RHSA-2023:0392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0392
12
reference_url https://access.redhat.com/errata/RHSA-2023:0395
reference_id RHSA-2023:0395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0395
13
reference_url https://access.redhat.com/errata/RHSA-2023:0396
reference_id RHSA-2023:0396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0396
14
reference_url https://access.redhat.com/errata/RHSA-2023:0399
reference_id RHSA-2023:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0399
15
reference_url https://access.redhat.com/errata/RHSA-2023:0400
reference_id RHSA-2023:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0400
16
reference_url https://access.redhat.com/errata/RHSA-2023:0404
reference_id RHSA-2023:0404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0404
17
reference_url https://access.redhat.com/errata/RHSA-2023:0496
reference_id RHSA-2023:0496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0496
18
reference_url https://access.redhat.com/errata/RHSA-2023:0499
reference_id RHSA-2023:0499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0499
19
reference_url https://access.redhat.com/errata/RHSA-2023:0512
reference_id RHSA-2023:0512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0512
20
reference_url https://access.redhat.com/errata/RHSA-2023:0526
reference_id RHSA-2023:0526
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0526
21
reference_url https://access.redhat.com/errata/RHSA-2023:0531
reference_id RHSA-2023:0531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0531
22
reference_url https://access.redhat.com/errata/RHSA-2023:0536
reference_id RHSA-2023:0536
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0536
23
reference_url https://access.redhat.com/errata/RHSA-2023:0856
reference_id RHSA-2023:0856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0856
24
reference_url https://access.redhat.com/errata/RHSA-2023:0858
reference_id RHSA-2023:0858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0858
25
reference_url https://access.redhat.com/errata/RHSA-2023:1130
reference_id RHSA-2023:1130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1130
26
reference_url https://access.redhat.com/errata/RHSA-2023:1192
reference_id RHSA-2023:1192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1192
27
reference_url https://usn.ubuntu.com/5650-1/
reference_id USN-5650-1
reference_type
scores
url https://usn.ubuntu.com/5650-1/
fixed_packages
aliases CVE-2022-2964
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2s15-39et-qyar
1
url VCID-6mr9-dybm-y7cg
vulnerability_id VCID-6mr9-dybm-y7cg
summary kernel: i915: Incorrect GPU TLB flush can lead to random memory access
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4139.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4139.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-4139
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03189
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03283
published_at 2026-04-29T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03186
published_at 2026-04-11T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03159
published_at 2026-04-12T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03144
published_at 2026-04-13T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03117
published_at 2026-04-16T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.03125
published_at 2026-04-18T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03244
published_at 2026-04-24T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.03239
published_at 2026-04-26T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03199
published_at 2026-04-04T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03202
published_at 2026-04-07T12:55:00Z
11
value 0.00015
scoring_system epss
scoring_elements 0.03207
published_at 2026-04-08T12:55:00Z
12
value 0.00015
scoring_system epss
scoring_elements 0.03232
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-4139
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4139
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.openwall.com/lists/oss-security/2022/11/30/1
reference_id 1
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-28T15:43:18Z/
url https://www.openwall.com/lists/oss-security/2022/11/30/1
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2147572
reference_id 2147572
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-28T15:43:18Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2147572
6
reference_url https://security.netapp.com/advisory/ntap-20230309-0004/
reference_id ntap-20230309-0004
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-28T15:43:18Z/
url https://security.netapp.com/advisory/ntap-20230309-0004/
7
reference_url https://access.redhat.com/errata/RHSA-2023:0101
reference_id RHSA-2023:0101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0101
8
reference_url https://access.redhat.com/errata/RHSA-2023:0114
reference_id RHSA-2023:0114
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0114
9
reference_url https://access.redhat.com/errata/RHSA-2023:0123
reference_id RHSA-2023:0123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0123
10
reference_url https://access.redhat.com/errata/RHSA-2023:0300
reference_id RHSA-2023:0300
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0300
11
reference_url https://access.redhat.com/errata/RHSA-2023:0334
reference_id RHSA-2023:0334
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0334
12
reference_url https://access.redhat.com/errata/RHSA-2023:0348
reference_id RHSA-2023:0348
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0348
13
reference_url https://access.redhat.com/errata/RHSA-2023:0440
