Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@5.14.0-162.18.1?arch=el9_1
Typerpm
Namespaceredhat
Namekernel
Version5.14.0-162.18.1
Qualifiers
arch el9_1
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-2na9-p1ae-2bdc
vulnerability_id VCID-2na9-p1ae-2bdc
summary kernel: use-after-free in __nfs42_ssc_open() in fs/nfs/nfs4file.c leading to remote Denial of Service attack
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4379.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4379.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-4379
reference_id
reference_type
scores
0
value 0.00358
scoring_system epss
scoring_elements 0.58033
published_at 2026-04-26T12:55:00Z
1
value 0.00358
scoring_system epss
scoring_elements 0.58017
published_at 2026-04-29T12:55:00Z
2
value 0.00358
scoring_system epss
scoring_elements 0.58039
published_at 2026-04-04T12:55:00Z
3
value 0.00358
scoring_system epss
scoring_elements 0.58015
published_at 2026-04-07T12:55:00Z
4
value 0.00358
scoring_system epss
scoring_elements 0.5807
published_at 2026-04-08T12:55:00Z
5
value 0.00358
scoring_system epss
scoring_elements 0.58073
published_at 2026-04-09T12:55:00Z
6
value 0.00358
scoring_system epss
scoring_elements 0.58089
published_at 2026-04-11T12:55:00Z
7
value 0.00358
scoring_system epss
scoring_elements 0.58067
published_at 2026-04-12T12:55:00Z
8
value 0.00358
scoring_system epss
scoring_elements 0.58046
published_at 2026-04-13T12:55:00Z
9
value 0.00358
scoring_system epss
scoring_elements 0.58076
published_at 2026-04-18T12:55:00Z
10
value 0.00358
scoring_system epss
scoring_elements 0.58053
published_at 2026-04-21T12:55:00Z
11
value 0.00358
scoring_system epss
scoring_elements 0.58019
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-4379
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4379
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://seclists.org/oss-sec/2022/q4/185
reference_id 185
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-08T18:38:30Z/
url https://seclists.org/oss-sec/2022/q4/185
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2152807
reference_id 2152807
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2152807
6
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
7
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
8
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
9
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
10
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=75333d48f92256a0dec91dbf07835e804fc411c0
reference_id ?id=75333d48f92256a0dec91dbf07835e804fc411c0
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-08T18:38:30Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=75333d48f92256a0dec91dbf07835e804fc411c0
11
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=aeba12b26c79fc35e07e511f692a8907037d95da
reference_id ?id=aeba12b26c79fc35e07e511f692a8907037d95da
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-08T18:38:30Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=aeba12b26c79fc35e07e511f692a8907037d95da
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LECFVUHKIRBV5JJBE3KQCLGKNYJPBRCN/
reference_id LECFVUHKIRBV5JJBE3KQCLGKNYJPBRCN
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-08T18:38:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LECFVUHKIRBV5JJBE3KQCLGKNYJPBRCN/
13
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-08T18:38:30Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAVD6JIILAVSRHZ4VXSV3RAAGUXKVXZA/
reference_id RAVD6JIILAVSRHZ4VXSV3RAAGUXKVXZA
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-08T18:38:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAVD6JIILAVSRHZ4VXSV3RAAGUXKVXZA/
15
reference_url https://access.redhat.com/errata/RHSA-2023:0951
reference_id RHSA-2023:0951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0951
16
reference_url https://access.redhat.com/errata/RHSA-2023:0979
reference_id RHSA-2023:0979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0979
17
reference_url https://access.redhat.com/errata/RHSA-2023:1008
reference_id RHSA-2023:1008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1008
18
reference_url https://access.redhat.com/errata/RHSA-2023:1202
reference_id RHSA-2023:1202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1202
19
reference_url https://access.redhat.com/errata/RHSA-2023:1203
reference_id RHSA-2023:1203
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1203
20
reference_url https://access.redhat.com/errata/RHSA-2023:1435
reference_id RHSA-2023:1435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1435
21
reference_url https://usn.ubuntu.com/5911-1/
reference_id USN-5911-1
reference_type
scores
url https://usn.ubuntu.com/5911-1/
22
reference_url https://usn.ubuntu.com/5912-1/
reference_id USN-5912-1
reference_type
scores
