Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel-rt@5.14.0-284.11.1.rt14.296?arch=el9_2
Typerpm
Namespaceredhat
Namekernel-rt
Version5.14.0-284.11.1.rt14.296
Qualifiers
arch el9_2
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1b2u-7w7f-wudv
vulnerability_id VCID-1b2u-7w7f-wudv
summary kernel: use-after-free due to race condition in qdisc_graft()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0590.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0590.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0590
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01801
published_at 2026-04-07T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01804
published_at 2026-04-08T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01818
published_at 2026-04-09T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01789
published_at 2026-04-02T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02654
published_at 2026-04-18T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02766
published_at 2026-04-21T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02756
published_at 2026-04-24T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02744
published_at 2026-04-26T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02682
published_at 2026-04-11T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02668
published_at 2026-04-12T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02665
published_at 2026-04-13T12:55:00Z
11
value 0.00014
scoring_system epss
scoring_elements 0.02646
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0590
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0590
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2165741
reference_id 2165741
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2165741
5
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
6
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
7
reference_url https://access.redhat.com/errata/RHSA-2023:5627
reference_id RHSA-2023:5627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5627
8
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
9
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
10
reference_url https://access.redhat.com/errata/RHSA-2023:7382
reference_id RHSA-2023:7382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7382
11
reference_url https://access.redhat.com/errata/RHSA-2023:7389
reference_id RHSA-2023:7389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7389
12
reference_url https://usn.ubuntu.com/5850-1/
reference_id USN-5850-1
reference_type
scores
url https://usn.ubuntu.com/5850-1/
13
reference_url https://usn.ubuntu.com/5851-1/
reference_id USN-5851-1
reference_type
scores
url https://usn.ubuntu.com/5851-1/
14
reference_url https://usn.ubuntu.com/5860-1/
reference_id USN-5860-1
reference_type
scores
url https://usn.ubuntu.com/5860-1/
15
reference_url https://usn.ubuntu.com/5876-1/
reference_id USN-5876-1
reference_type
scores
url https://usn.ubuntu.com/5876-1/
16
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
17
reference_url https://usn.ubuntu.com/5878-1/
reference_id USN-5878-1
reference_type
scores
url https://usn.ubuntu.com/5878-1/
18
reference_url https://usn.ubuntu.com/5879-1/
reference_id USN-5879-1
reference_type
scores
url https://usn.ubuntu.com/5879-1/
19
reference_url https://usn.ubuntu.com/6284-1/
reference_id USN-6284-1
reference_type
scores
url https://usn.ubuntu.com/6284-1/
20
reference_url https://usn.ubuntu.com/6301-1/
reference_id USN-6301-1
reference_type
scores
url https://usn.ubuntu.com/6301-1/
21
reference_url https://usn.ubuntu.com/6312-1/
reference_id USN-6312-1
reference_type
scores
url https://usn.ubuntu.com/6312-1/
22
reference_url https://usn.ubuntu.com/6314-1/
reference_id USN-6314-1
reference_type
scores
url https://usn.ubuntu.com/6314-1/
23
reference_url https://usn.ubuntu.com/6331-1/
reference_id USN-6331-1
reference_type
scores
url https://usn.ubuntu.com/6331-1/
24
reference_url https://usn.ubuntu.com/6337-1/
reference_id USN-6337-1
reference_type
scores
url https://usn.ubuntu.com/6337-1/
fixed_packages
aliases CVE-2023-0590
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1b2u-7w7f-wudv
1
url VCID-1jsv-f7pv-4bbc
vulnerability_id VCID-1jsv-f7pv-4bbc
summary kernel: use-after-free in bss_ref_get in net/wireless/scan.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42720.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42720.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42720
reference_id
reference_type
scores
0
value 0.00599
scoring_system epss
scoring_elements 0.69509
published_at 2026-04-26T12:55:00Z
1
value 0.00599
scoring_system epss
scoring_elements 0.69451
published_at 2026-04-21T12:55:00Z
2
value 0.00599
scoring_system epss
scoring_elements 0.69502
published_at 2026-04-24T12:55:00Z
3
value 0.0065
scoring_system epss
scoring_elements 0.7078
published_at 2026-04-07T12:55:00Z
4
value 0.0065
scoring_system epss
scoring_elements 0.70824
published_at 2026-04-08T12:55:00Z
5
value 0.0065
scoring_system epss
scoring_elements 0.70805
published_at 2026-04-04T12:55:00Z
6
value 0.0065
scoring_system epss
scoring_elements 0.70787
published_at 2026-04-02T12:55:00Z
7
value 0.0065
scoring_system epss
scoring_elements 0.70884
published_at 2026-04-18T12:55:00Z
8
value 0.0065
scoring_system epss
scoring_elements 0.70878
published_at 2026-04-16T12:55:00Z
9
value 0.0065
scoring_system epss
scoring_elements 0.70833
published_at 2026-04-13T12:55:00Z
10
value 0.0065
scoring_system epss
scoring_elements 0.70848
published_at 2026-04-12T12:55:00Z
11
value 0.0065
scoring_system epss
scoring_elements 0.70863
published_at 2026-04-11T12:55:00Z
12
value 0.0065
scoring_system epss
scoring_elements 0.70841
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42720
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
19
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2134451
reference_id 2134451
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2134451
21
reference_url http://www.openwall.com/lists/oss-security/2022/10/13/5
reference_id 5
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-15T20:46:43Z/
url http://www.openwall.com/lists/oss-security/2022/10/13/5
22
reference_url https://security.archlinux.org/ASA-202210-1
reference_id ASA-202210-1
reference_type
scores
url https://security.archlinux.org/ASA-202210-1
23
reference_url https://security.archlinux.org/ASA-202210-2
reference_id ASA-202210-2
reference_type
scores
url https://security.archlinux.org/ASA-202210-2
24
reference_url https://security.archlinux.org/ASA-202210-3
reference_id ASA-202210-3
reference_type
scores
url https://security.archlinux.org/ASA-202210-3
25
reference_url https://security.archlinux.org/ASA-202210-4
reference_id ASA-202210-4
reference_type
scores
url https://security.archlinux.org/ASA-202210-4
26
reference_url https://security.archlinux.org/AVG-2800
reference_id AVG-2800
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2800
27
reference_url https://security.archlinux.org/AVG-2801
reference_id AVG-2801
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2801
28
reference_url https://security.archlinux.org/AVG-2802
reference_id AVG-2802
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2802
29
reference_url https://security.archlinux.org/AVG-2803
reference_id AVG-2803
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2803
30
reference_url https://www.debian.org/security/2022/dsa-5257
reference_id dsa-5257
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-15T20:46:43Z/
url https://www.debian.org/security/2022/dsa-5257
31
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY/
reference_id GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-15T20:46:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY/
32
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/wireless/wireless.git/commit/?id=0b7808818cb9df6680f98996b8e9a439fa7bcc2f
reference_id ?id=0b7808818cb9df6680f98996b8e9a439fa7bcc2f
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-15T20:46:43Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/wireless/wireless.git/commit/?id=0b7808818cb9df6680f98996b8e9a439fa7bcc2f
33
reference_url http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html
reference_id Kernel-Live-Patch-Security-Notice-LSN-0090-1.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-15T20:46:43Z/
url http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html
34
reference_url https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html
reference_id msg00001.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-15T20:46:43Z/
url https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html
35
reference_url https://security.netapp.com/advisory/ntap-20230203-0008/
reference_id ntap-20230203-0008
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-15T20:46:43Z/
url https://security.netapp.com/advisory/ntap-20230203-0008/
36
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
37
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
38
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
39
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
40
reference_url https://access.redhat.com/errata/RHSA-2024:1188
reference_id RHSA-2024:1188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1188
41
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2/
reference_id S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-15T20:46:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2/
42
reference_url https://bugzilla.suse.com/show_bug.cgi?id=1204059
reference_id show_bug.cgi?id=1204059
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-15T20:46:43Z/
url https://bugzilla.suse.com/show_bug.cgi?id=1204059
43
reference_url https://usn.ubuntu.com/5691-1/
reference_id USN-5691-1
reference_type
scores
url https://usn.ubuntu.com/5691-1/
44
reference_url https://usn.ubuntu.com/5692-1/
reference_id USN-5692-1
reference_type
scores
url https://usn.ubuntu.com/5692-1/
45
reference_url https://usn.ubuntu.com/5693-1/
reference_id USN-5693-1
reference_type
scores
url https://usn.ubuntu.com/5693-1/
46
reference_url https://usn.ubuntu.com/5700-1/
reference_id USN-5700-1
reference_type
scores
url https://usn.ubuntu.com/5700-1/
47
reference_url https://usn.ubuntu.com/5708-1/
reference_id USN-5708-1
reference_type
scores
url https://usn.ubuntu.com/5708-1/
48
reference_url https://usn.ubuntu.com/5752-1/
reference_id USN-5752-1
reference_type
scores
url https://usn.ubuntu.com/5752-1/
49
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR/
reference_id VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-15T20:46:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR/
fixed_packages
aliases CVE-2022-42720
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1jsv-f7pv-4bbc
2
url VCID-4nqf-ct5y-6uev
vulnerability_id VCID-4nqf-ct5y-6uev
summary kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42896.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42896.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42896
reference_id
reference_type
scores
0
value 0.00421
scoring_system epss
scoring_elements 0.62017
published_at 2026-04-26T12:55:00Z
1
value 0.00421
scoring_system epss
scoring_elements 0.61966
published_at 2026-04-08T12:55:00Z
2
value 0.00421
scoring_system epss
scoring_elements 0.61983
published_at 2026-04-09T12:55:00Z
3
value 0.00421
scoring_system epss
scoring_elements 0.62004
published_at 2026-04-11T12:55:00Z
4
value 0.00421
scoring_system epss
scoring_elements 0.61994
published_at 2026-04-12T12:55:00Z
5
value 0.00421
scoring_system epss
scoring_elements 0.61973
published_at 2026-04-13T12:55:00Z
6
value 0.00421
scoring_system epss
scoring_elements 0.62015
published_at 2026-04-16T12:55:00Z
7
value 0.00421
scoring_system epss
scoring_elements 0.62021
published_at 2026-04-18T12:55:00Z
8
value 0.00421
scoring_system epss
scoring_elements 0.62003
published_at 2026-04-21T12:55:00Z
9
value 0.00421
scoring_system epss
scoring_elements 0.62
published_at 2026-04-24T12:55:00Z
10
value 0.00421
scoring_system epss
scoring_elements 0.61916
published_at 2026-04-07T12:55:00Z
11
value 0.00421
scoring_system epss
scoring_elements 0.61946
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42896
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42896
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42896
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2147364
reference_id 2147364
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2147364
5
reference_url https://kernel.dance/#711f8c3fb3db61897080468586b970c87c61d9e4
reference_id #711f8c3fb3db61897080468586b970c87c61d9e4
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:37:08Z/
url https://kernel.dance/#711f8c3fb3db61897080468586b970c87c61d9e4
6
reference_url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4
reference_id 711f8c3fb3db61897080468586b970c87c61d9e4
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:37:08Z/
url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4
7
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
8
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
9
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
10
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
11
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
12
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
13
reference_url https://access.redhat.com/errata/RHSA-2023:3461
reference_id RHSA-2023:3461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3461
14
reference_url https://access.redhat.com/errata/RHSA-2023:3462
reference_id RHSA-2023:3462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3462
15
reference_url https://access.redhat.com/errata/RHSA-2023:3517
reference_id RHSA-2023:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3517
16
reference_url https://access.redhat.com/errata/RHSA-2023:4137
reference_id RHSA-2023:4137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4137
17
reference_url https://access.redhat.com/errata/RHSA-2023:4138
reference_id RHSA-2023:4138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4138
18
reference_url https://access.redhat.com/errata/RHSA-2023:4230
reference_id RHSA-2023:4230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4230
19
reference_url https://access.redhat.com/errata/RHSA-2023:4517
reference_id RHSA-2023:4517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4517
20
reference_url https://access.redhat.com/errata/RHSA-2023:4531
reference_id RHSA-2023:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4531
21
reference_url https://access.redhat.com/errata/RHSA-2023:4541
reference_id RHSA-2023:4541
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4541
22
reference_url https://access.redhat.com/errata/RHSA-2023:4789
reference_id RHSA-2023:4789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4789
23
reference_url https://access.redhat.com/errata/RHSA-2023:4888
reference_id RHSA-2023:4888
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4888
24
reference_url https://access.redhat.com/errata/RHSA-2023:5580
reference_id RHSA-2023:5580
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5580
25
reference_url https://access.redhat.com/errata/RHSA-2023:5588
reference_id RHSA-2023:5588
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5588
26
reference_url https://access.redhat.com/errata/RHSA-2023:5589
reference_id RHSA-2023:5589
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5589
27
reference_url https://access.redhat.com/errata/RHSA-2024:0980
reference_id RHSA-2024:0980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0980
28
reference_url https://access.redhat.com/errata/RHSA-2024:1249
reference_id RHSA-2024:1249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1249
29
reference_url https://access.redhat.com/errata/RHSA-2024:1323
reference_id RHSA-2024:1323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1323
30
reference_url https://access.redhat.com/errata/RHSA-2024:1332
reference_id RHSA-2024:1332
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1332
31
reference_url https://access.redhat.com/errata/RHSA-2024:1746
reference_id RHSA-2024:1746
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1746
32
reference_url https://usn.ubuntu.com/5780-1/
reference_id USN-5780-1
reference_type
scores
url https://usn.ubuntu.com/5780-1/
33
reference_url https://usn.ubuntu.com/5783-1/
reference_id USN-5783-1
reference_type
scores
url https://usn.ubuntu.com/5783-1/
34
reference_url https://usn.ubuntu.com/5794-1/
reference_id USN-5794-1
reference_type
scores
url https://usn.ubuntu.com/5794-1/
35
reference_url https://usn.ubuntu.com/5802-1/
reference_id USN-5802-1
reference_type
scores
url https://usn.ubuntu.com/5802-1/
36
reference_url https://usn.ubuntu.com/5803-1/
reference_id USN-5803-1
reference_type
scores
url https://usn.ubuntu.com/5803-1/
37
reference_url https://usn.ubuntu.com/5804-1/
reference_id USN-5804-1
reference_type
scores
url https://usn.ubuntu.com/5804-1/
38
reference_url https://usn.ubuntu.com/5804-2/
reference_id USN-5804-2
reference_type
scores