reference_id RHSA-2023:0440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0440
14
reference_url https://access.redhat.com/errata/RHSA-2023:0441
reference_id RHSA-2023:0441
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0441
15
reference_url https://access.redhat.com/errata/RHSA-2023:0496
reference_id RHSA-2023:0496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0496
16
reference_url https://access.redhat.com/errata/RHSA-2023:0499
reference_id RHSA-2023:0499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0499
17
reference_url https://access.redhat.com/errata/RHSA-2023:0512
reference_id RHSA-2023:0512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0512
18
reference_url https://access.redhat.com/errata/RHSA-2023:0526
reference_id RHSA-2023:0526
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0526
19
reference_url https://access.redhat.com/errata/RHSA-2023:0531
reference_id RHSA-2023:0531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0531
20
reference_url https://access.redhat.com/errata/RHSA-2023:0536
reference_id RHSA-2023:0536
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0536
21
reference_url https://access.redhat.com/errata/RHSA-2023:0859
reference_id RHSA-2023:0859
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0859
22
reference_url https://usn.ubuntu.com/5859-1/
reference_id USN-5859-1
reference_type
scores
url https://usn.ubuntu.com/5859-1/
23
reference_url https://usn.ubuntu.com/5911-1/
reference_id USN-5911-1
reference_type
scores
url https://usn.ubuntu.com/5911-1/
24
reference_url https://usn.ubuntu.com/5912-1/
reference_id USN-5912-1
reference_type
scores
url https://usn.ubuntu.com/5912-1/
25
reference_url https://usn.ubuntu.com/5917-1/
reference_id USN-5917-1
reference_type
scores
url https://usn.ubuntu.com/5917-1/
26
reference_url https://usn.ubuntu.com/5929-1/
reference_id USN-5929-1
reference_type
scores
url https://usn.ubuntu.com/5929-1/
27
reference_url https://usn.ubuntu.com/5934-1/
reference_id USN-5934-1
reference_type
scores
url https://usn.ubuntu.com/5934-1/
28
reference_url https://usn.ubuntu.com/5935-1/
reference_id USN-5935-1
reference_type
scores
url https://usn.ubuntu.com/5935-1/
29
reference_url https://usn.ubuntu.com/5938-1/
reference_id USN-5938-1
reference_type
scores
url https://usn.ubuntu.com/5938-1/
30
reference_url https://usn.ubuntu.com/5939-1/
reference_id USN-5939-1
reference_type
scores
url https://usn.ubuntu.com/5939-1/
31
reference_url https://usn.ubuntu.com/5940-1/
reference_id USN-5940-1
reference_type
scores
url https://usn.ubuntu.com/5940-1/
32
reference_url https://usn.ubuntu.com/5941-1/
reference_id USN-5941-1
reference_type
scores
url https://usn.ubuntu.com/5941-1/
33
reference_url https://usn.ubuntu.com/5950-1/
reference_id USN-5950-1
reference_type
scores
url https://usn.ubuntu.com/5950-1/
34
reference_url https://usn.ubuntu.com/5951-1/
reference_id USN-5951-1
reference_type
scores
url https://usn.ubuntu.com/5951-1/
35
reference_url https://usn.ubuntu.com/5962-1/
reference_id USN-5962-1
reference_type
scores
url https://usn.ubuntu.com/5962-1/
36
reference_url https://usn.ubuntu.com/6000-1/
reference_id USN-6000-1
reference_type
scores
url https://usn.ubuntu.com/6000-1/
37
reference_url https://usn.ubuntu.com/6089-1/
reference_id USN-6089-1
reference_type
scores
url https://usn.ubuntu.com/6089-1/
38
reference_url https://usn.ubuntu.com/6124-1/
reference_id USN-6124-1
reference_type
scores
url https://usn.ubuntu.com/6124-1/
fixed_packages
aliases CVE-2022-4139
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6mr9-dybm-y7cg
2
url VCID-9mam-pneh-5yhy
vulnerability_id VCID-9mam-pneh-5yhy
summary kernel: nfsd buffer overflow by RPC message over TCP with garbage data
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43945.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43945.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-43945
reference_id
reference_type
scores
0
value 0.00329
scoring_system epss
scoring_elements 0.55859
published_at 2026-04-29T12:55:00Z
1
value 0.00329
scoring_system epss
scoring_elements 0.55952
published_at 2026-04-09T12:55:00Z
2
value 0.00329
scoring_system epss
scoring_elements 0.55961
published_at 2026-04-11T12:55:00Z
3
value 0.00329
scoring_system epss
scoring_elements 0.55942
published_at 2026-04-12T12:55:00Z
4
value 0.00329
scoring_system epss
scoring_elements 0.55923
published_at 2026-04-13T12:55:00Z
5
value 0.00329
scoring_system epss
scoring_elements 0.5596
published_at 2026-04-16T12:55:00Z
6
value 0.00329
scoring_system epss
scoring_elements 0.55963
published_at 2026-04-18T12:55:00Z
7
value 0.00329
scoring_system epss
scoring_elements 0.55938
published_at 2026-04-21T12:55:00Z
8
value 0.00329
scoring_system epss
scoring_elements 0.55864
published_at 2026-04-24T12:55:00Z
9
value 0.00329
scoring_system epss
scoring_elements 0.55883
published_at 2026-04-26T12:55:00Z
10
value 0.00329
scoring_system epss
scoring_elements 0.55899
published_at 2026-04-07T12:55:00Z
11
value 0.00329
scoring_system epss
scoring_elements 0.55921
published_at 2026-04-04T12:55:00Z
12
value 0.00329
scoring_system epss
scoring_elements 0.5595
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-43945
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43945
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48772
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25741
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26629
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27019
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31076
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33621
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33847