url https://usn.ubuntu.com/5912-1/
23
reference_url https://usn.ubuntu.com/5913-1/
reference_id USN-5913-1
reference_type
scores
url https://usn.ubuntu.com/5913-1/
24
reference_url https://usn.ubuntu.com/5914-1/
reference_id USN-5914-1
reference_type
scores
url https://usn.ubuntu.com/5914-1/
25
reference_url https://usn.ubuntu.com/5915-1/
reference_id USN-5915-1
reference_type
scores
url https://usn.ubuntu.com/5915-1/
26
reference_url https://usn.ubuntu.com/5929-1/
reference_id USN-5929-1
reference_type
scores
url https://usn.ubuntu.com/5929-1/
27
reference_url https://usn.ubuntu.com/5935-1/
reference_id USN-5935-1
reference_type
scores
url https://usn.ubuntu.com/5935-1/
28
reference_url https://usn.ubuntu.com/5938-1/
reference_id USN-5938-1
reference_type
scores
url https://usn.ubuntu.com/5938-1/
29
reference_url https://usn.ubuntu.com/5941-1/
reference_id USN-5941-1
reference_type
scores
url https://usn.ubuntu.com/5941-1/
30
reference_url https://usn.ubuntu.com/5950-1/
reference_id USN-5950-1
reference_type
scores
url https://usn.ubuntu.com/5950-1/
31
reference_url https://usn.ubuntu.com/5962-1/
reference_id USN-5962-1
reference_type
scores
url https://usn.ubuntu.com/5962-1/
fixed_packages
aliases CVE-2022-4379
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2na9-p1ae-2bdc
1
url VCID-8834-7b7n-a7f1
vulnerability_id VCID-8834-7b7n-a7f1
summary kernel: stack overflow in do_proc_dointvec and proc_skip_spaces
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4378.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4378.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-4378
reference_id
reference_type
scores
0
value 0.00028
scoring_system epss
scoring_elements 0.07917
published_at 2026-04-24T12:55:00Z
1
value 0.00028
scoring_system epss
scoring_elements 0.07885
published_at 2026-04-26T12:55:00Z
2
value 0.00028
scoring_system epss
scoring_elements 0.07958
published_at 2026-04-21T12:55:00Z
3
value 0.00028
scoring_system epss
scoring_elements 0.07856
published_at 2026-04-29T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.08953
published_at 2026-04-18T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09039
published_at 2026-04-02T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.0909
published_at 2026-04-04T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09014
published_at 2026-04-07T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.09093
published_at 2026-04-08T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.09124
published_at 2026-04-09T12:55:00Z
10
value 0.00032
scoring_system epss
scoring_elements 0.09125
published_at 2026-04-11T12:55:00Z
11
value 0.00032
scoring_system epss
scoring_elements 0.09094
published_at 2026-04-12T12:55:00Z
12
value 0.00032
scoring_system epss
scoring_elements 0.0908
published_at 2026-04-13T12:55:00Z
13
value 0.00032
scoring_system epss
scoring_elements 0.08975
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-4378
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4378
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://seclists.org/oss-sec/2022/q4/178
reference_id 178
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-10T14:19:16Z/
url https://seclists.org/oss-sec/2022/q4/178
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2152548
reference_id 2152548
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-10T14:19:16Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2152548
6
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
7
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
8
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
9
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
10
reference_url http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html
reference_id Kernel-Live-Patch-Security-Notice-LNS-0092-1.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-10T14:19:16Z/
url http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html
11
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-6.0/proc-avoid-integer-type-confusion-in-get_proc_long.patch
reference_id proc-avoid-integer-type-confusion-in-get_proc_long.patch
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-10T14:19:16Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-6.0/proc-avoid-integer-type-confusion-in-get_proc_long.patch
12
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-6.0/proc-proc_skip_spaces-shouldn-t-think-it-is-working-on-c-strings.patch
reference_id proc-proc_skip_spaces-shouldn-t-think-it-is-working-on-c-strings.patch
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-10T14:19:16Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-6.0/proc-proc_skip_spaces-shouldn-t-think-it-is-working-on-c-strings.patch
13
reference_url https://access.redhat.com/errata/RHSA-2023:0856
reference_id RHSA-2023:0856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0856