url https://usn.ubuntu.com/5804-2/
39
reference_url https://usn.ubuntu.com/5808-1/
reference_id USN-5808-1
reference_type
scores
url https://usn.ubuntu.com/5808-1/
40
reference_url https://usn.ubuntu.com/5809-1/
reference_id USN-5809-1
reference_type
scores
url https://usn.ubuntu.com/5809-1/
41
reference_url https://usn.ubuntu.com/5813-1/
reference_id USN-5813-1
reference_type
scores
url https://usn.ubuntu.com/5813-1/
42
reference_url https://usn.ubuntu.com/5814-1/
reference_id USN-5814-1
reference_type
scores
url https://usn.ubuntu.com/5814-1/
43
reference_url https://usn.ubuntu.com/5829-1/
reference_id USN-5829-1
reference_type
scores
url https://usn.ubuntu.com/5829-1/
44
reference_url https://usn.ubuntu.com/5830-1/
reference_id USN-5830-1
reference_type
scores
url https://usn.ubuntu.com/5830-1/
45
reference_url https://usn.ubuntu.com/5831-1/
reference_id USN-5831-1
reference_type
scores
url https://usn.ubuntu.com/5831-1/
46
reference_url https://usn.ubuntu.com/5832-1/
reference_id USN-5832-1
reference_type
scores
url https://usn.ubuntu.com/5832-1/
47
reference_url https://usn.ubuntu.com/5860-1/
reference_id USN-5860-1
reference_type
scores
url https://usn.ubuntu.com/5860-1/
48
reference_url https://usn.ubuntu.com/5861-1/
reference_id USN-5861-1
reference_type
scores
url https://usn.ubuntu.com/5861-1/
49
reference_url https://usn.ubuntu.com/5863-1/
reference_id USN-5863-1
reference_type
scores
url https://usn.ubuntu.com/5863-1/
50
reference_url https://usn.ubuntu.com/5875-1/
reference_id USN-5875-1
reference_type
scores
url https://usn.ubuntu.com/5875-1/
51
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
52
reference_url https://usn.ubuntu.com/5879-1/
reference_id USN-5879-1
reference_type
scores
url https://usn.ubuntu.com/5879-1/
53
reference_url https://usn.ubuntu.com/5914-1/
reference_id USN-5914-1
reference_type
scores
url https://usn.ubuntu.com/5914-1/
54
reference_url https://usn.ubuntu.com/5918-1/
reference_id USN-5918-1
reference_type
scores
url https://usn.ubuntu.com/5918-1/
fixed_packages
aliases CVE-2022-42896
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4nqf-ct5y-6uev
3
url VCID-58sv-d9e3-rfbf
vulnerability_id VCID-58sv-d9e3-rfbf
summary kernel: malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33655.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33655.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-33655
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06243
published_at 2026-04-01T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06492
published_at 2026-04-26T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06355
published_at 2026-04-13T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06293
published_at 2026-04-16T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06306
published_at 2026-04-18T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06455
published_at 2026-04-21T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.0647
published_at 2026-04-24T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06277
published_at 2026-04-02T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.0631
published_at 2026-04-04T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06291
published_at 2026-04-07T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06337
published_at 2026-04-08T12:55:00Z
11
value 0.00024
scoring_system epss
scoring_elements 0.06378
published_at 2026-04-09T12:55:00Z
12
value 0.00024
scoring_system epss
scoring_elements 0.06371
published_at 2026-04-11T12:55:00Z
13
value 0.00024
scoring_system epss
scoring_elements 0.06366
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-33655
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2108691
reference_id 2108691
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2108691
13
reference_url https://security.archlinux.org/AVG-2772
reference_id AVG-2772
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2772
14
reference_url https://security.archlinux.org/AVG-2773
reference_id AVG-2773
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2773
15
reference_url https://security.archlinux.org/AVG-2774
reference_id AVG-2774
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2774
16
reference_url https://security.archlinux.org/AVG-2775
reference_id AVG-2775
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2775
17
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
18
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
19
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
20
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
21
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
22
reference_url https://usn.ubuntu.com/5577-1/
reference_id USN-5577-1
reference_type
scores
url https://usn.ubuntu.com/5577-1/
23
reference_url https://usn.ubuntu.com/5580-1/
reference_id USN-5580-1
reference_type
scores
url https://usn.ubuntu.com/5580-1/
24
reference_url https://usn.ubuntu.com/5596-1/
reference_id USN-5596-1
reference_type
scores
url https://usn.ubuntu.com/5596-1/
25
reference_url https://usn.ubuntu.com/5621-1/
reference_id USN-5621-1
reference_type
scores
url https://usn.ubuntu.com/5621-1/
26
reference_url https://usn.ubuntu.com/5622-1/
reference_id USN-5622-1
reference_type
scores
url https://usn.ubuntu.com/5622-1/
27
reference_url https://usn.ubuntu.com/5623-1/
reference_id USN-5623-1
reference_type
scores
url https://usn.ubuntu.com/5623-1/
28
reference_url https://usn.ubuntu.com/5624-1/
reference_id USN-5624-1
reference_type
scores
url https://usn.ubuntu.com/5624-1/
29
reference_url https://usn.ubuntu.com/5630-1/
reference_id USN-5630-1
reference_type
scores
url https://usn.ubuntu.com/5630-1/
30
reference_url https://usn.ubuntu.com/5633-1/
reference_id USN-5633-1
reference_type
scores
url https://usn.ubuntu.com/5633-1/
31
reference_url https://usn.ubuntu.com/5635-1/
reference_id USN-5635-1
reference_type
scores
url https://usn.ubuntu.com/5635-1/
32
reference_url https://usn.ubuntu.com/5639-1/
reference_id USN-5639-1
reference_type
scores
url https://usn.ubuntu.com/5639-1/
33
reference_url https://usn.ubuntu.com/5640-1/
reference_id USN-5640-1
reference_type
scores
url https://usn.ubuntu.com/5640-1/
34
reference_url https://usn.ubuntu.com/5644-1/
reference_id USN-5644-1
reference_type
scores
url https://usn.ubuntu.com/5644-1/
35
reference_url https://usn.ubuntu.com/5647-1/
reference_id USN-5647-1
reference_type
scores
url https://usn.ubuntu.com/5647-1/
36
reference_url https://usn.ubuntu.com/5648-1/
reference_id USN-5648-1
reference_type
scores
url https://usn.ubuntu.com/5648-1/
37
reference_url https://usn.ubuntu.com/5650-1/
reference_id USN-5650-1
reference_type
scores
url https://usn.ubuntu.com/5650-1/
38
reference_url https://usn.ubuntu.com/5652-1/
reference_id USN-5652-1
reference_type
scores
url https://usn.ubuntu.com/5652-1/
39
reference_url https://usn.ubuntu.com/5654-1/
reference_id USN-5654-1
reference_type
scores
url https://usn.ubuntu.com/5654-1/
40
reference_url https://usn.ubuntu.com/5655-1/
reference_id USN-5655-1
reference_type
scores
url https://usn.ubuntu.com/5655-1/
41
reference_url https://usn.ubuntu.com/5660-1/
reference_id USN-5660-1
reference_type
scores
url https://usn.ubuntu.com/5660-1/
42
reference_url https://usn.ubuntu.com/5683-1/
reference_id USN-5683-1
reference_type
scores
url https://usn.ubuntu.com/5683-1/
fixed_packages
aliases CVE-2021-33655
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-58sv-d9e3-rfbf
4
url VCID-5we4-cmum-y7dm
vulnerability_id VCID-5we4-cmum-y7dm
summary kernel: use-after-free in free_pipe_info() could lead to privilege escalation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1882.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1882.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1882
reference_id
reference_type
scores
0
value 0.00031
scoring_system epss
scoring_elements 0.08685
published_at 2026-04-01T12:55:00Z
1
value 0.00031
scoring_system epss
scoring_elements 0.08714
published_at 2026-04-02T12:55:00Z
2
value 0.00031
scoring_system epss
scoring_elements 0.08762
published_at 2026-04-04T12:55:00Z
3
value 0.00031
scoring_system epss
scoring_elements 0.08687
published_at 2026-04-07T12:55:00Z
4
value 0.00031
scoring_system epss
scoring_elements 0.08763
published_at 2026-04-08T12:55:00Z
5
value 0.00031
scoring_system epss
scoring_elements 0.08789
published_at 2026-04-09T12:55:00Z
6
value 0.00031
scoring_system epss
scoring_elements 0.0879
published_at 2026-04-11T12:55:00Z
7
value 0.00031
scoring_system epss
scoring_elements 0.08758
published_at 2026-04-12T12:55:00Z
8
value 0.00031
scoring_system epss
scoring_elements 0.08743
published_at 2026-04-13T12:55:00Z
9
value 0.00031
scoring_system epss
scoring_elements 0.08631
published_at 2026-04-16T12:55:00Z
10
value 0.00031
scoring_system epss
scoring_elements 0.0862
published_at 2026-04-18T12:55:00Z
11
value 0.00039
scoring_system epss
scoring_elements 0.11607
published_at 2026-04-26T12:55:00Z
12
value 0.00039
scoring_system epss
scoring_elements 0.11687
published_at 2026-04-21T12:55:00Z
13
value 0.00039
scoring_system epss
scoring_elements 0.11647
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1882
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1882
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2089701
reference_id 2089701
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2089701
5
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
6
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
7
reference_url https://usn.ubuntu.com/5667-1/
reference_id USN-5667-1
reference_type
scores
url https://usn.ubuntu.com/5667-1/
8
reference_url https://usn.ubuntu.com/5683-1/
reference_id USN-5683-1
reference_type
scores
url https://usn.ubuntu.com/5683-1/
9
reference_url https://usn.ubuntu.com/5703-1/
reference_id USN-5703-1
reference_type
scores
url https://usn.ubuntu.com/5703-1/
fixed_packages
aliases CVE-2022-1882
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5we4-cmum-y7dm
5
url VCID-63j6-wgqx-vfg5
vulnerability_id VCID-63j6-wgqx-vfg5
summary kernel: mptcp: NULL pointer dereference in subflow traversal at disconnect time
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4128.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4128.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-4128
reference_id
reference_type
scores
0
value 0.00048
scoring_system epss
scoring_elements 0.14778
published_at 2026-04-02T12:55:00Z
1
value 0.00048
scoring_system epss
scoring_elements 0.14668
published_at 2026-04-26T12:55:00Z
2
value 0.00048
scoring_system epss
scoring_elements 0.14675
published_at 2026-04-13T12:55:00Z
3
value 0.00048
scoring_system epss
scoring_elements 0.1457
published_at 2026-04-16T12:55:00Z
4
value 0.00048
scoring_system epss
scoring_elements 0.14576
published_at 2026-04-18T12:55:00Z
5
value 0.00048
scoring_system epss
scoring_elements 0.14638
published_at 2026-04-21T12:55:00Z
6
value 0.00048
scoring_system epss
scoring_elements 0.1467
published_at 2026-04-24T12:55:00Z
7
value 0.00048
scoring_system epss
scoring_elements 0.14856
published_at 2026-04-04T12:55:00Z
8
value 0.00048
scoring_system epss
scoring_elements 0.14659
published_at 2026-04-07T12:55:00Z
9
value 0.00048
scoring_system epss
scoring_elements 0.1475
published_at 2026-04-08T12:55:00Z
10
value 0.00048
scoring_system epss
scoring_elements 0.1481
published_at 2026-04-09T12:55:00Z
11
value 0.00048
scoring_system epss
scoring_elements 0.14768
published_at 2026-04-11T12:55:00Z
12
value 0.00048
scoring_system epss
scoring_elements 0.14731
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-4128
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://lore.kernel.org/netdev/20220708233610.410786-2-mathew.j.martineau%40linux.intel.com/
reference_id 20220708233610.410786-2-mathew.j.martineau%40linux.intel.com
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T16:18:39Z/
url https://lore.kernel.org/netdev/20220708233610.410786-2-mathew.j.martineau%40linux.intel.com/
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2134380
reference_id 2134380
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2134380
5
reference_url https://github.com/torvalds/linux/commit/5c835bb142d4
reference_id 5c835bb142d4
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T16:18:39Z/
url https://github.com/torvalds/linux/commit/5c835bb142d4
6
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
7
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
fixed_packages
aliases CVE-2022-4128
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-63j6-wgqx-vfg5
6
url VCID-648j-njzx-rkcf
vulnerability_id VCID-648j-njzx-rkcf
summary kernel: BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42721.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42721.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42721
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.06196
published_at 2026-04-26T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.06151
published_at 2026-04-21T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.06165
published_at 2026-04-24T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06568
published_at 2026-04-07T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06618
published_at 2026-04-08T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06584
published_at 2026-04-04T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06547
published_at 2026-04-02T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06557
published_at 2026-04-18T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06564
published_at 2026-04-16T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06637
published_at 2026-04-13T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06645
published_at 2026-04-12T12:55:00Z
11
value 0.00024
scoring_system epss
scoring_elements 0.06653
published_at 2026-04-11T12:55:00Z
12
value 0.00024
scoring_system epss
scoring_elements 0.06661
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42721
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
19
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2134506
reference_id 2134506
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2134506
21
reference_url http://www.openwall.com/lists/oss-security/2022/10/13/5
reference_id 5
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T20:44:52Z/
url http://www.openwall.com/lists/oss-security/2022/10/13/5
22
reference_url https://security.archlinux.org/ASA-202210-1
reference_id ASA-202210-1
reference_type
scores
url https://security.archlinux.org/ASA-202210-1
23
reference_url https://security.archlinux.org/ASA-202210-2
reference_id ASA-202210-2
reference_type
scores
url https://security.archlinux.org/ASA-202210-2
24
reference_url https://security.archlinux.org/ASA-202210-3
reference_id ASA-202210-3
reference_type
scores
url https://security.archlinux.org/ASA-202210-3
25
reference_url https://security.archlinux.org/ASA-202210-4
reference_id ASA-202210-4
reference_type
scores
url https://security.archlinux.org/ASA-202210-4
26
reference_url https://security.archlinux.org/AVG-2800
reference_id AVG-2800
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2800
27
reference_url https://security.archlinux.org/AVG-2801
reference_id AVG-2801
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2801
28
reference_url https://security.archlinux.org/AVG-2802
reference_id AVG-2802
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2802
29
reference_url https://security.archlinux.org/AVG-2803
reference_id AVG-2803
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2803
30
reference_url https://www.debian.org/security/2022/dsa-5257
reference_id dsa-5257
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T20:44:52Z/
url https://www.debian.org/security/2022/dsa-5257
31
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY/
reference_id GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T20:44:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY/
32
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/wireless/wireless.git/commit/?id=bcca852027e5878aec911a347407ecc88d6fff7f
reference_id ?id=bcca852027e5878aec911a347407ecc88d6fff7f
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T20:44:52Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/wireless/wireless.git/commit/?id=bcca852027e5878aec911a347407ecc88d6fff7f
33
reference_url http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html
reference_id Kernel-Live-Patch-Security-Notice-LSN-0090-1.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T20:44:52Z/
url http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html
34
reference_url https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html
reference_id msg00001.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T20:44:52Z/
url https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html
35
reference_url https://security.netapp.com/advisory/ntap-20230203-0008/
reference_id ntap-20230203-0008
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T20:44:52Z/
url https://security.netapp.com/advisory/ntap-20230203-0008/
36