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33847
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34027
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34027
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35247
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35247
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36014
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36014
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36015
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36016
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36270
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36270
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36286
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36288
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36288
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36489
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36894
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36971
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36971
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36974
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36978
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37078
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37356
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38381
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38381
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38546
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38547
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38548
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38548
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38549
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38552
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38552
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38555
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38555
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38558
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38559
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38560
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38560
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38565
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38567
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38578
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38579
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38582
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38583
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38586
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38587
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38587
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38589
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38589
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38590
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38596
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38597
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38598
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38599
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38601
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38605
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38605
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38607
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38612
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38613
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38613
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38615
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38618
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38619
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38621
58
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38627
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38627
59
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38633
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38633
60
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38634
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38634
61
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38635
62
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38637
63
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38659
64
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38661
65
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38662
66
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38780
67
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39276
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39276
68
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39292
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39292
69
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39301
70
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39467
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39467
71
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39468
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39468
72
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39469
73
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39471
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39471
74
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39475
75
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39476
76
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39480
77
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39482
78
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39484
79
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39488
80
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39489
81
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39493
82
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39495
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39495
83
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39499
84
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39502
85
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39503
86
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39505
87
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39506
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39506
88
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39509
89
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40901
90
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40902
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40902
91
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40904
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40904
92
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40905
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40905
93
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40912
94
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40916
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40916
95
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40929
96
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40931
97
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40932
98
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40934
99
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40941
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40941
100
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40942
101
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40943
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40943
102
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40945
103
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40958
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40958
104
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40959
105
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40960
106
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40961
107
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40963
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40963
108
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40968
109
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40971
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40971
110
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40974
111
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40976
112
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40978
113
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40980
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40980
114
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40981
115
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40983
116
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40984
117
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40987
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40987
118
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40988
119
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40990
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40990
120
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40993
121
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40995
122
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41000
123
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41004
124
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41005
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41005
125
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41006
126
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
127
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2141752
reference_id 2141752
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2141752
128
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
129
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
130
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
131
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
132
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8
reference_id ?id=f90497a16e434c2211c66e3de8e77b17868382b8
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-01T19:08:01Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8
133
reference_url http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html
reference_id Kernel-Live-Patch-Security-Notice-LNS-0092-1.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-01T19:08:01Z/
url http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html
134
reference_url https://security.netapp.com/advisory/ntap-20221215-0006/
reference_id ntap-20221215-0006
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-01T19:08:01Z/
url https://security.netapp.com/advisory/ntap-20221215-0006/
135
reference_url https://access.redhat.com/errata/RHSA-2022:8973
reference_id RHSA-2022:8973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8973
136
reference_url https://access.redhat.com/errata/RHSA-2022:8974
reference_id RHSA-2022:8974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8974
137
reference_url https://access.redhat.com/errata/RHSA-2022:9082
reference_id RHSA-2022:9082
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9082
138
reference_url https://access.redhat.com/errata/RHSA-2023:0300
reference_id RHSA-2023:0300
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0300
139
reference_url https://access.redhat.com/errata/RHSA-2023:0334
reference_id RHSA-2023:0334
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0334
140
reference_url https://access.redhat.com/errata/RHSA-2023:0348