14
reference_url https://access.redhat.com/errata/RHSA-2023:0858
reference_id RHSA-2023:0858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0858
15
reference_url https://access.redhat.com/errata/RHSA-2023:0944
reference_id RHSA-2023:0944
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0944
16
reference_url https://access.redhat.com/errata/RHSA-2023:0945
reference_id RHSA-2023:0945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0945
17
reference_url https://access.redhat.com/errata/RHSA-2023:0951
reference_id RHSA-2023:0951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0951
18
reference_url https://access.redhat.com/errata/RHSA-2023:0979
reference_id RHSA-2023:0979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0979
19
reference_url https://access.redhat.com/errata/RHSA-2023:1008
reference_id RHSA-2023:1008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1008
20
reference_url https://access.redhat.com/errata/RHSA-2023:1091
reference_id RHSA-2023:1091
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1091
21
reference_url https://access.redhat.com/errata/RHSA-2023:1092
reference_id RHSA-2023:1092
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1092
22
reference_url https://access.redhat.com/errata/RHSA-2023:1101
reference_id RHSA-2023:1101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1101
23
reference_url https://access.redhat.com/errata/RHSA-2023:1103
reference_id RHSA-2023:1103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1103
24
reference_url https://access.redhat.com/errata/RHSA-2023:1109
reference_id RHSA-2023:1109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1109
25
reference_url https://access.redhat.com/errata/RHSA-2023:1110
reference_id RHSA-2023:1110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1110
26
reference_url https://access.redhat.com/errata/RHSA-2023:1202
reference_id RHSA-2023:1202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1202
27
reference_url https://access.redhat.com/errata/RHSA-2023:1203
reference_id RHSA-2023:1203
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1203
28
reference_url https://access.redhat.com/errata/RHSA-2023:1220
reference_id RHSA-2023:1220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1220
29
reference_url https://access.redhat.com/errata/RHSA-2023:1221
reference_id RHSA-2023:1221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1221
30
reference_url https://access.redhat.com/errata/RHSA-2023:1251
reference_id RHSA-2023:1251
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1251
31
reference_url https://access.redhat.com/errata/RHSA-2023:1435
reference_id RHSA-2023:1435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1435
32
reference_url https://access.redhat.com/errata/RHSA-2023:1566
reference_id RHSA-2023:1566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1566
33
reference_url https://access.redhat.com/errata/RHSA-2023:1584
reference_id RHSA-2023:1584
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1584
34
reference_url https://access.redhat.com/errata/RHSA-2023:1659
reference_id RHSA-2023:1659
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1659
35
reference_url https://access.redhat.com/errata/RHSA-2023:1705
reference_id RHSA-2023:1705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1705
36
reference_url https://access.redhat.com/errata/RHSA-2023:1706
reference_id RHSA-2023:1706
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1706
37
reference_url https://access.redhat.com/errata/RHSA-2023:1822
reference_id RHSA-2023:1822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1822
38
reference_url https://access.redhat.com/errata/RHSA-2023:3388
reference_id RHSA-2023:3388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3388
39
reference_url https://access.redhat.com/errata/RHSA-2023:3431
reference_id RHSA-2023:3431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3431
40
reference_url https://access.redhat.com/errata/RHSA-2023:3491
reference_id RHSA-2023:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3491
41
reference_url https://usn.ubuntu.com/5799-1/
reference_id USN-5799-1
reference_type
scores
url https://usn.ubuntu.com/5799-1/
42
reference_url https://usn.ubuntu.com/5803-1/
reference_id USN-5803-1
reference_type
scores
url https://usn.ubuntu.com/5803-1/
43
reference_url https://usn.ubuntu.com/5809-1/
reference_id USN-5809-1
reference_type
scores
url https://usn.ubuntu.com/5809-1/
44
reference_url https://usn.ubuntu.com/5814-1/
reference_id USN-5814-1
reference_type
scores
url https://usn.ubuntu.com/5814-1/
45
reference_url https://usn.ubuntu.com/5831-1/
reference_id USN-5831-1
reference_type
scores
url https://usn.ubuntu.com/5831-1/
46
reference_url https://usn.ubuntu.com/5832-1/
reference_id USN-5832-1