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
37
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
38
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
39
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
40
reference_url https://access.redhat.com/errata/RHSA-2024:1188
reference_id RHSA-2024:1188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1188
41
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2/
reference_id S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T20:44:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2/
42
reference_url https://bugzilla.suse.com/show_bug.cgi?id=1204060
reference_id show_bug.cgi?id=1204060
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T20:44:52Z/
url https://bugzilla.suse.com/show_bug.cgi?id=1204060
43
reference_url https://usn.ubuntu.com/5691-1/
reference_id USN-5691-1
reference_type
scores
url https://usn.ubuntu.com/5691-1/
44
reference_url https://usn.ubuntu.com/5692-1/
reference_id USN-5692-1
reference_type
scores
url https://usn.ubuntu.com/5692-1/
45
reference_url https://usn.ubuntu.com/5693-1/
reference_id USN-5693-1
reference_type
scores
url https://usn.ubuntu.com/5693-1/
46
reference_url https://usn.ubuntu.com/5700-1/
reference_id USN-5700-1
reference_type
scores
url https://usn.ubuntu.com/5700-1/
47
reference_url https://usn.ubuntu.com/5708-1/
reference_id USN-5708-1
reference_type
scores
url https://usn.ubuntu.com/5708-1/
48
reference_url https://usn.ubuntu.com/5752-1/
reference_id USN-5752-1
reference_type
scores
url https://usn.ubuntu.com/5752-1/
49
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR/
reference_id VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T20:44:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR/
fixed_packages
aliases CVE-2022-42721
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-648j-njzx-rkcf
7
url VCID-6jc4-7c8b-4bhv
vulnerability_id VCID-6jc4-7c8b-4bhv
summary kernel: use-after-free caused by invalid pointer hostname in fs/cifs/connect.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1195.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1195.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1195
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04075
published_at 2026-04-02T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04221
published_at 2026-04-26T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04069
published_at 2026-04-18T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.0419
published_at 2026-04-21T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.04202
published_at 2026-04-24T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.04093
published_at 2026-04-04T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.04108
published_at 2026-04-07T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.04113
published_at 2026-04-08T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.04132
published_at 2026-04-09T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.04116
published_at 2026-04-11T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.04102
published_at 2026-04-12T12:55:00Z
11
value 0.00017
scoring_system epss
scoring_elements 0.04076
published_at 2026-04-13T12:55:00Z
12
value 0.00017
scoring_system epss
scoring_elements 0.04058
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1195
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/torvalds/linux/commit/153695d36ead0ccc4d0256953c751cabf673e621
reference_id 153695d36ead0ccc4d0256953c751cabf673e621
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:57Z/
url https://github.com/torvalds/linux/commit/153695d36ead0ccc4d0256953c751cabf673e621
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2154171
reference_id 2154171
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2154171
5
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
6
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
7
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
8
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
9
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
10
reference_url https://access.redhat.com/errata/RHSA-2024:0431
reference_id RHSA-2024:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0431
11
reference_url https://access.redhat.com/errata/RHSA-2024:0432
reference_id RHSA-2024:0432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0432
12
reference_url https://usn.ubuntu.com/5970-1/
reference_id USN-5970-1
reference_type
scores
url https://usn.ubuntu.com/5970-1/
13
reference_url https://usn.ubuntu.com/5979-1/
reference_id USN-5979-1
reference_type
scores
url https://usn.ubuntu.com/5979-1/
fixed_packages
aliases CVE-2023-1195
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6jc4-7c8b-4bhv
8
url VCID-8ekj-2sge-5kd2
vulnerability_id VCID-8ekj-2sge-5kd2
summary kernel: KVM: NULL pointer dereference in kvm_mmu_invpcid_gva
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1789.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1789.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1789
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04217
published_at 2026-04-01T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04437
published_at 2026-04-26T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04291
published_at 2026-04-13T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.04262
published_at 2026-04-16T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.04271
published_at 2026-04-18T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.04397
published_at 2026-04-21T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.04417
published_at 2026-04-24T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.04255
published_at 2026-04-02T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.04275
published_at 2026-04-04T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.04287
published_at 2026-04-07T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.04319
published_at 2026-04-08T12:55:00Z
11
value 0.00017
scoring_system epss
scoring_elements 0.04334
published_at 2026-04-09T12:55:00Z
12
value 0.00017
scoring_system epss
scoring_elements 0.04326
published_at 2026-04-11T12:55:00Z
13
value 0.00017
scoring_system epss
scoring_elements 0.04312
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1789
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2090723
reference_id 2090723
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2090723
17
reference_url https://security.archlinux.org/AVG-2772
reference_id AVG-2772
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2772
18
reference_url https://security.archlinux.org/AVG-2773
reference_id AVG-2773
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2773
19
reference_url https://security.archlinux.org/AVG-2774
reference_id AVG-2774
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2774
20
reference_url https://security.archlinux.org/AVG-2775
reference_id AVG-2775
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2775
21
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
22
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
23
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
24
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
25
reference_url https://access.redhat.com/errata/RHSA-2024:4447
reference_id RHSA-2024:4447
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4447
26
reference_url https://usn.ubuntu.com/5514-1/
reference_id USN-5514-1
reference_type
scores
url https://usn.ubuntu.com/5514-1/
27
reference_url https://usn.ubuntu.com/5518-1/
reference_id USN-5518-1
reference_type
scores
url https://usn.ubuntu.com/5518-1/
28
reference_url https://usn.ubuntu.com/5529-1/
reference_id USN-5529-1
reference_type
scores
url https://usn.ubuntu.com/5529-1/
29
reference_url https://usn.ubuntu.com/5539-1/
reference_id USN-5539-1
reference_type
scores
url https://usn.ubuntu.com/5539-1/
30
reference_url https://usn.ubuntu.com/5564-1/
reference_id USN-5564-1
reference_type
scores
url https://usn.ubuntu.com/5564-1/
fixed_packages
aliases CVE-2022-1789
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8ekj-2sge-5kd2
9
url VCID-8htb-kgr8-3yes
vulnerability_id VCID-8htb-kgr8-3yes
summary network backend may cause Linux netfront to use freed SKBs
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-33743.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-33743.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-33743
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07575
published_at 2026-04-02T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07618
published_at 2026-04-04T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07591
published_at 2026-04-07T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.0765
published_at 2026-04-08T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07668
published_at 2026-04-09T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07669
published_at 2026-04-11T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07694
published_at 2026-04-21T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07644
published_at 2026-04-24T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07655
published_at 2026-04-12T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.0764
published_at 2026-04-13T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07566
published_at 2026-04-16T12:55:00Z
11
value 0.00027
scoring_system epss
scoring_elements 0.07554
published_at 2026-04-18T12:55:00Z
12
value 0.00037
scoring_system epss
scoring_elements 0.10915
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-33743
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2107924
reference_id 2107924
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2107924
13
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
14
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
15
reference_url https://usn.ubuntu.com/5623-1/
reference_id USN-5623-1
reference_type
scores
url https://usn.ubuntu.com/5623-1/
16
reference_url https://usn.ubuntu.com/5624-1/
reference_id USN-5624-1
reference_type
scores
url https://usn.ubuntu.com/5624-1/
17
reference_url https://usn.ubuntu.com/5633-1/
reference_id USN-5633-1
reference_type
scores
url https://usn.ubuntu.com/5633-1/
18
reference_url https://usn.ubuntu.com/5635-1/
reference_id USN-5635-1
reference_type
scores
url https://usn.ubuntu.com/5635-1/
19
reference_url https://usn.ubuntu.com/5640-1/
reference_id USN-5640-1
reference_type
scores
url https://usn.ubuntu.com/5640-1/
20
reference_url https://usn.ubuntu.com/5644-1/
reference_id USN-5644-1
reference_type
scores
url https://usn.ubuntu.com/5644-1/
21
reference_url https://usn.ubuntu.com/5648-1/
reference_id USN-5648-1
reference_type
scores
url https://usn.ubuntu.com/5648-1/
22
reference_url https://usn.ubuntu.com/5655-1/
reference_id USN-5655-1
reference_type
scores
url https://usn.ubuntu.com/5655-1/
23
reference_url https://usn.ubuntu.com/5683-1/
reference_id USN-5683-1
reference_type
scores
url https://usn.ubuntu.com/5683-1/
24
reference_url https://usn.ubuntu.com/5773-1/
reference_id USN-5773-1
reference_type
scores
url https://usn.ubuntu.com/5773-1/
25
reference_url https://usn.ubuntu.com/5789-1/
reference_id USN-5789-1
reference_type
scores
url https://usn.ubuntu.com/5789-1/
26
reference_url https://xenbits.xen.org/xsa/advisory-405.html
reference_id XSA-405
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-405.html
fixed_packages
aliases CVE-2022-33743, XSA-405
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8htb-kgr8-3yes
10
url VCID-9nyv-n5f5-ekbf
vulnerability_id VCID-9nyv-n5f5-ekbf
summary kernel: memory leak in ipv6_renew_options()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3524.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3524.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3524
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.18799
published_at 2026-04-26T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.18905
published_at 2026-04-16T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.18918
published_at 2026-04-18T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.18929
published_at 2026-04-21T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.18819
published_at 2026-04-24T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.1914
published_at 2026-04-02T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.19192
published_at 2026-04-04T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.18909
published_at 2026-04-07T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.18988
published_at 2026-04-08T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.19042
published_at 2026-04-09T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.19049
published_at 2026-04-11T12:55:00Z
11
value 0.00061
scoring_system epss
scoring_elements 0.19003
published_at 2026-04-12T12:55:00Z
12
value 0.00061
scoring_system epss
scoring_elements 0.18951
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3524
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3524
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2150947
reference_id 2150947
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2150947
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
9
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
10
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
11
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
12
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
13
reference_url https://usn.ubuntu.com/5754-1/
reference_id USN-5754-1
reference_type
scores
url https://usn.ubuntu.com/5754-1/
14
reference_url https://usn.ubuntu.com/5754-2/
reference_id USN-5754-2
reference_type
scores
url https://usn.ubuntu.com/5754-2/
15
reference_url https://usn.ubuntu.com/5755-1/
reference_id USN-5755-1
reference_type
scores
url https://usn.ubuntu.com/5755-1/
16
reference_url https://usn.ubuntu.com/5755-2/
reference_id USN-5755-2
reference_type
scores
url https://usn.ubuntu.com/5755-2/
17
reference_url https://usn.ubuntu.com/5756-1/
reference_id USN-5756-1
reference_type
scores
url https://usn.ubuntu.com/5756-1/
18
reference_url https://usn.ubuntu.com/5756-2/
reference_id USN-5756-2
reference_type
scores
url https://usn.ubuntu.com/5756-2/
19
reference_url https://usn.ubuntu.com/5756-3/
reference_id USN-5756-3
reference_type
scores
url https://usn.ubuntu.com/5756-3/
20
reference_url https://usn.ubuntu.com/5757-1/
reference_id USN-5757-1
reference_type
scores
url https://usn.ubuntu.com/5757-1/
21
reference_url https://usn.ubuntu.com/5757-2/
reference_id USN-5757-2
reference_type
scores
url https://usn.ubuntu.com/5757-2/
22
reference_url https://usn.ubuntu.com/5758-1/
reference_id USN-5758-1
reference_type
scores
url https://usn.ubuntu.com/5758-1/
23
reference_url https://usn.ubuntu.com/5773-1/
reference_id USN-5773-1
reference_type
scores
url https://usn.ubuntu.com/5773-1/
24
reference_url https://usn.ubuntu.com/5774-1/
reference_id USN-5774-1
reference_type
scores
url https://usn.ubuntu.com/5774-1/
25
reference_url https://usn.ubuntu.com/5779-1/
reference_id USN-5779-1
reference_type
scores
url https://usn.ubuntu.com/5779-1/
26
reference_url https://usn.ubuntu.com/5780-1/
reference_id USN-5780-1
reference_type
scores
url https://usn.ubuntu.com/5780-1/
27
reference_url https://usn.ubuntu.com/5789-1/
reference_id USN-5789-1
reference_type
scores
url https://usn.ubuntu.com/5789-1/
fixed_packages
aliases CVE-2022-3524
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9nyv-n5f5-ekbf
11
url VCID-9pmb-g7fz-3kd6
vulnerability_id VCID-9pmb-g7fz-3kd6
summary kernel: lockdown bypass using IMA
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21505.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21505.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21505
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.14014
published_at 2026-04-02T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.13854
published_at 2026-04-26T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.1388
published_at 2026-04-13T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13786
published_at 2026-04-16T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13782
published_at 2026-04-18T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13856
published_at 2026-04-21T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13882
published_at 2026-04-24T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.14068
published_at 2026-04-04T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.13873
published_at 2026-04-07T12:55:00Z
9
value 0.00045
scoring_system epss
scoring_elements 0.13957
published_at 2026-04-08T12:55:00Z
10
value 0.00045
scoring_system epss
scoring_elements 0.1401
published_at 2026-04-09T12:55:00Z
11
value 0.00045
scoring_system epss
scoring_elements 0.13966
published_at 2026-04-11T12:55:00Z
12
value 0.00045
scoring_system epss
scoring_elements 0.13929
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21505
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21505
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2106830
reference_id 2106830