reference_id RHSA-2023:0348
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0348
141
reference_url https://access.redhat.com/errata/RHSA-2023:0832
reference_id RHSA-2023:0832
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0832
142
reference_url https://access.redhat.com/errata/RHSA-2023:0839
reference_id RHSA-2023:0839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0839
143
reference_url https://access.redhat.com/errata/RHSA-2023:0854
reference_id RHSA-2023:0854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0854
144
reference_url https://usn.ubuntu.com/5754-1/
reference_id USN-5754-1
reference_type
scores
url https://usn.ubuntu.com/5754-1/
145
reference_url https://usn.ubuntu.com/5754-2/
reference_id USN-5754-2
reference_type
scores
url https://usn.ubuntu.com/5754-2/
146
reference_url https://usn.ubuntu.com/5755-1/
reference_id USN-5755-1
reference_type
scores
url https://usn.ubuntu.com/5755-1/
147
reference_url https://usn.ubuntu.com/5755-2/
reference_id USN-5755-2
reference_type
scores
url https://usn.ubuntu.com/5755-2/
148
reference_url https://usn.ubuntu.com/5773-1/
reference_id USN-5773-1
reference_type
scores
url https://usn.ubuntu.com/5773-1/
149
reference_url https://usn.ubuntu.com/5779-1/
reference_id USN-5779-1
reference_type
scores
url https://usn.ubuntu.com/5779-1/
150
reference_url https://usn.ubuntu.com/5789-1/
reference_id USN-5789-1
reference_type
scores
url https://usn.ubuntu.com/5789-1/
151
reference_url https://usn.ubuntu.com/5794-1/
reference_id USN-5794-1
reference_type
scores
url https://usn.ubuntu.com/5794-1/
152
reference_url https://usn.ubuntu.com/5802-1/
reference_id USN-5802-1
reference_type
scores
url https://usn.ubuntu.com/5802-1/
153
reference_url https://usn.ubuntu.com/5804-1/
reference_id USN-5804-1
reference_type
scores
url https://usn.ubuntu.com/5804-1/
154
reference_url https://usn.ubuntu.com/5804-2/
reference_id USN-5804-2
reference_type
scores
url https://usn.ubuntu.com/5804-2/
155
reference_url https://usn.ubuntu.com/5808-1/
reference_id USN-5808-1
reference_type
scores
url https://usn.ubuntu.com/5808-1/
156
reference_url https://usn.ubuntu.com/5813-1/
reference_id USN-5813-1
reference_type
scores
url https://usn.ubuntu.com/5813-1/
157
reference_url https://usn.ubuntu.com/5829-1/
reference_id USN-5829-1
reference_type
scores
url https://usn.ubuntu.com/5829-1/
158
reference_url https://usn.ubuntu.com/5830-1/
reference_id USN-5830-1
reference_type
scores
url https://usn.ubuntu.com/5830-1/
159
reference_url https://usn.ubuntu.com/5861-1/
reference_id USN-5861-1
reference_type
scores
url https://usn.ubuntu.com/5861-1/
160
reference_url https://usn.ubuntu.com/5863-1/
reference_id USN-5863-1
reference_type
scores
url https://usn.ubuntu.com/5863-1/
161
reference_url https://usn.ubuntu.com/5875-1/
reference_id USN-5875-1
reference_type
scores
url https://usn.ubuntu.com/5875-1/
162
reference_url https://usn.ubuntu.com/5914-1/
reference_id USN-5914-1
reference_type
scores
url https://usn.ubuntu.com/5914-1/
163
reference_url https://usn.ubuntu.com/5918-1/
reference_id USN-5918-1
reference_type
scores
url https://usn.ubuntu.com/5918-1/
fixed_packages
aliases CVE-2022-43945
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9mam-pneh-5yhy
3
url VCID-cewe-299n-sbfz
vulnerability_id VCID-cewe-299n-sbfz
summary kernel: i2c: unbounded length leads to buffer overflow in ismt_access()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3077.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3077.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3077
reference_id
reference_type
scores
0
value 0.00093
scoring_system epss
scoring_elements 0.26121
published_at 2026-04-02T12:55:00Z
1
value 0.00093
scoring_system epss
scoring_elements 0.26162
published_at 2026-04-04T12:55:00Z
2
value 0.00093
scoring_system epss
scoring_elements 0.25931
published_at 2026-04-07T12:55:00Z
3
value 0.00093
scoring_system epss
scoring_elements 0.25998
published_at 2026-04-08T12:55:00Z
4
value 0.00093
scoring_system epss
scoring_elements 0.26049
published_at 2026-04-09T12:55:00Z
5
value 0.00093
scoring_system epss
scoring_elements 0.26059
published_at 2026-04-11T12:55:00Z
6
value 0.00093
scoring_system epss
scoring_elements 0.26013
published_at 2026-04-12T12:55:00Z
7
value 0.00093
scoring_system epss
scoring_elements 0.25954
published_at 2026-04-13T12:55:00Z
8
value 0.00093
scoring_system epss
scoring_elements 0.25959
published_at 2026-04-16T12:55:00Z
9
value 0.00093
scoring_system epss
scoring_elements 0.2594
published_at 2026-04-18T12:55:00Z
10
value 0.00093
scoring_system epss
scoring_elements 0.2591
published_at 2026-04-21T12:55:00Z
11
value 0.00093
scoring_system epss
scoring_elements 0.25845
published_at 2026-04-24T12:55:00Z
12
value 0.00093
scoring_system epss
scoring_elements 0.2584
published_at 2026-04-26T12:55:00Z
13
value 0.00093
scoring_system epss
scoring_elements 0.25793
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3077
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2123309
reference_id 2123309
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2123309
4
reference_url https://access.redhat.com/errata/RHSA-2023:0300
reference_id RHSA-2023:0300
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0300
5
reference_url https://access.redhat.com/errata/RHSA-2023:0334
reference_id RHSA-2023:0334
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0334
fixed_packages
aliases CVE-2022-3077
risk_score 2.9
exploitability 0.5
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cewe-299n-sbfz
4
url VCID-g5ce-cbh7-w7c8
vulnerability_id VCID-g5ce-cbh7-w7c8
summary kernel: iavf: Fix NULL pointer dereference in iavf_get_link_ksettings