reference_type
scores
url https://usn.ubuntu.com/5832-1/
47
reference_url https://usn.ubuntu.com/5860-1/
reference_id USN-5860-1
reference_type
scores
url https://usn.ubuntu.com/5860-1/
48
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
49
reference_url https://usn.ubuntu.com/5879-1/
reference_id USN-5879-1
reference_type
scores
url https://usn.ubuntu.com/5879-1/
50
reference_url https://usn.ubuntu.com/5883-1/
reference_id USN-5883-1
reference_type
scores
url https://usn.ubuntu.com/5883-1/
51
reference_url https://usn.ubuntu.com/5919-1/
reference_id USN-5919-1
reference_type
scores
url https://usn.ubuntu.com/5919-1/
52
reference_url https://usn.ubuntu.com/5920-1/
reference_id USN-5920-1
reference_type
scores
url https://usn.ubuntu.com/5920-1/
fixed_packages
aliases CVE-2022-4378
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8834-7b7n-a7f1
2
url VCID-ensk-7dvm-p7g7
vulnerability_id VCID-ensk-7dvm-p7g7
summary kernel: an out-of-bounds vulnerability in i2c-ismt driver
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2873.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2873.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2873
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.12054
published_at 2026-04-29T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.12109
published_at 2026-04-16T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.12113
published_at 2026-04-18T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.12224
published_at 2026-04-21T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.12202
published_at 2026-04-24T12:55:00Z
5
value 0.0004
scoring_system epss
scoring_elements 0.12167
published_at 2026-04-26T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.1231
published_at 2026-04-02T12:55:00Z
7
value 0.0004
scoring_system epss
scoring_elements 0.12358
published_at 2026-04-04T12:55:00Z
8
value 0.0004
scoring_system epss
scoring_elements 0.12156
published_at 2026-04-07T12:55:00Z
9
value 0.0004
scoring_system epss
scoring_elements 0.12235
published_at 2026-04-08T12:55:00Z
10
value 0.0004
scoring_system epss
scoring_elements 0.12285
published_at 2026-04-09T12:55:00Z
11
value 0.0004
scoring_system epss
scoring_elements 0.12293
published_at 2026-04-11T12:55:00Z
12
value 0.0004
scoring_system epss
scoring_elements 0.12256
published_at 2026-04-12T12:55:00Z
13
value 0.0004
scoring_system epss
scoring_elements 0.12219
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2873
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2119048
reference_id 2119048
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2119048
17
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
18
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
19
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
20
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
21
reference_url https://access.redhat.com/errata/RHSA-2023:0832
reference_id RHSA-2023:0832
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0832
22
reference_url https://access.redhat.com/errata/RHSA-2023:0854
reference_id RHSA-2023:0854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0854
23
reference_url https://access.redhat.com/errata/RHSA-2023:0951
reference_id RHSA-2023:0951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0951
24
reference_url https://access.redhat.com/errata/RHSA-2023:0979
reference_id RHSA-2023:0979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0979
25
reference_url https://access.redhat.com/errata/RHSA-2023:5627
reference_id RHSA-2023:5627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5627
26
reference_url https://usn.ubuntu.com/5594-1/
reference_id USN-5594-1
reference_type
scores
url https://usn.ubuntu.com/5594-1/
27
reference_url https://usn.ubuntu.com/5599-1/
reference_id USN-5599-1
reference_type
scores
url https://usn.ubuntu.com/5599-1/
28
reference_url https://usn.ubuntu.com/5602-1/
reference_id USN-5602-1
reference_type
scores
url https://usn.ubuntu.com/5602-1/
29
reference_url https://usn.ubuntu.com/5616-1/
reference_id USN-5616-1
reference_type
scores
url https://usn.ubuntu.com/5616-1/
30
reference_url https://usn.ubuntu.com/5623-1/
reference_id USN-5623-1
reference_type
scores
url https://usn.ubuntu.com/5623-1/
fixed_packages
aliases CVE-2022-2873
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ensk-7dvm-p7g7
3
url VCID-fstk-hcn8-3bc5
vulnerability_id VCID-fstk-hcn8-3bc5
summary kernel: Revert "usb: typec: ucsi: add a common function ucsi_unregister_connectors()"
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49944.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49944.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49944
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.0768
published_at 2026-04-02T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07735