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2106830
5
reference_url https://git.kernel.org/linus/543ce63b664e2c2f9533d089a4664b559c3e6b5b
reference_id 543ce63b664e2c2f9533d089a4664b559c3e6b5b
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-27T16:51:57Z/
url https://git.kernel.org/linus/543ce63b664e2c2f9533d089a4664b559c3e6b5b
6
reference_url https://linux.oracle.com/cve/CVE-2022-21505.html
reference_id CVE-2022-21505.html
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-27T16:51:57Z/
url https://linux.oracle.com/cve/CVE-2022-21505.html
7
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
8
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
9
reference_url https://usn.ubuntu.com/6031-1/
reference_id USN-6031-1
reference_type
scores
url https://usn.ubuntu.com/6031-1/
fixed_packages
aliases CVE-2022-21505
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9pmb-g7fz-3kd6
12
url VCID-bpkg-a38v-53dv
vulnerability_id VCID-bpkg-a38v-53dv
summary kernel: igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-20141.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-20141.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-20141
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.05773
published_at 2026-04-01T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.05806
published_at 2026-04-02T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.05842
published_at 2026-04-04T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.05836
published_at 2026-04-07T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.05875
published_at 2026-04-08T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.05902
published_at 2026-04-09T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.05882
published_at 2026-04-11T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.05873
published_at 2026-04-12T12:55:00Z
8
value 0.00022
scoring_system epss
scoring_elements 0.05865
published_at 2026-04-13T12:55:00Z
9
value 0.00022
scoring_system epss
scoring_elements 0.0583
published_at 2026-04-16T12:55:00Z
10
value 0.00022
scoring_system epss
scoring_elements 0.05841
published_at 2026-04-18T12:55:00Z
11
value 0.00022
scoring_system epss
scoring_elements 0.05995
published_at 2026-04-21T12:55:00Z
12
value 0.00022
scoring_system epss
scoring_elements 0.06026
published_at 2026-04-24T12:55:00Z
13
value 0.00022
scoring_system epss
scoring_elements 0.06062
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-20141
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20141
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20141
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2114937
reference_id 2114937
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2114937
5
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
6
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
7
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
8
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
9
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
10
reference_url https://usn.ubuntu.com/5540-1/
reference_id USN-5540-1
reference_type
scores
url https://usn.ubuntu.com/5540-1/
fixed_packages
aliases CVE-2022-20141
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bpkg-a38v-53dv
13
url VCID-c3z5-1arv-kqck
vulnerability_id VCID-c3z5-1arv-kqck
summary kernel: ext4: use-after-free in ext4_xattr_set_entry()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2513.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2513.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2513
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.0214
published_at 2026-04-02T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02154
published_at 2026-04-26T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.02137
published_at 2026-04-11T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02122
published_at 2026-04-12T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02118
published_at 2026-04-13T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02093
published_at 2026-04-16T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02106
published_at 2026-04-18T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02193
published_at 2026-04-21T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.02163
published_at 2026-04-24T12:55:00Z
9
value 0.00013
scoring_system epss
scoring_elements 0.02146
published_at 2026-04-04T12:55:00Z
10
value 0.00013
scoring_system epss
scoring_elements 0.02142
published_at 2026-04-07T12:55:00Z
11
value 0.00013
scoring_system epss
scoring_elements 0.02141
published_at 2026-04-08T12:55:00Z
12
value 0.00013
scoring_system epss
scoring_elements 0.02159
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2513
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2513
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lore.kernel.org/all/20220616021358.2504451-1-libaokun1%40huawei.com/
reference_id 20220616021358.2504451-1-libaokun1%40huawei.com
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:28Z/
url https://lore.kernel.org/all/20220616021358.2504451-1-libaokun1%40huawei.com/
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2193097
reference_id 2193097
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:28Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2193097
6
reference_url https://github.com/torvalds/linux/commit/67d7d8ad99be
reference_id 67d7d8ad99be
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:28Z/
url https://github.com/torvalds/linux/commit/67d7d8ad99be
7
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
8
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
9
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
10
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
11
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
12
reference_url https://access.redhat.com/errata/RHSA-2025:15649
reference_id RHSA-2025:15649
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15649
13
reference_url https://access.redhat.com/errata/RHSA-2025:15656
reference_id RHSA-2025:15656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15656
14
reference_url https://access.redhat.com/errata/RHSA-2025:15658
reference_id RHSA-2025:15658
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15658
15
reference_url https://access.redhat.com/errata/RHSA-2025:15660
reference_id RHSA-2025:15660
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15660
16
reference_url https://access.redhat.com/errata/RHSA-2025:15670
reference_id RHSA-2025:15670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15670
17
reference_url https://usn.ubuntu.com/6254-1/
reference_id USN-6254-1
reference_type
scores
url https://usn.ubuntu.com/6254-1/
fixed_packages
aliases CVE-2023-2513
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c3z5-1arv-kqck
14
url VCID-chuj-redw-v3ek
vulnerability_id VCID-chuj-redw-v3ek
summary kernel: out-of-bounds read in fib_nh_match of the file net/ipv4/fib_semantics.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3435.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3435.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3435
reference_id
reference_type
scores
0
value 0.00069
scoring_system epss
scoring_elements 0.21368
published_at 2026-04-02T12:55:00Z
1
value 0.00073
scoring_system epss
scoring_elements 0.21923
published_at 2026-04-26T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.22288
published_at 2026-04-04T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.22072
published_at 2026-04-07T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.22153
published_at 2026-04-08T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22208
published_at 2026-04-09T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.22228
published_at 2026-04-11T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.22187
published_at 2026-04-12T12:55:00Z
8
value 0.00073
scoring_system epss
scoring_elements 0.22127
published_at 2026-04-16T12:55:00Z
9
value 0.00073
scoring_system epss
scoring_elements 0.22121
published_at 2026-04-18T12:55:00Z
10
value 0.00073
scoring_system epss
scoring_elements 0.22075
published_at 2026-04-21T12:55:00Z
11
value 0.00073
scoring_system epss
scoring_elements 0.21935
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3435
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3435
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2133490
reference_id 2133490
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2133490
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY/
reference_id GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:10:02Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY/
6
reference_url https://vuldb.com/?id.210357
reference_id ?id.210357
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:10:02Z/
url https://vuldb.com/?id.210357
7
reference_url https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html
reference_id msg00031.html
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:10:02Z/
url https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html
8
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
9
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2/
reference_id S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:10:02Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2/
11
reference_url https://lore.kernel.org/netdev/20221005181257.8897-1-dsahern%40kernel.org/T/#u
reference_id #u
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:10:02Z/
url https://lore.kernel.org/netdev/20221005181257.8897-1-dsahern%40kernel.org/T/#u
12
reference_url https://usn.ubuntu.com/5911-1/
reference_id USN-5911-1
reference_type
scores
url https://usn.ubuntu.com/5911-1/
13
reference_url https://usn.ubuntu.com/5912-1/
reference_id USN-5912-1
reference_type
scores
url https://usn.ubuntu.com/5912-1/
14
reference_url https://usn.ubuntu.com/5917-1/
reference_id USN-5917-1
reference_type
scores
url https://usn.ubuntu.com/5917-1/
15
reference_url https://usn.ubuntu.com/5929-1/
reference_id USN-5929-1
reference_type
scores
url https://usn.ubuntu.com/5929-1/
16
reference_url https://usn.ubuntu.com/5934-1/
reference_id USN-5934-1
reference_type
scores
url https://usn.ubuntu.com/5934-1/
17
reference_url https://usn.ubuntu.com/5935-1/
reference_id USN-5935-1
reference_type
scores
url https://usn.ubuntu.com/5935-1/
18
reference_url https://usn.ubuntu.com/5938-1/
reference_id USN-5938-1
reference_type
scores
url https://usn.ubuntu.com/5938-1/
19
reference_url https://usn.ubuntu.com/5939-1/
reference_id USN-5939-1
reference_type
scores
url https://usn.ubuntu.com/5939-1/
20
reference_url https://usn.ubuntu.com/5940-1/
reference_id USN-5940-1
reference_type
scores
url https://usn.ubuntu.com/5940-1/
21
reference_url https://usn.ubuntu.com/5941-1/
reference_id USN-5941-1
reference_type
scores
url https://usn.ubuntu.com/5941-1/
22
reference_url https://usn.ubuntu.com/5950-1/
reference_id USN-5950-1
reference_type
scores
url https://usn.ubuntu.com/5950-1/
23
reference_url https://usn.ubuntu.com/5951-1/
reference_id USN-5951-1
reference_type
scores
url https://usn.ubuntu.com/5951-1/
24
reference_url https://usn.ubuntu.com/5962-1/
reference_id USN-5962-1
reference_type
scores
url https://usn.ubuntu.com/5962-1/
25
reference_url https://usn.ubuntu.com/6000-1/
reference_id USN-6000-1
reference_type
scores
url https://usn.ubuntu.com/6000-1/
26
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR/
reference_id VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:10:02Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR/
fixed_packages
aliases CVE-2022-3435
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-chuj-redw-v3ek
15
url VCID-ckqp-r5m2-j3fx
vulnerability_id VCID-ckqp-r5m2-j3fx
summary kernel: data races around sk->sk_prot
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3567.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3567.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3567
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06395
published_at 2026-04-07T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.0641
published_at 2026-04-18T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.064
published_at 2026-04-16T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06463
published_at 2026-04-13T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06475
published_at 2026-04-12T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06481
published_at 2026-04-11T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06443
published_at 2026-04-08T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06487
published_at 2026-04-09T12:55:00Z
8
value 0.00025
scoring_system epss
scoring_elements 0.06819
published_at 2026-04-26T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.06615
published_at 2026-04-02T12:55:00Z
10
value 0.00025
scoring_system epss
scoring_elements 0.06659
published_at 2026-04-04T12:55:00Z
11
value 0.00025
scoring_system epss
scoring_elements 0.06792
published_at 2026-04-21T12:55:00Z
12
value 0.00025
scoring_system epss
scoring_elements 0.068
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3567
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3567
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2143943
reference_id 2143943
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2143943
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://vuldb.com/?id.211090
reference_id ?id.211090
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:29Z/
url https://vuldb.com/?id.211090
10
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=364f997b5cfe1db0d63a390fe7c801fa2b3115f6
reference_id ?id=364f997b5cfe1db0d63a390fe7c801fa2b3115f6
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:29Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=364f997b5cfe1db0d63a390fe7c801fa2b3115f6
11
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
12
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
13
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
14
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
15
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
16
reference_url https://usn.ubuntu.com/5754-1/
reference_id USN-5754-1
reference_type
scores
url https://usn.ubuntu.com/5754-1/
17
reference_url https://usn.ubuntu.com/5754-2/
reference_id USN-5754-2
reference_type
scores
url https://usn.ubuntu.com/5754-2/
18
reference_url https://usn.ubuntu.com/5755-1/
reference_id USN-5755-1
reference_type
scores
url https://usn.ubuntu.com/5755-1/
19
reference_url https://usn.ubuntu.com/5755-2/
reference_id USN-5755-2
reference_type
scores
url https://usn.ubuntu.com/5755-2/
20
reference_url https://usn.ubuntu.com/5756-1/
reference_id USN-5756-1
reference_type
scores
url https://usn.ubuntu.com/5756-1/
21
reference_url https://usn.ubuntu.com/5756-2/
reference_id USN-5756-2
reference_type
scores
url https://usn.ubuntu.com/5756-2/
22
reference_url https://usn.ubuntu.com/5756-3/
reference_id USN-5756-3
reference_type
scores
url https://usn.ubuntu.com/5756-3/
23
reference_url https://usn.ubuntu.com/5757-1/
reference_id USN-5757-1
reference_type
scores
url https://usn.ubuntu.com/5757-1/
24
reference_url https://usn.ubuntu.com/5757-2/
reference_id USN-5757-2
reference_type
scores
url https://usn.ubuntu.com/5757-2/
25
reference_url https://usn.ubuntu.com/5758-1/
reference_id USN-5758-1
reference_type
scores
url https://usn.ubuntu.com/5758-1/
26
reference_url https://usn.ubuntu.com/5773-1/
reference_id USN-5773-1
reference_type
scores
url https://usn.ubuntu.com/5773-1/
27
reference_url https://usn.ubuntu.com/5774-1/
reference_id USN-5774-1
reference_type
scores
url https://usn.ubuntu.com/5774-1/
28
reference_url https://usn.ubuntu.com/5779-1/
reference_id USN-5779-1
reference_type
scores
url https://usn.ubuntu.com/5779-1/
29
reference_url https://usn.ubuntu.com/5789-1/
reference_id USN-5789-1
reference_type
scores
url https://usn.ubuntu.com/5789-1/
30
reference_url https://usn.ubuntu.com/5914-1/
reference_id USN-5914-1
reference_type
scores
url https://usn.ubuntu.com/5914-1/
fixed_packages
aliases CVE-2022-3567
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ckqp-r5m2-j3fx
16
url VCID-d14e-jv1a-w7d3
vulnerability_id VCID-d14e-jv1a-w7d3
summary kernel: memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3619.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3619.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3619
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07573
published_at 2026-04-26T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07625
published_at 2026-04-09T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07624
published_at 2026-04-11T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07611
published_at 2026-04-12T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07597
published_at 2026-04-13T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07521
published_at 2026-04-16T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.0751
published_at 2026-04-18T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07649
