Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@5.14.0-70.22.1?arch=el9_0
Typerpm
Namespaceredhat
Namekernel
Version5.14.0-70.22.1
Qualifiers
arch el9_0
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-8vym-wkju-nkcb
vulnerability_id VCID-8vym-wkju-nkcb
summary kernel: information leak in scsi_ioctl()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0494.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0494.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0494
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05472
published_at 2026-04-01T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05506
published_at 2026-04-02T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05542
published_at 2026-04-04T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05541
published_at 2026-04-07T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05579
published_at 2026-04-08T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05603
published_at 2026-04-09T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05575
published_at 2026-04-11T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05563
published_at 2026-04-12T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05556
published_at 2026-04-13T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.07013
published_at 2026-04-26T12:55:00Z
10
value 0.00025
scoring_system epss
scoring_elements 0.06908
published_at 2026-04-16T12:55:00Z
11
value 0.00025
scoring_system epss
scoring_elements 0.06892
published_at 2026-04-18T12:55:00Z
12
value 0.00025
scoring_system epss
scoring_elements 0.07027
published_at 2026-04-21T12:55:00Z
13
value 0.00025
scoring_system epss
scoring_elements 0.0701
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0494
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
45
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
46
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039448
reference_id 2039448
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039448
47
reference_url https://access.redhat.com/errata/RHSA-2022:6002
reference_id RHSA-2022:6002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6002
48
reference_url https://access.redhat.com/errata/RHSA-2022:6003
reference_id RHSA-2022:6003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6003
49
reference_url https://access.redhat.com/errata/RHSA-2022:6243
reference_id RHSA-2022:6243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6243
50
reference_url https://access.redhat.com/errata/RHSA-2022:6248
reference_id RHSA-2022:6248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6248
51
reference_url https://access.redhat.com/errata/RHSA-2022:7110
reference_id RHSA-2022:7110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7110
52
reference_url https://access.redhat.com/errata/RHSA-2022:7134
reference_id RHSA-2022:7134
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7134
53
reference_url https://usn.ubuntu.com/5381-1/
reference_id USN-5381-1
reference_type
scores
url https://usn.ubuntu.com/5381-1/
54
reference_url https://usn.ubuntu.com/5560-1/
reference_id USN-5560-1
reference_type
scores
url https://usn.ubuntu.com/5560-1/
55
reference_url https://usn.ubuntu.com/5560-2/
reference_id USN-5560-2
reference_type
scores
url https://usn.ubuntu.com/5560-2/
56
reference_url https://usn.ubuntu.com/5562-1/
reference_id USN-5562-1
reference_type
scores
url https://usn.ubuntu.com/5562-1/
57
reference_url https://usn.ubuntu.com/5582-1/
reference_id USN-5582-1
reference_type
scores
url https://usn.ubuntu.com/5582-1/
58
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
59
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
60
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
fixed_packages
aliases CVE-2022-0494
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8vym-wkju-nkcb
1
url VCID-gx5c-b8jv-nqae
vulnerability_id VCID-gx5c-b8jv-nqae
summary kernel: NFSv4: Fix free of uninitialized nfs4_label on referral lookup.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49418.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49418.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49418
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11337
published_at 2026-04-02T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11394
published_at 2026-04-04T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19023
published_at 2026-04-09T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.1903
published_at 2026-04-11T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.18983
published_at 2026-04-12T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.18932
published_at 2026-04-13T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.18886
published_at 2026-04-16T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.18899
published_at 2026-04-18T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.18911
published_at 2026-04-21T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.188