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50054.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50054.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50054
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.0768
published_at 2026-04-02T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07735
published_at 2026-04-04T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07701
published_at 2026-04-07T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.0776
published_at 2026-04-08T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07778
published_at 2026-04-11T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07764
published_at 2026-04-12T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07748
published_at 2026-04-13T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.22087
published_at 2026-04-29T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22318
published_at 2026-04-16T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.22312
published_at 2026-04-18T12:55:00Z
10
value 0.00074
scoring_system epss
scoring_elements 0.2226
published_at 2026-04-21T12:55:00Z
11
value 0.00074
scoring_system epss
scoring_elements 0.22111
published_at 2026-04-24T12:55:00Z
12
value 0.00074
scoring_system epss
scoring_elements 0.22099
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50054
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373531
reference_id 2373531
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373531
4
reference_url https://access.redhat.com/errata/RHSA-2022:7110
reference_id RHSA-2022:7110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7110
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2023:0334
reference_id RHSA-2023:0334
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0334
7
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
fixed_packages
aliases CVE-2022-50054
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g5ce-cbh7-w7c8
5
url VCID-sxuq-3azc-fqa2
vulnerability_id VCID-sxuq-3azc-fqa2
summary kernel: iavf: Fix reset error handling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50053.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50053.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50053
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02662
published_at 2026-04-02T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02691
published_at 2026-04-04T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02699
published_at 2026-04-07T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02701
published_at 2026-04-08T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02722
published_at 2026-04-09T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02695
published_at 2026-04-11T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.0268
published_at 2026-04-12T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02677
published_at 2026-04-13T12:55:00Z
8
value 0.00038
scoring_system epss
scoring_elements 0.11397
published_at 2026-04-21T12:55:00Z
9
value 0.00038
scoring_system epss
scoring_elements 0.11269
published_at 2026-04-16T12:55:00Z
10
value 0.00038
scoring_system epss
scoring_elements 0.1127
published_at 2026-04-18T12:55:00Z
11
value 0.00038
scoring_system epss
scoring_elements 0.11339
published_at 2026-04-24T12:55:00Z
12
value 0.00038
scoring_system epss
scoring_elements 0.11295
published_at 2026-04-26T12:55:00Z
13
value 0.0004
scoring_system epss
scoring_elements 0.1188
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50053
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50053
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373553
reference_id 2373553
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373553
5
reference_url https://access.redhat.com/errata/RHSA-2022:7110
reference_id RHSA-2022:7110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7110
6
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
7
reference_url https://access.redhat.com/errata/RHSA-2023:0334
reference_id RHSA-2023:0334
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0334
8
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
9
reference_url https://access.redhat.com/errata/RHSA-2026:10756
reference_id RHSA-2026:10756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10756
10
reference_url https://access.redhat.com/errata/RHSA-2026:9870
reference_id RHSA-2026:9870
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9870
fixed_packages
aliases CVE-2022-50053
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sxuq-3azc-fqa2
6
url VCID-wcxk-yf59-c3h2
vulnerability_id VCID-wcxk-yf59-c3h2
summary kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30594.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30594.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-30594
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06283
published_at 2026-04-04T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.0626
published_at 2026-04-07T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06305
published_at 2026-04-08T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06346
published_at 2026-04-09T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06264
published_at 2026-04-02T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.07008
published_at 2026-04-21T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.06995
published_at 2026-04-24T12:55:00Z
7
value 0.00025
scoring_system epss
scoring_elements 0.06998
published_at 2026-04-26T12:55:00Z
8
value 0.00025
scoring_system epss
scoring_elements 0.06963
published_at 2026-04-29T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.06959
published_at 2026-04-11T12:55:00Z
10
value 0.00025
scoring_system epss