published_at 2026-04-21T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07596
published_at 2026-04-24T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.0753
published_at 2026-04-02T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.0757
published_at 2026-04-04T12:55:00Z
11
value 0.00027
scoring_system epss
scoring_elements 0.07547
published_at 2026-04-07T12:55:00Z
12
value 0.00027
scoring_system epss
scoring_elements 0.07606
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3619
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2154235
reference_id 2154235
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2154235
4
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
5
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
6
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
7
reference_url https://vuldb.com/?id.211918
reference_id ?id.211918
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T16:59:20Z/
url https://vuldb.com/?id.211918
8
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=97097c85c088e11651146da32a4e1cdb9dfa6193
reference_id ?id=97097c85c088e11651146da32a4e1cdb9dfa6193
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T16:59:20Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=97097c85c088e11651146da32a4e1cdb9dfa6193
9
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
10
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
11
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
12
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
13
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
14
reference_url https://usn.ubuntu.com/5780-1/
reference_id USN-5780-1
reference_type
scores
url https://usn.ubuntu.com/5780-1/
15
reference_url https://usn.ubuntu.com/5850-1/
reference_id USN-5850-1
reference_type
scores
url https://usn.ubuntu.com/5850-1/
16
reference_url https://usn.ubuntu.com/5851-1/
reference_id USN-5851-1
reference_type
scores
url https://usn.ubuntu.com/5851-1/
17
reference_url https://usn.ubuntu.com/5860-1/
reference_id USN-5860-1
reference_type
scores
url https://usn.ubuntu.com/5860-1/
18
reference_url https://usn.ubuntu.com/5876-1/
reference_id USN-5876-1
reference_type
scores
url https://usn.ubuntu.com/5876-1/
19
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
20
reference_url https://usn.ubuntu.com/5878-1/
reference_id USN-5878-1
reference_type
scores
url https://usn.ubuntu.com/5878-1/
21
reference_url https://usn.ubuntu.com/5879-1/
reference_id USN-5879-1
reference_type
scores
url https://usn.ubuntu.com/5879-1/
fixed_packages
aliases CVE-2022-3619
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d14e-jv1a-w7d3
17
url VCID-dqhd-grev-t3ge
vulnerability_id VCID-dqhd-grev-t3ge
summary kernel: use-after-free related to leaf anon_vma double reuse
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42703.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42703.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42703
reference_id
reference_type
scores
0
value 0.00985
scoring_system epss
scoring_elements 0.76906
published_at 2026-04-26T12:55:00Z
1
value 0.00985
scoring_system epss
scoring_elements 0.76827
published_at 2026-04-13T12:55:00Z
2
value 0.00985
scoring_system epss
scoring_elements 0.7687
published_at 2026-04-16T12:55:00Z
3
value 0.00985
scoring_system epss
scoring_elements 0.76875
published_at 2026-04-18T12:55:00Z
4
value 0.00985
scoring_system epss
scoring_elements 0.76866
published_at 2026-04-21T12:55:00Z
5
value 0.00985
scoring_system epss
scoring_elements 0.76899
published_at 2026-04-24T12:55:00Z
6
value 0.00985
scoring_system epss
scoring_elements 0.76773
published_at 2026-04-02T12:55:00Z
7
value 0.00985
scoring_system epss
scoring_elements 0.76802
published_at 2026-04-04T12:55:00Z
8
value 0.00985
scoring_system epss
scoring_elements 0.76783
published_at 2026-04-07T12:55:00Z
9
value 0.00985
scoring_system epss
scoring_elements 0.76814
published_at 2026-04-08T12:55:00Z
10
value 0.00985
scoring_system epss
scoring_elements 0.76824
published_at 2026-04-09T12:55:00Z
11
value 0.00985
scoring_system epss
scoring_elements 0.76853
published_at 2026-04-11T12:55:00Z
12
value 0.00985
scoring_system epss
scoring_elements 0.76833
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42703
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42703
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42703
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2133483
reference_id 2133483
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2133483
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://access.redhat.com/errata/RHSA-2023:1091
reference_id RHSA-2023:1091
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1091
10
reference_url https://access.redhat.com/errata/RHSA-2023:1092
reference_id RHSA-2023:1092
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1092
11
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
12
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
13
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
14
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
15
reference_url https://access.redhat.com/errata/RHSA-2023:3388
reference_id RHSA-2023:3388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3388
16
reference_url https://access.redhat.com/errata/RHSA-2023:4137
reference_id RHSA-2023:4137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4137
17
reference_url https://access.redhat.com/errata/RHSA-2023:4138
reference_id RHSA-2023:4138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4138
18
reference_url https://usn.ubuntu.com/5728-1/
reference_id USN-5728-1
reference_type
scores
url https://usn.ubuntu.com/5728-1/
19
reference_url https://usn.ubuntu.com/5728-2/
reference_id USN-5728-2
reference_type
scores
url https://usn.ubuntu.com/5728-2/
20
reference_url https://usn.ubuntu.com/5728-3/
reference_id USN-5728-3
reference_type
scores
url https://usn.ubuntu.com/5728-3/
21
reference_url https://usn.ubuntu.com/5755-1/
reference_id USN-5755-1
reference_type
scores
url https://usn.ubuntu.com/5755-1/
22
reference_url https://usn.ubuntu.com/5755-2/
reference_id USN-5755-2
reference_type
scores
url https://usn.ubuntu.com/5755-2/
23
reference_url https://usn.ubuntu.com/5756-1/
reference_id USN-5756-1
reference_type
scores
url https://usn.ubuntu.com/5756-1/
24
reference_url https://usn.ubuntu.com/5756-2/
reference_id USN-5756-2
reference_type
scores
url https://usn.ubuntu.com/5756-2/
25
reference_url https://usn.ubuntu.com/5756-3/
reference_id USN-5756-3
reference_type
scores
url https://usn.ubuntu.com/5756-3/
26
reference_url https://usn.ubuntu.com/5757-1/
reference_id USN-5757-1
reference_type
scores
url https://usn.ubuntu.com/5757-1/
27
reference_url https://usn.ubuntu.com/5757-2/
reference_id USN-5757-2
reference_type
scores
url https://usn.ubuntu.com/5757-2/
28
reference_url https://usn.ubuntu.com/5758-1/
reference_id USN-5758-1
reference_type
scores
url https://usn.ubuntu.com/5758-1/
29
reference_url https://usn.ubuntu.com/5773-1/
reference_id USN-5773-1
reference_type
scores
url https://usn.ubuntu.com/5773-1/
30
reference_url https://usn.ubuntu.com/5774-1/
reference_id USN-5774-1
reference_type
scores
url https://usn.ubuntu.com/5774-1/
31
reference_url https://usn.ubuntu.com/5779-1/
reference_id USN-5779-1
reference_type
scores
url https://usn.ubuntu.com/5779-1/
32
reference_url https://usn.ubuntu.com/5789-1/
reference_id USN-5789-1
reference_type
scores
url https://usn.ubuntu.com/5789-1/
33
reference_url https://usn.ubuntu.com/5916-1/
reference_id USN-5916-1
reference_type
scores
url https://usn.ubuntu.com/5916-1/
fixed_packages
aliases CVE-2022-42703
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dqhd-grev-t3ge
18
url VCID-dqth-c54y-e7fb
vulnerability_id VCID-dqth-c54y-e7fb
summary kernel: data races around icsk->icsk_af_ops in do_ipv6_setsockopt
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3566.json
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3566.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3566
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.06857
published_at 2026-04-07T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.06853
published_at 2026-04-18T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06869
published_at 2026-04-16T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.0693
published_at 2026-04-13T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.06934
published_at 2026-04-12T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.06942
published_at 2026-04-11T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.06912
published_at 2026-04-08T12:55:00Z
7
value 0.00025
scoring_system epss
scoring_elements 0.06943
published_at 2026-04-09T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.07169
published_at 2026-04-26T12:55:00Z
9
value 0.00026
scoring_system epss
scoring_elements 0.07055
published_at 2026-04-02T12:55:00Z
10
value 0.00026
scoring_system epss
scoring_elements 0.07111
published_at 2026-04-04T12:55:00Z
11
value 0.00026
scoring_system epss
scoring_elements 0.07191
published_at 2026-04-21T12:55:00Z
12
value 0.00026
scoring_system epss
scoring_elements 0.07161
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3566
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3566
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2143893
reference_id 2143893
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2143893
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://vuldb.com/?id.211089
reference_id ?id.211089
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:33Z/
url https://vuldb.com/?id.211089
10
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57
reference_id ?id=f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:33Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57
11
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
12
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
13
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
14
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
15
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
16
reference_url https://usn.ubuntu.com/5754-1/
reference_id USN-5754-1
reference_type
scores
url https://usn.ubuntu.com/5754-1/
17
reference_url https://usn.ubuntu.com/5754-2/
reference_id USN-5754-2
reference_type
scores
url https://usn.ubuntu.com/5754-2/
18
reference_url https://usn.ubuntu.com/5755-1/
reference_id USN-5755-1
reference_type
scores
url https://usn.ubuntu.com/5755-1/
19
reference_url https://usn.ubuntu.com/5755-2/
reference_id USN-5755-2
reference_type
scores
url https://usn.ubuntu.com/5755-2/
20
reference_url https://usn.ubuntu.com/5756-1/
reference_id USN-5756-1
reference_type
scores
url https://usn.ubuntu.com/5756-1/
21
reference_url https://usn.ubuntu.com/5756-2/
reference_id USN-5756-2
reference_type
scores
url https://usn.ubuntu.com/5756-2/
22
reference_url https://usn.ubuntu.com/5756-3/
reference_id USN-5756-3
reference_type
scores
url https://usn.ubuntu.com/5756-3/
23
reference_url https://usn.ubuntu.com/5757-1/
reference_id USN-5757-1
reference_type
scores
url https://usn.ubuntu.com/5757-1/
24
reference_url https://usn.ubuntu.com/5757-2/
reference_id USN-5757-2
reference_type
scores
url https://usn.ubuntu.com/5757-2/
25
reference_url https://usn.ubuntu.com/5758-1/
reference_id USN-5758-1
reference_type
scores
url https://usn.ubuntu.com/5758-1/
26
reference_url https://usn.ubuntu.com/5773-1/
reference_id USN-5773-1
reference_type
scores
url https://usn.ubuntu.com/5773-1/
27
reference_url https://usn.ubuntu.com/5774-1/
reference_id USN-5774-1
reference_type
scores
url https://usn.ubuntu.com/5774-1/
28
reference_url https://usn.ubuntu.com/5779-1/
reference_id USN-5779-1
reference_type
scores
url https://usn.ubuntu.com/5779-1/
29
reference_url https://usn.ubuntu.com/5789-1/
reference_id USN-5789-1
reference_type
scores
url https://usn.ubuntu.com/5789-1/
fixed_packages
aliases CVE-2022-3566
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dqth-c54y-e7fb
19
url VCID-ejj4-yt8j-c7fm
vulnerability_id VCID-ejj4-yt8j-c7fm
summary kernel: race condition in xfrm_probe_algs can lead to OOB read/write
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3028.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3028.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3028
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.0127
published_at 2026-04-26T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01259
published_at 2026-04-21T12:55:00Z
2
value 0.00011
scoring_system epss
scoring_elements 0.01263
published_at 2026-04-24T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02032
published_at 2026-04-16T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02045
published_at 2026-04-18T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02077
published_at 2026-04-02T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02084
published_at 2026-04-04T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02078
published_at 2026-04-07T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.0208
published_at 2026-04-08T12:55:00Z
9
value 0.00013
scoring_system epss
scoring_elements 0.02098
published_at 2026-04-09T12:55:00Z
10
value 0.00013
scoring_system epss
scoring_elements 0.02075
published_at 2026-04-11T12:55:00Z
11
value 0.00013
scoring_system epss
scoring_elements 0.0206
published_at 2026-04-12T12:55:00Z
12
value 0.00013
scoring_system epss
scoring_elements 0.02056
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3028
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3028
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2122228
reference_id 2122228
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2122228
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
10
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
11
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
12
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
13
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
14
reference_url https://usn.ubuntu.com/5650-1/
reference_id USN-5650-1
reference_type
scores
url https://usn.ubuntu.com/5650-1/
15
reference_url https://usn.ubuntu.com/5693-1/
reference_id USN-5693-1
reference_type
scores
url https://usn.ubuntu.com/5693-1/
16
reference_url https://usn.ubuntu.com/5727-1/
reference_id USN-5727-1
reference_type
scores
url https://usn.ubuntu.com/5727-1/
17
reference_url https://usn.ubuntu.com/5727-2/
reference_id USN-5727-2
reference_type
scores
url https://usn.ubuntu.com/5727-2/
18
reference_url https://usn.ubuntu.com/5728-1/
reference_id USN-5728-1
reference_type
scores
url https://usn.ubuntu.com/5728-1/
19
reference_url https://usn.ubuntu.com/5728-2/
reference_id USN-5728-2
reference_type
scores
url https://usn.ubuntu.com/5728-2/
20
reference_url https://usn.ubuntu.com/5728-3/
reference_id USN-5728-3
reference_type
scores
url https://usn.ubuntu.com/5728-3/
21
reference_url https://usn.ubuntu.com/5729-1/
reference_id USN-5729-1
reference_type
scores
url https://usn.ubuntu.com/5729-1/
22
reference_url https://usn.ubuntu.com/5729-2/
reference_id USN-5729-2
reference_type
scores
url https://usn.ubuntu.com/5729-2/
23
reference_url https://usn.ubuntu.com/5774-1/
reference_id USN-5774-1
reference_type
scores
url https://usn.ubuntu.com/5774-1/
fixed_packages
aliases CVE-2022-3028
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ejj4-yt8j-c7fm
20
url VCID-ezb4-x5pv-myhe
vulnerability_id VCID-ezb4-x5pv-myhe
summary hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26341.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26341.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-26341
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.15515
published_at 2026-04-01T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.15558
published_at 2026-04-02T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15626
published_at 2026-04-04T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15425
published_at 2026-04-07T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.15513
published_at 2026-04-08T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15563
published_at 2026-04-09T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15526
published_at 2026-04-11T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15489
published_at 2026-04-12T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15422
published_at 2026-04-13T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.15343
published_at 2026-04-16T12:55:00Z
10
value 0.0005
scoring_system epss
scoring_elements 0.15348
published_at 2026-04-18T12:55:00Z
11
value 0.0005
scoring_system epss
scoring_elements 0.15399
published_at 2026-04-21T12:55:00Z
12
value 0.0005
scoring_system epss
scoring_elements 0.15444
published_at 2026-04-24T12:55:00Z
13
value 0.0005
scoring_system epss
scoring_elements 0.15442
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-26341
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2061703
reference_id 2061703
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2061703
4
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
5