published_at 2026-04-04T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07701
published_at 2026-04-07T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.0776
published_at 2026-04-08T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07778
published_at 2026-04-11T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07764
published_at 2026-04-12T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07748
published_at 2026-04-13T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.22087
published_at 2026-04-29T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22318
published_at 2026-04-16T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.22312
published_at 2026-04-18T12:55:00Z
10
value 0.00074
scoring_system epss
scoring_elements 0.2226
published_at 2026-04-21T12:55:00Z
11
value 0.00074
scoring_system epss
scoring_elements 0.22111
published_at 2026-04-24T12:55:00Z
12
value 0.00074
scoring_system epss
scoring_elements 0.22099
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49944
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373608
reference_id 2373608
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373608
4
reference_url https://access.redhat.com/errata/RHSA-2023:0951
reference_id RHSA-2023:0951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0951
5
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
6
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
fixed_packages
aliases CVE-2022-49944
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fstk-hcn8-3bc5
4
url VCID-pphs-rtxe-wfca
vulnerability_id VCID-pphs-rtxe-wfca
summary kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3564.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3564.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3564
reference_id
reference_type
scores
0
value 0.00089
scoring_system epss
scoring_elements 0.25076
published_at 2026-04-29T12:55:00Z
1
value 0.00089
scoring_system epss
scoring_elements 0.25207
published_at 2026-04-18T12:55:00Z
2
value 0.00089
scoring_system epss
scoring_elements 0.25217
published_at 2026-04-16T12:55:00Z
3
value 0.00089
scoring_system epss
scoring_elements 0.25178
published_at 2026-04-21T12:55:00Z
4
value 0.00089
scoring_system epss
scoring_elements 0.25131
published_at 2026-04-24T12:55:00Z
5
value 0.00089
scoring_system epss
scoring_elements 0.2512
published_at 2026-04-26T12:55:00Z
6
value 0.00089
scoring_system epss
scoring_elements 0.25362
published_at 2026-04-02T12:55:00Z
7
value 0.00089
scoring_system epss
scoring_elements 0.25398
published_at 2026-04-04T12:55:00Z
8
value 0.00089
scoring_system epss
scoring_elements 0.25174
published_at 2026-04-07T12:55:00Z
9
value 0.00089
scoring_system epss
scoring_elements 0.25243
published_at 2026-04-08T12:55:00Z
10
value 0.00089
scoring_system epss
scoring_elements 0.25288
published_at 2026-04-09T12:55:00Z
11
value 0.00089
scoring_system epss
scoring_elements 0.25302
published_at 2026-04-11T12:55:00Z
12
value 0.00089
scoring_system epss
scoring_elements 0.2526
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3564
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3564
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2150999
reference_id 2150999
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2150999
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://access.redhat.com/errata/RHSA-2023:0856
reference_id RHSA-2023:0856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0856
10
reference_url https://access.redhat.com/errata/RHSA-2023:0858
reference_id RHSA-2023:0858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0858
11
reference_url https://access.redhat.com/errata/RHSA-2023:0951
reference_id RHSA-2023:0951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0951
12
reference_url https://access.redhat.com/errata/RHSA-2023:0979
reference_id RHSA-2023:0979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0979
13
reference_url https://access.redhat.com/errata/RHSA-2023:1008
reference_id RHSA-2023:1008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1008
14
reference_url https://access.redhat.com/errata/RHSA-2023:1202
reference_id RHSA-2023:1202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1202
15
reference_url https://access.redhat.com/errata/RHSA-2023:1203
reference_id RHSA-2023:1203
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1203
16
reference_url https://access.redhat.com/errata/RHSA-2023:1220
reference_id RHSA-2023:1220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1220
17
reference_url https://access.redhat.com/errata/RHSA-2023:1221
reference_id RHSA-2023:1221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1221
18
reference_url https://access.redhat.com/errata/RHSA-2023:1251
reference_id RHSA-2023:1251
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1251