scoring_elements 0.06951
published_at 2026-04-12T12:55:00Z
11
value 0.00025
scoring_system epss
scoring_elements 0.06946
published_at 2026-04-13T12:55:00Z
12
value 0.00025
scoring_system epss
scoring_elements 0.06882
published_at 2026-04-16T12:55:00Z
13
value 0.00025
scoring_system epss
scoring_elements 0.06865
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-30594
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
39
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
40
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2085300
reference_id 2085300
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2085300
41
reference_url https://access.redhat.com/errata/RHSA-2022:7318
reference_id RHSA-2022:7318
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7318
42
reference_url https://access.redhat.com/errata/RHSA-2022:7319
reference_id RHSA-2022:7319
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7319
43
reference_url https://access.redhat.com/errata/RHSA-2023:0300
reference_id RHSA-2023:0300
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0300
44
reference_url https://access.redhat.com/errata/RHSA-2023:0334
reference_id RHSA-2023:0334
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0334
45
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
46
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
47
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
48
reference_url https://usn.ubuntu.com/5442-1/
reference_id USN-5442-1
reference_type
scores
url https://usn.ubuntu.com/5442-1/
49
reference_url https://usn.ubuntu.com/5442-2/
reference_id USN-5442-2
reference_type
scores
url https://usn.ubuntu.com/5442-2/
50
reference_url https://usn.ubuntu.com/5443-1/
reference_id USN-5443-1
reference_type
scores
url https://usn.ubuntu.com/5443-1/
51
reference_url https://usn.ubuntu.com/5443-2/
reference_id USN-5443-2
reference_type
scores
url https://usn.ubuntu.com/5443-2/
52
reference_url https://usn.ubuntu.com/5465-1/
reference_id USN-5465-1
reference_type
scores
url https://usn.ubuntu.com/5465-1/
fixed_packages
aliases CVE-2022-30594
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wcxk-yf59-c3h2
7
url VCID-zt83-99kn-zkab
vulnerability_id VCID-zt83-99kn-zkab
summary kernel: watch queue race condition can lead to privilege escalation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2959.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2959.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2959
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.06687
published_at 2026-04-02T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.06731
published_at 2026-04-04T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06716
published_at 2026-04-07T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.06767
published_at 2026-04-08T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.06799
published_at 2026-04-09T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.06798
published_at 2026-04-11T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.06791
published_at 2026-04-12T12:55:00Z
7
value 0.00025
scoring_system epss
scoring_elements 0.06784
published_at 2026-04-13T12:55:00Z
8
value 0.00025
scoring_system epss
scoring_elements 0.06715
published_at 2026-04-16T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.06706
published_at 2026-04-18T12:55:00Z
10
value 0.00025
scoring_system epss
scoring_elements 0.06866
published_at 2026-04-21T12:55:00Z
11
value 0.00025
scoring_system epss
scoring_elements 0.06873
published_at 2026-04-24T12:55:00Z
12
value 0.00025
scoring_system epss
scoring_elements 0.06894
published_at 2026-04-26T12:55:00Z
13
value 0.00025
scoring_system epss
scoring_elements 0.06867
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2959
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2959
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2103681
reference_id 2103681
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2103681
5
reference_url https://access.redhat.com/errata/RHSA-2022:8973
reference_id RHSA-2022:8973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8973
6
reference_url https://access.redhat.com/errata/RHSA-2022:8974
reference_id RHSA-2022:8974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8974
7
reference_url https://access.redhat.com/errata/RHSA-2022:9082
reference_id RHSA-2022:9082
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9082
8
reference_url https://access.redhat.com/errata/RHSA-2023:0300
reference_id RHSA-2023:0300
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0300
9
reference_url https://access.redhat.com/errata/RHSA-2023:0334
reference_id RHSA-2023:0334
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0334
10
reference_url https://access.redhat.com/errata/RHSA-2023:0348
reference_id RHSA-2023:0348
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0348
11
reference_url https://usn.ubuntu.com/5594-1/
reference_id USN-5594-1
reference_type
scores
url https://usn.ubuntu.com/5594-1/
12
reference_url https://usn.ubuntu.com/5599-1/
reference_id USN-5599-1
reference_type
scores
url https://usn.ubuntu.com/5599-1/
13
reference_url https://usn.ubuntu.com/5602-1/
reference_id USN-5602-1
reference_type
scores
url https://usn.ubuntu.com/5602-1/
14
reference_url https://usn.ubuntu.com/5616-1/
reference_id USN-5616-1
reference_type
scores
url https://usn.ubuntu.com/5616-1/
15
reference_url https://usn.ubuntu.com/5623-1/
reference_id USN-5623-1
reference_type
scores
url https://usn.ubuntu.com/5623-1/
fixed_packages
aliases CVE-2022-2959
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zt83-99kn-zkab
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@5.14.0-162.12.1%3Farch=el9_1