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
6
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
7
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
8
reference_url https://access.redhat.com/errata/RHSA-2024:1877
reference_id RHSA-2024:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1877
fixed_packages
aliases CVE-2021-26341
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ezb4-x5pv-myhe
21
url VCID-g2k9-eds7-6qe3
vulnerability_id VCID-g2k9-eds7-6qe3
summary kernel: memory corruption in usbmon driver
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43750.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43750.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-43750
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.19108
published_at 2026-04-21T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.19101
published_at 2026-04-18T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19091
published_at 2026-04-16T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.19133
published_at 2026-04-13T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.19187
published_at 2026-04-12T12:55:00Z
5
value 0.00069
scoring_system epss
scoring_elements 0.21309
published_at 2026-04-11T12:55:00Z
6
value 0.00069
scoring_system epss
scoring_elements 0.2114
published_at 2026-04-26T12:55:00Z
7
value 0.00069
scoring_system epss
scoring_elements 0.21351
published_at 2026-04-02T12:55:00Z
8
value 0.00069
scoring_system epss
scoring_elements 0.21406
published_at 2026-04-04T12:55:00Z
9
value 0.00069
scoring_system epss
scoring_elements 0.21158
published_at 2026-04-07T12:55:00Z
10
value 0.00069
scoring_system epss
scoring_elements 0.21237
published_at 2026-04-08T12:55:00Z
11
value 0.00069
scoring_system epss
scoring_elements 0.21299
published_at 2026-04-09T12:55:00Z
12
value 0.00069
scoring_system epss
scoring_elements 0.21138
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-43750
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43750
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2151270
reference_id 2151270
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2151270
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://access.redhat.com/errata/RHSA-2023:1987
reference_id RHSA-2023:1987
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1987
10
reference_url https://access.redhat.com/errata/RHSA-2023:1988
reference_id RHSA-2023:1988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1988
11
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
12
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
13
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
14
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
15
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
16
reference_url https://usn.ubuntu.com/5758-1/
reference_id USN-5758-1
reference_type
scores
url https://usn.ubuntu.com/5758-1/
17
reference_url https://usn.ubuntu.com/5791-1/
reference_id USN-5791-1
reference_type
scores
url https://usn.ubuntu.com/5791-1/
18
reference_url https://usn.ubuntu.com/5791-2/
reference_id USN-5791-2
reference_type
scores
url https://usn.ubuntu.com/5791-2/
19
reference_url https://usn.ubuntu.com/5791-3/
reference_id USN-5791-3
reference_type
scores
url https://usn.ubuntu.com/5791-3/
20
reference_url https://usn.ubuntu.com/5792-1/
reference_id USN-5792-1
reference_type
scores
url https://usn.ubuntu.com/5792-1/
21
reference_url https://usn.ubuntu.com/5792-2/
reference_id USN-5792-2
reference_type
scores
url https://usn.ubuntu.com/5792-2/
22
reference_url https://usn.ubuntu.com/5793-1/
reference_id USN-5793-1
reference_type
scores
url https://usn.ubuntu.com/5793-1/
23
reference_url https://usn.ubuntu.com/5793-2/
reference_id USN-5793-2
reference_type
scores
url https://usn.ubuntu.com/5793-2/
24
reference_url https://usn.ubuntu.com/5793-3/
reference_id USN-5793-3
reference_type
scores
url https://usn.ubuntu.com/5793-3/
25
reference_url https://usn.ubuntu.com/5793-4/
reference_id USN-5793-4
reference_type
scores
url https://usn.ubuntu.com/5793-4/
26
reference_url https://usn.ubuntu.com/5815-1/
reference_id USN-5815-1
reference_type
scores
url https://usn.ubuntu.com/5815-1/
27
reference_url https://usn.ubuntu.com/5854-1/
reference_id USN-5854-1
reference_type
scores
url https://usn.ubuntu.com/5854-1/
28
reference_url https://usn.ubuntu.com/5861-1/
reference_id USN-5861-1
reference_type
scores
url https://usn.ubuntu.com/5861-1/
29
reference_url https://usn.ubuntu.com/5862-1/
reference_id USN-5862-1
reference_type
scores
url https://usn.ubuntu.com/5862-1/
30
reference_url https://usn.ubuntu.com/5865-1/
reference_id USN-5865-1
reference_type
scores
url https://usn.ubuntu.com/5865-1/
31
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
32
reference_url https://usn.ubuntu.com/5883-1/
reference_id USN-5883-1
reference_type
scores
url https://usn.ubuntu.com/5883-1/
33
reference_url https://usn.ubuntu.com/5913-1/
reference_id USN-5913-1
reference_type
scores
url https://usn.ubuntu.com/5913-1/
34
reference_url https://usn.ubuntu.com/5919-1/
reference_id USN-5919-1
reference_type
scores
url https://usn.ubuntu.com/5919-1/
35
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
36
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
37
reference_url https://usn.ubuntu.com/6007-1/
reference_id USN-6007-1
reference_type
scores
url https://usn.ubuntu.com/6007-1/
fixed_packages
aliases CVE-2022-43750
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g2k9-eds7-6qe3
22
url VCID-ghef-adjn-rqcb
vulnerability_id VCID-ghef-adjn-rqcb
summary kernel: denial of service in tipc_conn_close
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1382.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1382.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1382
reference_id
reference_type
scores
0
value 0.0001
scoring_system epss
scoring_elements 0.01095
published_at 2026-04-09T12:55:00Z
1
value 0.0001
scoring_system epss
scoring_elements 0.01091
published_at 2026-04-07T12:55:00Z
2
value 0.0001
scoring_system epss
scoring_elements 0.01096
published_at 2026-04-08T12:55:00Z
3
value 0.0001
scoring_system epss
scoring_elements 0.01079
published_at 2026-04-11T12:55:00Z
4
value 0.0001
scoring_system epss
scoring_elements 0.01073
published_at 2026-04-12T12:55:00Z
5
value 0.0001
scoring_system epss
scoring_elements 0.01074
published_at 2026-04-13T12:55:00Z
6
value 0.0001
scoring_system epss
scoring_elements 0.01068
published_at 2026-04-16T12:55:00Z
7
value 0.0001
scoring_system epss
scoring_elements 0.01077
published_at 2026-04-18T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.03381
published_at 2026-04-26T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03379
published_at 2026-04-24T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.0339
published_at 2026-04-21T12:55:00Z
11
value 9e-05
scoring_system epss
scoring_elements 0.00895
published_at 2026-04-04T12:55:00Z
12
value 9e-05
scoring_system epss
scoring_elements 0.00893
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1382
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1382
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1382
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2177371
reference_id 2177371
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2177371
5
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
6
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
7
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
8
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
9
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
10
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
11
reference_url https://lore.kernel.org/netdev/bc7bd3183f1c275c820690fc65b708238fe9e38e.1668807842.git.lucien.xin%40gmail.com/T/#u
reference_id #u
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:20Z/
url https://lore.kernel.org/netdev/bc7bd3183f1c275c820690fc65b708238fe9e38e.1668807842.git.lucien.xin%40gmail.com/T/#u
12
reference_url https://usn.ubuntu.com/6000-1/
reference_id USN-6000-1
reference_type
scores
url https://usn.ubuntu.com/6000-1/
13
reference_url https://usn.ubuntu.com/6739-1/
reference_id USN-6739-1
reference_type
scores
url https://usn.ubuntu.com/6739-1/
14
reference_url https://usn.ubuntu.com/6740-1/
reference_id USN-6740-1
reference_type
scores
url https://usn.ubuntu.com/6740-1/
fixed_packages
aliases CVE-2023-1382
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ghef-adjn-rqcb
23
url VCID-guqa-19j6-bba4
vulnerability_id VCID-guqa-19j6-bba4
summary kernel: scsi: mpt3sas: Fix use-after-free warning
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48695.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48695.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-48695
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04582
published_at 2026-04-02T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04804
published_at 2026-04-26T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04609
published_at 2026-04-13T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04644
published_at 2026-04-08T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04659
published_at 2026-04-09T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04654
published_at 2026-04-11T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04636
published_at 2026-04-12T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04585
published_at 2026-04-16T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04594
published_at 2026-04-18T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.04732
published_at 2026-04-21T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04769
published_at 2026-04-24T12:55:00Z
11
value 0.00018
scoring_system epss
scoring_elements 0.04602
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-48695
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48695
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2278999
reference_id 2278999
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2278999
5
reference_url https://git.kernel.org/stable/c/41acb064c4e013808bc7d5fc1b506fa449425b0b
reference_id 41acb064c4e013808bc7d5fc1b506fa449425b0b
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:45Z/
url https://git.kernel.org/stable/c/41acb064c4e013808bc7d5fc1b506fa449425b0b
6
reference_url https://git.kernel.org/stable/c/5682c94644fde72f72bded6580c38189ffc856b5
reference_id 5682c94644fde72f72bded6580c38189ffc856b5
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:45Z/
url https://git.kernel.org/stable/c/5682c94644fde72f72bded6580c38189ffc856b5
7
reference_url https://git.kernel.org/stable/c/6229fa494a5949be209bc73afbc5d0a749c2e3c7
reference_id 6229fa494a5949be209bc73afbc5d0a749c2e3c7
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:45Z/
url https://git.kernel.org/stable/c/6229fa494a5949be209bc73afbc5d0a749c2e3c7
8
reference_url https://git.kernel.org/stable/c/82efb917eeb27454dc4c6fe26432fc8f6c75bc16
reference_id 82efb917eeb27454dc4c6fe26432fc8f6c75bc16
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:45Z/
url https://git.kernel.org/stable/c/82efb917eeb27454dc4c6fe26432fc8f6c75bc16
9
reference_url https://git.kernel.org/stable/c/991df3dd5144f2e6b1c38b8d20ed3d4d21e20b34
reference_id 991df3dd5144f2e6b1c38b8d20ed3d4d21e20b34
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:45Z/
url https://git.kernel.org/stable/c/991df3dd5144f2e6b1c38b8d20ed3d4d21e20b34
10
reference_url https://git.kernel.org/stable/c/b8fc9e91b931215110ba824d1a2983c5f60b6f82
reference_id b8fc9e91b931215110ba824d1a2983c5f60b6f82
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:45Z/
url https://git.kernel.org/stable/c/b8fc9e91b931215110ba824d1a2983c5f60b6f82
11
reference_url https://git.kernel.org/stable/c/d4959d09b76eb7a4146f5133962b88d3bddb63d6
reference_id d4959d09b76eb7a4146f5133962b88d3bddb63d6
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:45Z/
url https://git.kernel.org/stable/c/d4959d09b76eb7a4146f5133962b88d3bddb63d6
12
reference_url https://git.kernel.org/stable/c/ea10a652ad2ae2cf3eced6f632a5c98f26727057
reference_id ea10a652ad2ae2cf3eced6f632a5c98f26727057
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:45Z/
url https://git.kernel.org/stable/c/ea10a652ad2ae2cf3eced6f632a5c98f26727057
13
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
14
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
15
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
16
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
17
reference_url https://access.redhat.com/errata/RHSA-2024:9500
reference_id RHSA-2024:9500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9500
fixed_packages
aliases CVE-2022-48695
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-guqa-19j6-bba4
24
url VCID-h82m-mnhk-67e2
vulnerability_id VCID-h82m-mnhk-67e2
summary kernel: TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39189.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39189.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-39189
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05267
published_at 2026-04-02T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05509
published_at 2026-04-26T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05299
published_at 2026-04-04T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05325
published_at 2026-04-07T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05358
published_at 2026-04-08T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05382
published_at 2026-04-09T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.0535
published_at 2026-04-11T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05338
published_at 2026-04-12T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05328
published_at 2026-04-13T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.05276
published_at 2026-04-16T12:55:00Z
10
value 0.0002
scoring_system epss
scoring_elements 0.05277
published_at 2026-04-18T12:55:00Z
11
value 0.0002
scoring_system epss
scoring_elements 0.05428
published_at 2026-04-21T12:55:00Z
12
value 0.0002
scoring_system epss
scoring_elements 0.05468
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-39189
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
33
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2124788
reference_id 2124788
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2124788
35
reference_url https://github.com/torvalds/linux/commit/6cd88243c7e03845a450795e134b488fc2afb736
reference_id 6cd88243c7e03845a450795e134b488fc2afb736
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:29:41Z/
url https://github.com/torvalds/linux/commit/6cd88243c7e03845a450795e134b488fc2afb736
36
reference_url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.17
reference_id ChangeLog-5.18.17
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:29:41Z/
url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.17
37
reference_url https://bugs.chromium.org/p/project-zero/issues/detail?id=2309
reference_id detail?id=2309
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:29:41Z/
url https://bugs.chromium.org/p/project-zero/issues/detail?id=2309
38
reference_url https://www.debian.org/security/2023/dsa-5480
reference_id dsa-5480
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:29:41Z/
url https://www.debian.org/security/2023/dsa-5480
39
reference_url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6cd88243c7e03845a450795e134b488fc2afb736
reference_id ?id=6cd88243c7e03845a450795e134b488fc2afb736
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:29:41Z/
url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6cd88243c7e03845a450795e134b488fc2afb736
40
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:29:41Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
41
reference_url https://security.netapp.com/advisory/ntap-20230214-0007/
reference_id ntap-20230214-0007
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:29:41Z/
url https://security.netapp.com/advisory/ntap-20230214-0007/
42
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
43
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
44
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
45
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
46
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
47
reference_url https://usn.ubuntu.com/5667-1/
reference_id USN-5667-1
reference_type
scores
url https://usn.ubuntu.com/5667-1/
48
reference_url https://usn.ubuntu.com/5683-1/
reference_id USN-5683-1
reference_type
scores
url https://usn.ubuntu.com/5683-1/
49
reference_url https://usn.ubuntu.com/5703-1/
reference_id USN-5703-1
reference_type
scores
url https://usn.ubuntu.com/5703-1/
fixed_packages
aliases CVE-2022-39189
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h82m-mnhk-67e2
25
url VCID-jefe-c9nd-ufc1
vulnerability_id VCID-jefe-c9nd-ufc1
summary kernel: USB-accessible buffer overflow in brcmfmac
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3628.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3628.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3628