published_at 2026-04-24T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.1878
published_at 2026-04-26T12:55:00Z
11
value 0.00061
scoring_system epss
scoring_elements 0.1889
published_at 2026-04-07T12:55:00Z
12
value 0.00061
scoring_system epss
scoring_elements 0.18969
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49418
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348347
reference_id 2348347
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348347
4
reference_url https://access.redhat.com/errata/RHSA-2022:6003
reference_id RHSA-2022:6003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6003
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49418
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gx5c-b8jv-nqae
2
url VCID-nssg-bpjj-d3be
vulnerability_id VCID-nssg-bpjj-d3be
summary kernel: KVM: x86/mmu: make apf token non-zero to fix bug
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48943.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48943.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-48943
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.0739
published_at 2026-04-16T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07454
published_at 2026-04-26T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07478
published_at 2026-04-12T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07466
published_at 2026-04-13T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07376
published_at 2026-04-18T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07505
published_at 2026-04-21T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07464
published_at 2026-04-24T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07434
published_at 2026-04-04T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07416
published_at 2026-04-07T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07472
published_at 2026-04-08T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07496
published_at 2026-04-09T12:55:00Z
11
value 0.00027
scoring_system epss
scoring_elements 0.0749
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-48943
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48943
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48943
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2307199
reference_id 2307199
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2307199
5
reference_url https://git.kernel.org/stable/c/4c3644b6c96c5daa5149e5abddc07234eea47c7c
reference_id 4c3644b6c96c5daa5149e5abddc07234eea47c7c
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:33:08Z/
url https://git.kernel.org/stable/c/4c3644b6c96c5daa5149e5abddc07234eea47c7c
6
reference_url https://git.kernel.org/stable/c/62040f5cd7d937de547836e747b6aa8212fec573
reference_id 62040f5cd7d937de547836e747b6aa8212fec573
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:33:08Z/
url https://git.kernel.org/stable/c/62040f5cd7d937de547836e747b6aa8212fec573
7
reference_url https://git.kernel.org/stable/c/6f3c1fc53d86d580d8d6d749c4af23705e4f6f79
reference_id 6f3c1fc53d86d580d8d6d749c4af23705e4f6f79
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:33:08Z/
url https://git.kernel.org/stable/c/6f3c1fc53d86d580d8d6d749c4af23705e4f6f79
8
reference_url https://git.kernel.org/stable/c/72fdfc75d4217b32363cc80def3de2cb3fef3f02
reference_id 72fdfc75d4217b32363cc80def3de2cb3fef3f02
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:33:08Z/
url https://git.kernel.org/stable/c/72fdfc75d4217b32363cc80def3de2cb3fef3f02
9
reference_url https://access.redhat.com/errata/RHSA-2022:6003
reference_id RHSA-2022:6003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6003
10
reference_url https://access.redhat.com/errata/RHSA-2022:6460
reference_id RHSA-2022:6460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6460
11
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
12
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
13
reference_url https://usn.ubuntu.com/7121-1/
reference_id USN-7121-1
reference_type
scores
url https://usn.ubuntu.com/7121-1/
14
reference_url https://usn.ubuntu.com/7121-2/
reference_id USN-7121-2
reference_type
scores
url https://usn.ubuntu.com/7121-2/
15
reference_url https://usn.ubuntu.com/7121-3/
reference_id USN-7121-3
reference_type
scores
url https://usn.ubuntu.com/7121-3/
16
reference_url https://usn.ubuntu.com/7122-1/
reference_id USN-7122-1
reference_type
scores
url https://usn.ubuntu.com/7122-1/
17
reference_url https://usn.ubuntu.com/7148-1/
reference_id USN-7148-1
reference_type
scores
url https://usn.ubuntu.com/7148-1/
18
reference_url https://usn.ubuntu.com/7159-1/
reference_id USN-7159-1
reference_type
scores
url https://usn.ubuntu.com/7159-1/
19
reference_url https://usn.ubuntu.com/7159-2/
reference_id USN-7159-2
reference_type
scores
url https://usn.ubuntu.com/7159-2/
20
reference_url https://usn.ubuntu.com/7159-3/
reference_id USN-7159-3
reference_type
scores
url https://usn.ubuntu.com/7159-3/
21
reference_url https://usn.ubuntu.com/7159-4/
