Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@5.14.0-70.30.1?arch=el9_0
Typerpm
Namespaceredhat
Namekernel
Version5.14.0-70.30.1
Qualifiers
arch el9_0
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-2zjw-3duv-sbbq
vulnerability_id VCID-2zjw-3duv-sbbq
summary kernel: posix cpu timer use-after-free may lead to local privilege escalation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2585.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2585.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2585
reference_id
reference_type
scores
0
value 0.00412
scoring_system epss
scoring_elements 0.61399
published_at 2026-04-02T12:55:00Z
1
value 0.00412
scoring_system epss
scoring_elements 0.61463
published_at 2026-04-24T12:55:00Z
2
value 0.00412
scoring_system epss
scoring_elements 0.61427
published_at 2026-04-04T12:55:00Z
3
value 0.00412
scoring_system epss
scoring_elements 0.61397
published_at 2026-04-07T12:55:00Z
4
value 0.00412
scoring_system epss
scoring_elements 0.61443
published_at 2026-04-08T12:55:00Z
5
value 0.00412
scoring_system epss
scoring_elements 0.61459
published_at 2026-04-09T12:55:00Z
6
value 0.00412
scoring_system epss
scoring_elements 0.6148
published_at 2026-04-11T12:55:00Z
7
value 0.00412
scoring_system epss
scoring_elements 0.61467
published_at 2026-04-12T12:55:00Z
8
value 0.00412
scoring_system epss
scoring_elements 0.61449
published_at 2026-04-13T12:55:00Z
9
value 0.00412
scoring_system epss
scoring_elements 0.61488
published_at 2026-04-16T12:55:00Z
10
value 0.00412
scoring_system epss
scoring_elements 0.61492
published_at 2026-04-18T12:55:00Z
11
value 0.00412
scoring_system epss
scoring_elements 0.61476
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2585
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-02T17:22:39Z/
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2114874
reference_id 2114874
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2114874
12
reference_url https://www.openwall.com/lists/oss-security/2022/08/09/7
reference_id 7
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-02T17:22:39Z/
url https://www.openwall.com/lists/oss-security/2022/08/09/7
13
reference_url https://access.redhat.com/errata/RHSA-2022:7318
reference_id RHSA-2022:7318
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7318
14
reference_url https://access.redhat.com/errata/RHSA-2022:7319
reference_id RHSA-2022:7319
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7319
15
reference_url https://access.redhat.com/errata/RHSA-2022:7330
reference_id RHSA-2022:7330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7330
16
reference_url https://lore.kernel.org/lkml/20220809170751.164716-1-cascardo@canonical.com/T/#u
reference_id #u
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-02T17:22:39Z/
url https://lore.kernel.org/lkml/20220809170751.164716-1-cascardo@canonical.com/T/#u
17
reference_url https://ubuntu.com/security/notices/USN-5564-1
reference_id USN-5564-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-02T17:22:39Z/
url https://ubuntu.com/security/notices/USN-5564-1
18
reference_url https://usn.ubuntu.com/5564-1/
reference_id USN-5564-1
reference_type
scores
url https://usn.ubuntu.com/5564-1/
19
reference_url https://ubuntu.com/security/notices/USN-5565-1
reference_id USN-5565-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-02T17:22:39Z/
url https://ubuntu.com/security/notices/USN-5565-1
20
reference_url https://usn.ubuntu.com/5565-1/
reference_id USN-5565-1
reference_type
scores
url https://usn.ubuntu.com/5565-1/
21
reference_url https://ubuntu.com/security/notices/USN-5566-1
reference_id USN-5566-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-02T17:22:39Z/
url https://ubuntu.com/security/notices/USN-5566-1
22
reference_url https://usn.ubuntu.com/5566-1/
reference_id USN-5566-1
reference_type
scores
url https://usn.ubuntu.com/5566-1/
23
reference_url https://ubuntu.com/security/notices/USN-5567-1
reference_id USN-5567-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-02T17:22:39Z/
url https://ubuntu.com/security/notices/USN-5567-1
24
reference_url https://usn.ubuntu.com/5567-1/
reference_id USN-5567-1
reference_type
scores
url https://usn.ubuntu.com/5567-1/
fixed_packages
aliases CVE-2022-2585
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2zjw-3duv-sbbq
1
url VCID-8zmf-w8w9-bydm
vulnerability_id VCID-8zmf-w8w9-bydm
summary kernel: posix-cpu-timers: Cleanup CPU timers before freeing them during exec
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50095.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50095.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50095
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06356
published_at 2026-04-02T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06401
published_at 2026-04-04T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.0639
published_at 2026-04-07T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06437
published_at 2026-04-08T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06481
published_at 2026-04-09T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06475
published_at 2026-04-11T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06469
published_at 2026-04-12T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06458
published_at 2026-04-13T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.19723
published_at 2026-04-24T12:55:00Z
9
value 0.00064
scoring_system epss
scoring_elements 0.19812
published_at 2026-04-16T12:55:00Z
10
value 0.00064
scoring_system epss
scoring_elements 0.19816