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20547
published_at 2026-04-26T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20785
published_at 2026-04-11T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20742
published_at 2026-04-12T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.2069
published_at 2026-04-13T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20675
published_at 2026-04-16T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20671
published_at 2026-04-18T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.20663
published_at 2026-04-21T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.2055
published_at 2026-04-24T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20858
published_at 2026-04-02T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20916
published_at 2026-04-04T12:55:00Z
10
value 0.00067
scoring_system epss
scoring_elements 0.2063
published_at 2026-04-07T12:55:00Z
11
value 0.00067
scoring_system epss
scoring_elements 0.20706
published_at 2026-04-08T12:55:00Z
12
value 0.00067
scoring_system epss
scoring_elements 0.20767
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3628
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3628
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2150960
reference_id 2150960
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2150960
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/drivers/net/wireless/broadcom/brcm80211/brcmfmac/fweh.c?id=6788ba8aed4e28e90f72d68a9d794e34eac17295
reference_id fweh.c?id=6788ba8aed4e28e90f72d68a9d794e34eac17295
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-08T14:15:33Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/drivers/net/wireless/broadcom/brcm80211/brcmfmac/fweh.c?id=6788ba8aed4e28e90f72d68a9d794e34eac17295
10
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
11
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
12
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
13
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
14
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
15
reference_url https://usn.ubuntu.com/5780-1/
reference_id USN-5780-1
reference_type
scores
url https://usn.ubuntu.com/5780-1/
16
reference_url https://usn.ubuntu.com/5850-1/
reference_id USN-5850-1
reference_type
scores
url https://usn.ubuntu.com/5850-1/
17
reference_url https://usn.ubuntu.com/5851-1/
reference_id USN-5851-1
reference_type
scores
url https://usn.ubuntu.com/5851-1/
18
reference_url https://usn.ubuntu.com/5853-1/
reference_id USN-5853-1
reference_type
scores
url https://usn.ubuntu.com/5853-1/
19
reference_url https://usn.ubuntu.com/5860-1/
reference_id USN-5860-1
reference_type
scores
url https://usn.ubuntu.com/5860-1/
20
reference_url https://usn.ubuntu.com/5874-1/
reference_id USN-5874-1
reference_type
scores
url https://usn.ubuntu.com/5874-1/
21
reference_url https://usn.ubuntu.com/5875-1/
reference_id USN-5875-1
reference_type
scores
url https://usn.ubuntu.com/5875-1/
22
reference_url https://usn.ubuntu.com/5876-1/
reference_id USN-5876-1
reference_type
scores
url https://usn.ubuntu.com/5876-1/
23
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
24
reference_url https://usn.ubuntu.com/5878-1/
reference_id USN-5878-1
reference_type
scores
url https://usn.ubuntu.com/5878-1/
25
reference_url https://usn.ubuntu.com/5879-1/
reference_id USN-5879-1
reference_type
scores
url https://usn.ubuntu.com/5879-1/
26
reference_url https://usn.ubuntu.com/5883-1/
reference_id USN-5883-1
reference_type
scores
url https://usn.ubuntu.com/5883-1/
27
reference_url https://usn.ubuntu.com/5909-1/
reference_id USN-5909-1
reference_type
scores
url https://usn.ubuntu.com/5909-1/
28
reference_url https://usn.ubuntu.com/5918-1/
reference_id USN-5918-1
reference_type
scores
url https://usn.ubuntu.com/5918-1/
29
reference_url https://usn.ubuntu.com/5919-1/
reference_id USN-5919-1
reference_type
scores
url https://usn.ubuntu.com/5919-1/
30
reference_url https://usn.ubuntu.com/5920-1/
reference_id USN-5920-1
reference_type
scores
url https://usn.ubuntu.com/5920-1/
31
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
32
reference_url https://usn.ubuntu.com/5925-1/
reference_id USN-5925-1
reference_type
scores
url https://usn.ubuntu.com/5925-1/
33
reference_url https://usn.ubuntu.com/5927-1/
reference_id USN-5927-1
reference_type
scores
url https://usn.ubuntu.com/5927-1/
34
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
35
reference_url https://usn.ubuntu.com/5976-1/
reference_id USN-5976-1
reference_type
scores
url https://usn.ubuntu.com/5976-1/
36
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
37
reference_url https://usn.ubuntu.com/6007-1/
reference_id USN-6007-1
reference_type
scores
url https://usn.ubuntu.com/6007-1/
38
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
39
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
fixed_packages
aliases CVE-2022-3628
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jefe-c9nd-ufc1
26
url VCID-jsr8-pv5g-kba8
vulnerability_id VCID-jsr8-pv5g-kba8
summary kernel: u8 overflow problem in cfg80211_update_notlisted_nontrans()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41674.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41674.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-41674
reference_id
reference_type
scores
0
value 0.00471
scoring_system epss
scoring_elements 0.64621
published_at 2026-04-21T12:55:00Z
1
value 0.00471
scoring_system epss
scoring_elements 0.64641
published_at 2026-04-24T12:55:00Z
2
value 0.00471
scoring_system epss
scoring_elements 0.64653
published_at 2026-04-26T12:55:00Z
3
value 0.00511
scoring_system epss
scoring_elements 0.66486
published_at 2026-04-18T12:55:00Z
4
value 0.00511
scoring_system epss
scoring_elements 0.66422
published_at 2026-04-04T12:55:00Z
5
value 0.00511
scoring_system epss
scoring_elements 0.66396
published_at 2026-04-02T12:55:00Z
6
value 0.00511
scoring_system epss
scoring_elements 0.66468
published_at 2026-04-16T12:55:00Z
7
value 0.00511
scoring_system epss
scoring_elements 0.66432
published_at 2026-04-13T12:55:00Z
8
value 0.00511
scoring_system epss
scoring_elements 0.66463
published_at 2026-04-12T12:55:00Z
9
value 0.00511
scoring_system epss
scoring_elements 0.66475
published_at 2026-04-11T12:55:00Z
10
value 0.00511
scoring_system epss
scoring_elements 0.66455
published_at 2026-04-09T12:55:00Z
11
value 0.00511
scoring_system epss
scoring_elements 0.66441
published_at 2026-04-08T12:55:00Z
12
value 0.00511
scoring_system epss
scoring_elements 0.66392
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-41674
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
19
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
20
reference_url http://www.openwall.com/lists/oss-security/2022/10/13/2
reference_id 2
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/
url http://www.openwall.com/lists/oss-security/2022/10/13/2
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2134377
reference_id 2134377
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2134377
22
reference_url https://www.openwall.com/lists/oss-security/2022/10/13/5
reference_id 5
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/
url https://www.openwall.com/lists/oss-security/2022/10/13/5
23
reference_url https://security.archlinux.org/ASA-202210-1
reference_id ASA-202210-1
reference_type
scores
url https://security.archlinux.org/ASA-202210-1
24
reference_url https://security.archlinux.org/ASA-202210-2
reference_id ASA-202210-2
reference_type
scores
url https://security.archlinux.org/ASA-202210-2
25
reference_url https://security.archlinux.org/ASA-202210-3
reference_id ASA-202210-3
reference_type
scores
url https://security.archlinux.org/ASA-202210-3
26
reference_url https://security.archlinux.org/ASA-202210-4
reference_id ASA-202210-4
reference_type
scores
url https://security.archlinux.org/ASA-202210-4
27
reference_url https://security.archlinux.org/AVG-2800
reference_id AVG-2800
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2800
28
reference_url https://security.archlinux.org/AVG-2801
reference_id AVG-2801
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2801
29
reference_url https://security.archlinux.org/AVG-2802
reference_id AVG-2802
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2802
30
reference_url https://security.archlinux.org/AVG-2803
reference_id AVG-2803
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2803
31
reference_url https://www.debian.org/security/2022/dsa-5257
reference_id dsa-5257
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/
url https://www.debian.org/security/2022/dsa-5257
32
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY/
reference_id GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY/
33
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/wireless/wireless.git/commit/?id=aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d
reference_id ?id=aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/wireless/wireless.git/commit/?id=aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d
34
reference_url http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html
reference_id Kernel-Live-Patch-Security-Notice-LSN-0090-1.html
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/
url http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html
35
reference_url https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html
reference_id msg00001.html
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/
url https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html
36
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
37
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
38
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
39
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
40
reference_url https://access.redhat.com/errata/RHSA-2024:1188
reference_id RHSA-2024:1188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1188
41
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2/
reference_id S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2/
42
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/net/mac80211/scan.c
reference_id scan.c
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/net/mac80211/scan.c
43
reference_url https://bugzilla.suse.com/show_bug.cgi?id=1203770
reference_id show_bug.cgi?id=1203770
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/
url https://bugzilla.suse.com/show_bug.cgi?id=1203770
44
reference_url https://usn.ubuntu.com/5691-1/
reference_id USN-5691-1
reference_type
scores
url https://usn.ubuntu.com/5691-1/
45
reference_url https://usn.ubuntu.com/5692-1/
reference_id USN-5692-1
reference_type
scores
url https://usn.ubuntu.com/5692-1/
46
reference_url https://usn.ubuntu.com/5693-1/
reference_id USN-5693-1
reference_type
scores
url https://usn.ubuntu.com/5693-1/
47
reference_url https://usn.ubuntu.com/5700-1/
reference_id USN-5700-1
reference_type
scores
url https://usn.ubuntu.com/5700-1/
48
reference_url https://usn.ubuntu.com/5708-1/
reference_id USN-5708-1
reference_type
scores
url https://usn.ubuntu.com/5708-1/
49
reference_url https://usn.ubuntu.com/5752-1/
reference_id USN-5752-1
reference_type
scores
url https://usn.ubuntu.com/5752-1/
50
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR/
reference_id VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR/
fixed_packages
aliases CVE-2022-41674
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jsr8-pv5g-kba8
27
url VCID-m26e-r8mc-jbbq
vulnerability_id VCID-m26e-r8mc-jbbq
summary kernel: KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2196.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2196.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2196
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09644
published_at 2026-04-26T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09629
published_at 2026-04-21T12:55:00Z
2
value 0.00033
scoring_system epss
scoring_elements 0.09677
published_at 2026-04-24T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12259
published_at 2026-04-16T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.12398
published_at 2026-04-12T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.12358
published_at 2026-04-13T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12258
published_at 2026-04-18T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.12452
published_at 2026-04-02T12:55:00Z
8
value 0.00041
scoring_system epss
scoring_elements 0.12496
published_at 2026-04-04T12:55:00Z
9
value 0.00041
scoring_system epss
scoring_elements 0.12301
published_at 2026-04-07T12:55:00Z
10
value 0.00041
scoring_system epss
scoring_elements 0.1238
published_at 2026-04-08T12:55:00Z
11
value 0.00041
scoring_system epss
scoring_elements 0.1243
published_at 2026-04-09T12:55:00Z
12
value 0.00041
scoring_system epss
scoring_elements 0.12437
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2196
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2196
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2160023
reference_id 2160023
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2160023
5
reference_url https://kernel.dance/#2e7eab81425a
reference_id #2e7eab81425a
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-01T15:07:47Z/
url https://kernel.dance/#2e7eab81425a
6
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2e7eab81425ad6c875f2ed47c0ce01e78afc38a5
reference_id ?id=2e7eab81425ad6c875f2ed47c0ce01e78afc38a5
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-01T15:07:47Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2e7eab81425ad6c875f2ed47c0ce01e78afc38a5
7
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-01T15:07:47Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
8
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
9
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
10
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
11
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
12
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
13
reference_url https://usn.ubuntu.com/5970-1/
reference_id USN-5970-1
reference_type
scores
url https://usn.ubuntu.com/5970-1/
14
reference_url https://usn.ubuntu.com/5976-1/
reference_id USN-5976-1
reference_type
scores
url https://usn.ubuntu.com/5976-1/
15
reference_url https://usn.ubuntu.com/5977-1/
reference_id USN-5977-1
reference_type
scores
url https://usn.ubuntu.com/5977-1/
16
reference_url https://usn.ubuntu.com/5978-1/
reference_id USN-5978-1
reference_type
scores
url https://usn.ubuntu.com/5978-1/
17
reference_url https://usn.ubuntu.com/5979-1/
reference_id USN-5979-1
reference_type
scores
url https://usn.ubuntu.com/5979-1/
18
reference_url https://usn.ubuntu.com/5980-1/
reference_id USN-5980-1
reference_type
scores
url https://usn.ubuntu.com/5980-1/
19
reference_url https://usn.ubuntu.com/5982-1/
reference_id USN-5982-1
reference_type
scores
url https://usn.ubuntu.com/5982-1/
20
reference_url https://usn.ubuntu.com/5985-1/
reference_id USN-5985-1
reference_type
scores
url https://usn.ubuntu.com/5985-1/
21
reference_url https://usn.ubuntu.com/5987-1/
reference_id USN-5987-1
reference_type
scores
url https://usn.ubuntu.com/5987-1/
22
reference_url https://usn.ubuntu.com/6004-1/
reference_id USN-6004-1
reference_type
scores
url https://usn.ubuntu.com/6004-1/
23
reference_url https://usn.ubuntu.com/6020-1/
reference_id USN-6020-1
reference_type
scores
url https://usn.ubuntu.com/6020-1/
24
reference_url https://usn.ubuntu.com/6151-1/
reference_id USN-6151-1
reference_type
scores
url https://usn.ubuntu.com/6151-1/
fixed_packages
aliases CVE-2022-2196
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m26e-r8mc-jbbq
28
url VCID-m4wy-164p-qyh7
vulnerability_id VCID-m4wy-164p-qyh7
summary kernel: net/ulp: use-after-free in listening ULP sockets
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0461.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0461.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0461
reference_id
reference_type
scores
0
value 0.00133
scoring_system epss
scoring_elements 0.32927
published_at 2026-04-02T12:55:00Z
1
value 0.00133
scoring_system epss
scoring_elements 0.32963
published_at 2026-04-04T12:55:00Z
2
value 0.00133
scoring_system epss
scoring_elements 0.32784
published_at 2026-04-07T12:55:00Z
3
value 0.00133
scoring_system epss
scoring_elements 0.32832
published_at 2026-04-08T12:55:00Z
4
value 0.00133
scoring_system epss
scoring_elements 0.32861
published_at 2026-04-09T12:55:00Z
5
value 0.00133
scoring_system epss
scoring_elements 0.32862
published_at 2026-04-11T12:55:00Z
6
value 0.00133
scoring_system epss
scoring_elements 0.32823
published_at 2026-04-12T12:55:00Z
7
value 0.00133
scoring_system epss
scoring_elements 0.32798
published_at 2026-04-13T12:55:00Z
8
value 0.00133
scoring_system epss
scoring_elements 0.32841
published_at 2026-04-16T12:55:00Z
9
value 0.00133
scoring_system epss
scoring_elements 0.32818
published_at 2026-04-18T12:55:00Z
10
value 0.00144
scoring_system epss
scoring_elements 0.3445
published_at 2026-04-24T12:55:00Z