19
reference_url https://access.redhat.com/errata/RHSA-2023:1435
reference_id RHSA-2023:1435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1435
20
reference_url https://access.redhat.com/errata/RHSA-2023:1559
reference_id RHSA-2023:1559
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1559
21
reference_url https://access.redhat.com/errata/RHSA-2023:1560
reference_id RHSA-2023:1560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1560
22
reference_url https://access.redhat.com/errata/RHSA-2023:1666
reference_id RHSA-2023:1666
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1666
23
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
24
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
25
reference_url https://access.redhat.com/errata/RHSA-2023:3277
reference_id RHSA-2023:3277
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3277
26
reference_url https://access.redhat.com/errata/RHSA-2023:3278
reference_id RHSA-2023:3278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3278
27
reference_url https://access.redhat.com/errata/RHSA-2023:3388
reference_id RHSA-2023:3388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3388
28
reference_url https://access.redhat.com/errata/RHSA-2023:3431
reference_id RHSA-2023:3431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3431
29
reference_url https://access.redhat.com/errata/RHSA-2023:3491
reference_id RHSA-2023:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3491
30
reference_url https://access.redhat.com/errata/RHSA-2023:4020
reference_id RHSA-2023:4020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4020
31
reference_url https://access.redhat.com/errata/RHSA-2023:4021
reference_id RHSA-2023:4021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4021
32
reference_url https://access.redhat.com/errata/RHSA-2023:4150
reference_id RHSA-2023:4150
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4150
33
reference_url https://access.redhat.com/errata/RHSA-2023:4151
reference_id RHSA-2023:4151
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4151
34
reference_url https://access.redhat.com/errata/RHSA-2023:4215
reference_id RHSA-2023:4215
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4215
35
reference_url https://usn.ubuntu.com/5754-1/
reference_id USN-5754-1
reference_type
scores
url https://usn.ubuntu.com/5754-1/
36
reference_url https://usn.ubuntu.com/5754-2/
reference_id USN-5754-2
reference_type
scores
url https://usn.ubuntu.com/5754-2/
37
reference_url https://usn.ubuntu.com/5755-1/
reference_id USN-5755-1
reference_type
scores
url https://usn.ubuntu.com/5755-1/
38
reference_url https://usn.ubuntu.com/5755-2/
reference_id USN-5755-2
reference_type
scores
url https://usn.ubuntu.com/5755-2/
39
reference_url https://usn.ubuntu.com/5756-1/
reference_id USN-5756-1
reference_type
scores
url https://usn.ubuntu.com/5756-1/
40
reference_url https://usn.ubuntu.com/5756-2/
reference_id USN-5756-2
reference_type
scores
url https://usn.ubuntu.com/5756-2/
41
reference_url https://usn.ubuntu.com/5756-3/
reference_id USN-5756-3
reference_type
scores
url https://usn.ubuntu.com/5756-3/
42
reference_url https://usn.ubuntu.com/5757-1/
reference_id USN-5757-1
reference_type
scores
url https://usn.ubuntu.com/5757-1/
43
reference_url https://usn.ubuntu.com/5757-2/
reference_id USN-5757-2
reference_type
scores
url https://usn.ubuntu.com/5757-2/
44
reference_url https://usn.ubuntu.com/5758-1/
reference_id USN-5758-1
reference_type
scores
url https://usn.ubuntu.com/5758-1/
45
reference_url https://usn.ubuntu.com/5773-1/
reference_id USN-5773-1
reference_type
scores
url https://usn.ubuntu.com/5773-1/
46
reference_url https://usn.ubuntu.com/5774-1/
reference_id USN-5774-1
reference_type
scores
url https://usn.ubuntu.com/5774-1/
47
reference_url https://usn.ubuntu.com/5779-1/
reference_id USN-5779-1
reference_type
scores
url https://usn.ubuntu.com/5779-1/
48
reference_url https://usn.ubuntu.com/5789-1/
reference_id USN-5789-1
reference_type
scores
url https://usn.ubuntu.com/5789-1/
fixed_packages
aliases CVE-2022-3564
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pphs-rtxe-wfca
5
url VCID-ubvg-bccu-mye8
vulnerability_id VCID-ubvg-bccu-mye8
summary kernel: Netfilter integer overflow vulnerability in nft_payload_copy_vlan
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0179.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0179.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0179
reference_id
reference_type
scores
0
value 0.0048
scoring_system epss
scoring_elements 0.65097
published_at 2026-04-09T12:55:00Z
1
value 0.0048
scoring_system epss
scoring_elements 0.65045
published_at 2026-04-02T12:55:00Z
2
value 0.0048
scoring_system epss
scoring_elements 0.65072
published_at 2026-04-04T12:55:00Z
3
value 0.0048
scoring_system epss