published_at 2026-04-18T12:55:00Z
11
value 0.00064
scoring_system epss
scoring_elements 0.19827
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50095
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50095
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373693
reference_id 2373693
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373693
5
reference_url https://access.redhat.com/errata/RHSA-2022:7318
reference_id RHSA-2022:7318
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7318
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-50095
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8zmf-w8w9-bydm
2
url VCID-c1cc-6p4r-13d8
vulnerability_id VCID-c1cc-6p4r-13d8
summary kernel: cifs: fix handlecache and multiuser
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49281.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49281.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49281
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.02111
published_at 2026-04-24T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02049
published_at 2026-04-16T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.02062
published_at 2026-04-18T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02145
published_at 2026-04-21T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02099
published_at 2026-04-08T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02117
published_at 2026-04-09T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02094
published_at 2026-04-11T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02079
published_at 2026-04-12T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.02074
published_at 2026-04-13T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.08267
published_at 2026-04-02T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08319
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49281
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347860
reference_id 2347860
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347860
4
reference_url https://access.redhat.com/errata/RHSA-2022:7318
reference_id RHSA-2022:7318
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7318
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49281
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c1cc-6p4r-13d8
3
url VCID-wcxk-yf59-c3h2
vulnerability_id VCID-wcxk-yf59-c3h2
summary kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30594.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30594.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-30594
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06264
published_at 2026-04-02T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06283
published_at 2026-04-04T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.0626
published_at 2026-04-07T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06305
published_at 2026-04-08T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06346
published_at 2026-04-09T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.07008
published_at 2026-04-21T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.06995
published_at 2026-04-24T12:55:00Z
7
value 0.00025
scoring_system epss
scoring_elements 0.06959
published_at 2026-04-11T12:55:00Z
8
value 0.00025
scoring_system epss
scoring_elements 0.06951
published_at 2026-04-12T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.06946
published_at 2026-04-13T12:55:00Z
10
value 0.00025
scoring_system epss
scoring_elements 0.06882
published_at 2026-04-16T12:55:00Z
11
value 0.00025
scoring_system epss
scoring_elements 0.06865
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-30594
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
39
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
40
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2085300
reference_id 2085300
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2085300
41
reference_url https://access.redhat.com/errata/RHSA-2022:7318
reference_id RHSA-2022:7318
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7318
42
reference_url https://access.redhat.com/errata/RHSA-2022:7319
reference_id RHSA-2022:7319
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7319
43
reference_url https://access.redhat.com/errata/RHSA-2023:0300
reference_id RHSA-2023:0300
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0300
44
reference_url https://access.redhat.com/errata/RHSA-2023:0334
reference_id RHSA-2023:0334
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0334
45
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
46
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
47
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
48
reference_url https://usn.ubuntu.com/5442-1/
reference_id USN-5442-1
reference_type
scores
url https://usn.ubuntu.com/5442-1/
49
reference_url https://usn.ubuntu.com/5442-2/
reference_id USN-5442-2
reference_type
scores
url https://usn.ubuntu.com/5442-2/
50
reference_url https://usn.ubuntu.com/5443-1/
reference_id USN-5443-1
reference_type
scores
url https://usn.ubuntu.com/5443-1/
51
reference_url https://usn.ubuntu.com/5443-2/
reference_id USN-5443-2
reference_type
scores
url https://usn.ubuntu.com/5443-2/
52
reference_url https://usn.ubuntu.com/5465-1/
reference_id USN-5465-1
reference_type
scores
url https://usn.ubuntu.com/5465-1/
fixed_packages
aliases CVE-2022-30594
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wcxk-yf59-c3h2
Fixing_vulnerabilities
Risk_score3.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@5.14.0-70.30.1%3Farch=el9_0