reference_id USN-7159-4
reference_type
scores
url https://usn.ubuntu.com/7159-4/
22
reference_url https://usn.ubuntu.com/7159-5/
reference_id USN-7159-5
reference_type
scores
url https://usn.ubuntu.com/7159-5/
23
reference_url https://usn.ubuntu.com/7195-1/
reference_id USN-7195-1
reference_type
scores
url https://usn.ubuntu.com/7195-1/
24
reference_url https://usn.ubuntu.com/7195-2/
reference_id USN-7195-2
reference_type
scores
url https://usn.ubuntu.com/7195-2/
fixed_packages
aliases CVE-2022-48943
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nssg-bpjj-d3be
3
url VCID-t8e6-h3p4-sfar
vulnerability_id VCID-t8e6-h3p4-sfar
summary kernel: use-after-free in tc_new_tfilter() in net/sched/cls_api.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1055.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1055.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1055
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.0648
published_at 2026-04-26T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06301
published_at 2026-04-04T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06278
published_at 2026-04-07T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06324
published_at 2026-04-08T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06364
published_at 2026-04-09T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06357
published_at 2026-04-11T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06351
published_at 2026-04-12T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06341
published_at 2026-04-13T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06279
published_at 2026-04-16T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06292
published_at 2026-04-18T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06441
published_at 2026-04-21T12:55:00Z
11
value 0.00024
scoring_system epss
scoring_elements 0.06456
published_at 2026-04-24T12:55:00Z
12
value 0.00025
scoring_system epss
scoring_elements 0.06979
published_at 2026-04-02T12:55:00Z
13
value 0.00025
scoring_system epss
scoring_elements 0.06875
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1055
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1055
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1055
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://kernel.dance/#04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5
reference_id #04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-21T17:47:41Z/
url https://kernel.dance/#04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2070220
reference_id 2070220
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2070220
6
reference_url https://syzkaller.appspot.com/bug?id=2212474c958978ab86525fe6832ac8102c309ffc
reference_id bug?id=2212474c958978ab86525fe6832ac8102c309ffc
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-21T17:47:41Z/
url https://syzkaller.appspot.com/bug?id=2212474c958978ab86525fe6832ac8102c309ffc
7
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5
reference_id ?id=04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-21T17:47:41Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5
8
reference_url http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html
reference_id Kernel-Live-Patch-Security-Notice-LSN-0086-1.html
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-21T17:47:41Z/
url http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html
9
reference_url https://security.netapp.com/advisory/ntap-20220506-0007/
reference_id ntap-20220506-0007
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-21T17:47:41Z/
url https://security.netapp.com/advisory/ntap-20220506-0007/
10
reference_url https://access.redhat.com/errata/RHSA-2022:6002
reference_id RHSA-2022:6002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6002
11
reference_url https://access.redhat.com/errata/RHSA-2022:6003
reference_id RHSA-2022:6003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6003
12
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
13
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
14
reference_url https://access.redhat.com/errata/RHSA-2024:1188
reference_id RHSA-2024:1188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1188
15
reference_url https://usn.ubuntu.com/5358-1/
reference_id USN-5358-1
reference_type
scores
url https://usn.ubuntu.com/5358-1/
16
reference_url https://usn.ubuntu.com/5358-2/
reference_id USN-5358-2
reference_type
scores
url https://usn.ubuntu.com/5358-2/
17
reference_url https://usn.ubuntu.com/5368-1/
reference_id USN-5368-1
reference_type
scores
url https://usn.ubuntu.com/5368-1/
18
reference_url https://usn.ubuntu.com/5377-1/
reference_id USN-5377-1
reference_type
scores
url https://usn.ubuntu.com/5377-1/
fixed_packages
aliases CVE-2022-1055
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t8e6-h3p4-sfar
Fixing_vulnerabilities
Risk_score3.9
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@5.14.0-70.22.1%3Farch=el9_0