scoring_elements 0.65034
published_at 2026-04-07T12:55:00Z
4
value 0.0048
scoring_system epss
scoring_elements 0.65084
published_at 2026-04-08T12:55:00Z
5
value 0.0048
scoring_system epss
scoring_elements 0.65116
published_at 2026-04-11T12:55:00Z
6
value 0.0048
scoring_system epss
scoring_elements 0.65106
published_at 2026-04-12T12:55:00Z
7
value 0.0048
scoring_system epss
scoring_elements 0.65078
published_at 2026-04-13T12:55:00Z
8
value 0.00557
scoring_system epss
scoring_elements 0.68223
published_at 2026-04-16T12:55:00Z
9
value 0.00557
scoring_system epss
scoring_elements 0.68257
published_at 2026-04-24T12:55:00Z
10
value 0.00557
scoring_system epss
scoring_elements 0.68265
published_at 2026-04-26T12:55:00Z
11
value 0.00557
scoring_system epss
scoring_elements 0.68214
published_at 2026-04-21T12:55:00Z
12
value 0.00557
scoring_system epss
scoring_elements 0.68234
published_at 2026-04-18T12:55:00Z
13
value 0.00576
scoring_system epss
scoring_elements 0.68863
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0179
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://seclists.org/oss-sec/2023/q1/20
reference_id 20
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-19T16:11:54Z/
url https://seclists.org/oss-sec/2023/q1/20
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2161713
reference_id 2161713
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-19T16:11:54Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2161713
18
reference_url http://packetstormsecurity.com/files/171601/Kernel-Live-Patch-Security-Notice-LNS-0093-1.html
reference_id Kernel-Live-Patch-Security-Notice-LNS-0093-1.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-19T16:11:54Z/
url http://packetstormsecurity.com/files/171601/Kernel-Live-Patch-Security-Notice-LNS-0093-1.html
19
reference_url https://security.netapp.com/advisory/ntap-20230511-0003/
reference_id ntap-20230511-0003
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-19T16:11:54Z/
url https://security.netapp.com/advisory/ntap-20230511-0003/
20
reference_url https://access.redhat.com/errata/RHSA-2023:0951
reference_id RHSA-2023:0951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0951
21
reference_url https://access.redhat.com/errata/RHSA-2023:0979
reference_id RHSA-2023:0979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0979
22
reference_url https://access.redhat.com/errata/RHSA-2023:1008
reference_id RHSA-2023:1008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1008
23
reference_url https://access.redhat.com/errata/RHSA-2023:1202
reference_id RHSA-2023:1202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1202
24
reference_url https://access.redhat.com/errata/RHSA-2023:1203
reference_id RHSA-2023:1203
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1203
25
reference_url https://access.redhat.com/errata/RHSA-2023:1435
reference_id RHSA-2023:1435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1435
26
reference_url https://usn.ubuntu.com/5856-1/
reference_id USN-5856-1
reference_type
scores
url https://usn.ubuntu.com/5856-1/
27
reference_url https://usn.ubuntu.com/5857-1/
reference_id USN-5857-1
reference_type
scores
url https://usn.ubuntu.com/5857-1/
28
reference_url https://usn.ubuntu.com/5858-1/
reference_id USN-5858-1
reference_type
scores
url https://usn.ubuntu.com/5858-1/
29
reference_url https://usn.ubuntu.com/5859-1/
reference_id USN-5859-1
reference_type
scores
url https://usn.ubuntu.com/5859-1/
30
reference_url https://usn.ubuntu.com/5911-1/
reference_id USN-5911-1
reference_type
scores
url https://usn.ubuntu.com/5911-1/
31
reference_url https://usn.ubuntu.com/5912-1/
reference_id USN-5912-1
reference_type
scores
url https://usn.ubuntu.com/5912-1/
32
reference_url https://usn.ubuntu.com/5915-1/
reference_id USN-5915-1
reference_type
scores
url https://usn.ubuntu.com/5915-1/
33
reference_url https://usn.ubuntu.com/5929-1/
reference_id USN-5929-1
reference_type
scores
url https://usn.ubuntu.com/5929-1/
34
reference_url https://usn.ubuntu.com/5935-1/
reference_id USN-5935-1
reference_type
scores
url https://usn.ubuntu.com/5935-1/
35
reference_url https://usn.ubuntu.com/5938-1/
reference_id USN-5938-1
reference_type
scores
url https://usn.ubuntu.com/5938-1/
36
reference_url https://usn.ubuntu.com/5941-1/
reference_id USN-5941-1
reference_type
scores
url https://usn.ubuntu.com/5941-1/
37
reference_url https://usn.ubuntu.com/5950-1/
reference_id USN-5950-1
reference_type
scores
url https://usn.ubuntu.com/5950-1/
38
reference_url https://usn.ubuntu.com/5962-1/
reference_id USN-5962-1
reference_type
scores
url https://usn.ubuntu.com/5962-1/
fixed_packages
aliases CVE-2023-0179
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ubvg-bccu-mye8
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@5.14.0-162.18.1%3Farch=el9_1