11
value 0.00144
scoring_system epss
scoring_elements 0.34431
published_at 2026-04-26T12:55:00Z
12
value 0.00144
scoring_system epss
scoring_elements 0.34683
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0461
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0461
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2176192
reference_id 2176192
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2176192
5
reference_url https://kernel.dance/#2c02d41d71f90a5168391b6a5f2954112ba2307c
reference_id #2c02d41d71f90a5168391b6a5f2954112ba2307c
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-01T15:55:09Z/
url https://kernel.dance/#2c02d41d71f90a5168391b6a5f2954112ba2307c
6
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2c02d41d71f90a5168391b6a5f2954112ba2307c
reference_id ?id=2c02d41d71f90a5168391b6a5f2954112ba2307c
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-01T15:55:09Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2c02d41d71f90a5168391b6a5f2954112ba2307c
7
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-01T15:55:09Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
8
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-01T15:55:09Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
9
reference_url https://access.redhat.com/errata/RHSA-2023:1556
reference_id RHSA-2023:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1556
10
reference_url https://access.redhat.com/errata/RHSA-2023:1557
reference_id RHSA-2023:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1557
11
reference_url https://access.redhat.com/errata/RHSA-2023:1662
reference_id RHSA-2023:1662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1662
12
reference_url https://access.redhat.com/errata/RHSA-2023:1841
reference_id RHSA-2023:1841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1841
13
reference_url https://access.redhat.com/errata/RHSA-2023:1923
reference_id RHSA-2023:1923
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1923
14
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
15
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
16
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
17
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
18
reference_url https://access.redhat.com/errata/RHSA-2023:3190
reference_id RHSA-2023:3190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3190
19
reference_url https://access.redhat.com/errata/RHSA-2023:3191
reference_id RHSA-2023:3191
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3191
20
reference_url https://access.redhat.com/errata/RHSA-2023:3465
reference_id RHSA-2023:3465
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3465
21
reference_url https://access.redhat.com/errata/RHSA-2023:3470
reference_id RHSA-2023:3470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3470
22
reference_url https://access.redhat.com/errata/RHSA-2023:3490
reference_id RHSA-2023:3490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3490
23
reference_url https://access.redhat.com/errata/RHSA-2023:3491
reference_id RHSA-2023:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3491
24
reference_url https://access.redhat.com/errata/RHSA-2023:4125
reference_id RHSA-2023:4125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4125
25
reference_url https://access.redhat.com/errata/RHSA-2023:4126
reference_id RHSA-2023:4126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4126
26
reference_url https://access.redhat.com/errata/RHSA-2023:4146
reference_id RHSA-2023:4146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4146
27
reference_url https://usn.ubuntu.com/5883-1/
reference_id USN-5883-1
reference_type
scores
url https://usn.ubuntu.com/5883-1/
28
reference_url https://usn.ubuntu.com/5911-1/
reference_id USN-5911-1
reference_type
scores
url https://usn.ubuntu.com/5911-1/
29
reference_url https://usn.ubuntu.com/5912-1/
reference_id USN-5912-1
reference_type
scores
url https://usn.ubuntu.com/5912-1/
30
reference_url https://usn.ubuntu.com/5913-1/
reference_id USN-5913-1
reference_type
scores
url https://usn.ubuntu.com/5913-1/
31
reference_url https://usn.ubuntu.com/5914-1/
reference_id USN-5914-1
reference_type
scores
url https://usn.ubuntu.com/5914-1/
32
reference_url https://usn.ubuntu.com/5915-1/
reference_id USN-5915-1
reference_type
scores
url https://usn.ubuntu.com/5915-1/
33
reference_url https://usn.ubuntu.com/5917-1/
reference_id USN-5917-1
reference_type
scores
url https://usn.ubuntu.com/5917-1/
34
reference_url https://usn.ubuntu.com/5919-1/
reference_id USN-5919-1
reference_type
scores
url https://usn.ubuntu.com/5919-1/
35
reference_url https://usn.ubuntu.com/5920-1/
reference_id USN-5920-1
reference_type
scores
url https://usn.ubuntu.com/5920-1/
36
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
37
reference_url https://usn.ubuntu.com/5925-1/
reference_id USN-5925-1
reference_type
scores
url https://usn.ubuntu.com/5925-1/
38
reference_url https://usn.ubuntu.com/5927-1/
reference_id USN-5927-1
reference_type
scores
url https://usn.ubuntu.com/5927-1/
39
reference_url https://usn.ubuntu.com/5929-1/
reference_id USN-5929-1
reference_type
scores
url https://usn.ubuntu.com/5929-1/
40
reference_url https://usn.ubuntu.com/5934-1/
reference_id USN-5934-1
reference_type
scores
url https://usn.ubuntu.com/5934-1/
41
reference_url https://usn.ubuntu.com/5935-1/
reference_id USN-5935-1
reference_type
scores
url https://usn.ubuntu.com/5935-1/
42
reference_url https://usn.ubuntu.com/5938-1/
reference_id USN-5938-1
reference_type
scores
url https://usn.ubuntu.com/5938-1/
43
reference_url https://usn.ubuntu.com/5939-1/
reference_id USN-5939-1
reference_type
scores
url https://usn.ubuntu.com/5939-1/
44
reference_url https://usn.ubuntu.com/5940-1/
reference_id USN-5940-1
reference_type
scores
url https://usn.ubuntu.com/5940-1/
45
reference_url https://usn.ubuntu.com/5941-1/
reference_id USN-5941-1
reference_type
scores
url https://usn.ubuntu.com/5941-1/
46
reference_url https://usn.ubuntu.com/5950-1/
reference_id USN-5950-1
reference_type
scores
url https://usn.ubuntu.com/5950-1/
47
reference_url https://usn.ubuntu.com/5951-1/
reference_id USN-5951-1
reference_type
scores
url https://usn.ubuntu.com/5951-1/
48
reference_url https://usn.ubuntu.com/5962-1/
reference_id USN-5962-1
reference_type
scores
url https://usn.ubuntu.com/5962-1/
49
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
50
reference_url https://usn.ubuntu.com/5976-1/
reference_id USN-5976-1
reference_type
scores
url https://usn.ubuntu.com/5976-1/
51
reference_url https://usn.ubuntu.com/6000-1/
reference_id USN-6000-1
reference_type
scores
url https://usn.ubuntu.com/6000-1/
52
reference_url https://usn.ubuntu.com/6007-1/
reference_id USN-6007-1
reference_type
scores
url https://usn.ubuntu.com/6007-1/
fixed_packages
aliases CVE-2023-0461
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m4wy-164p-qyh7
29
url VCID-mrhs-1bmb-3bc5
vulnerability_id VCID-mrhs-1bmb-3bc5
summary kernel: drm/virtio: improper return value check in virtio_gpu_object_shmem_init()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22998.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22998.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22998
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05191
published_at 2026-04-02T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05243
published_at 2026-04-07T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.0522
published_at 2026-04-04T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05279
published_at 2026-04-08T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05299
published_at 2026-04-09T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05267
published_at 2026-04-11T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.05252
published_at 2026-04-12T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05239
published_at 2026-04-13T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05184
published_at 2026-04-16T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.05188
published_at 2026-04-18T12:55:00Z
10
value 0.00021
scoring_system epss
scoring_elements 0.05926
published_at 2026-04-26T12:55:00Z
11
value 0.00021
scoring_system epss
scoring_elements 0.05859
published_at 2026-04-21T12:55:00Z
12
value 0.00021
scoring_system epss
scoring_elements 0.0589
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22998
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22998
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22998
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2182429
reference_id 2182429
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2182429
5
reference_url https://github.com/torvalds/linux/commit/c24968734abfed81c8f93dc5f44a7b7a9aecadfa
reference_id c24968734abfed81c8f93dc5f44a7b7a9aecadfa
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:03Z/
url https://github.com/torvalds/linux/commit/c24968734abfed81c8f93dc5f44a7b7a9aecadfa
6
reference_url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0.3
reference_id ChangeLog-6.0.3
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:03Z/
url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0.3
7
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:03Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
8
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
9
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
10
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
11
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
fixed_packages
aliases CVE-2023-22998
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mrhs-1bmb-3bc5
30
url VCID-mtrd-vfmy-pbcz
vulnerability_id VCID-mtrd-vfmy-pbcz
summary kernel: ext4: kernel bug in ext4_write_inline_data_end()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33631.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33631.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-33631
reference_id
reference_type
scores
0
value 0.00255
scoring_system epss
scoring_elements 0.48844
published_at 2026-04-01T12:55:00Z
1
value 0.00255
scoring_system epss
scoring_elements 0.48881
published_at 2026-04-02T12:55:00Z
2
value 0.00255
scoring_system epss
scoring_elements 0.4886
published_at 2026-04-07T12:55:00Z
3
value 0.00255
scoring_system epss
scoring_elements 0.48916
published_at 2026-04-21T12:55:00Z
4
value 0.00255
scoring_system epss
scoring_elements 0.48955
published_at 2026-04-18T12:55:00Z
5
value 0.00255
scoring_system epss
scoring_elements 0.48958
published_at 2026-04-16T12:55:00Z
6
value 0.00255
scoring_system epss
scoring_elements 0.48911
published_at 2026-04-13T12:55:00Z
7
value 0.00255
scoring_system epss
scoring_elements 0.48903
published_at 2026-04-12T12:55:00Z
8
value 0.00255
scoring_system epss
scoring_elements 0.48929
published_at 2026-04-11T12:55:00Z
9
value 0.00255
scoring_system epss
scoring_elements 0.48912
published_at 2026-04-09T12:55:00Z
10
value 0.00255
scoring_system epss
scoring_elements 0.48914
published_at 2026-04-26T12:55:00Z
11
value 0.00255
scoring_system epss
scoring_elements 0.48907
published_at 2026-04-04T12:55:00Z
12
value 0.00255
scoring_system epss
scoring_elements 0.48904
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-33631
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33631
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33631
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://www.openwall.com/lists/oss-security/2024/02/03/1
reference_id 1
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/
url http://www.openwall.com/lists/oss-security/2024/02/03/1
5
reference_url http://www.openwall.com/lists/oss-security/2024/01/30/10
reference_id 10
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/
url http://www.openwall.com/lists/oss-security/2024/01/30/10
6
reference_url https://gitee.com/src-openeuler/kernel/pulls/1389
reference_id 1389
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/
url https://gitee.com/src-openeuler/kernel/pulls/1389
7
reference_url https://gitee.com/src-openeuler/kernel/pulls/1396
reference_id 1396
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/
url https://gitee.com/src-openeuler/kernel/pulls/1396
8
reference_url http://www.openwall.com/lists/oss-security/2024/01/31/2
reference_id 2
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/
url http://www.openwall.com/lists/oss-security/2024/01/31/2
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2261976
reference_id 2261976
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2261976
10
reference_url http://www.openwall.com/lists/oss-security/2024/01/30/3
reference_id 3
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/
url http://www.openwall.com/lists/oss-security/2024/01/30/3
11
reference_url http://www.openwall.com/lists/oss-security/2024/01/31/3
reference_id 3
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/
url http://www.openwall.com/lists/oss-security/2024/01/31/3
12
reference_url http://www.openwall.com/lists/oss-security/2024/01/30/4
reference_id 4
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/
url http://www.openwall.com/lists/oss-security/2024/01/30/4
13
reference_url http://www.openwall.com/lists/oss-security/2024/01/30/5
reference_id 5
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/
url http://www.openwall.com/lists/oss-security/2024/01/30/5
14
reference_url http://www.openwall.com/lists/oss-security/2024/02/02/6
reference_id 6
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/
url http://www.openwall.com/lists/oss-security/2024/02/02/6
15
reference_url http://www.openwall.com/lists/oss-security/2024/01/30/9
reference_id 9
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/
url http://www.openwall.com/lists/oss-security/2024/01/30/9
16
reference_url http://www.openwall.com/lists/oss-security/2024/02/02/9
reference_id 9
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/
url http://www.openwall.com/lists/oss-security/2024/02/02/9
17
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c099c4fdc438014d5893629e70a8ba934433ee8
reference_id ?id=5c099c4fdc438014d5893629e70a8ba934433ee8
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c099c4fdc438014d5893629e70a8ba934433ee8
18
reference_url https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1030
reference_id ?id=openEuler-SA-2024-1030
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/
url https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1030
19
reference_url https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1031
reference_id ?id=openEuler-SA-2024-1031
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/
url https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1031
20
reference_url https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1032
reference_id ?id=openEuler-SA-2024-1032
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/
url https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1032
21
reference_url https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1033
reference_id ?id=openEuler-SA-2024-1033
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/
url https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1033
22
reference_url https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1034
reference_id ?id=openEuler-SA-2024-1034
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/
url https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1034
23
reference_url https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1035
reference_id ?id=openEuler-SA-2024-1035
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:54:33Z/
url https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1035
24
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
25
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
26
reference_url https://access.redhat.com/errata/RHSA-2024:1607
reference_id RHSA-2024:1607
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1607
27
reference_url https://access.redhat.com/errata/RHSA-2024:1614
reference_id RHSA-2024:1614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1614
28
reference_url https://access.redhat.com/errata/RHSA-2024:1653
reference_id RHSA-2024:1653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1653
29
reference_url https://access.redhat.com/errata/RHSA-2024:1836
reference_id RHSA-2024:1836
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1836
30
reference_url https://access.redhat.com/errata/RHSA-2024:1840
reference_id RHSA-2024:1840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1840
31
reference_url https://access.redhat.com/errata/RHSA-2024:2093
reference_id RHSA-2024:2093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2093
32
reference_url https://access.redhat.com/errata/RHSA-2024:2621
reference_id RHSA-2024:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2621
33
reference_url https://usn.ubuntu.com/6865-1/
reference_id USN-6865-1
reference_type
scores
url https://usn.ubuntu.com/6865-1/
34
reference_url https://usn.ubuntu.com/6866-1/
reference_id USN-6866-1
reference_type
scores
url https://usn.ubuntu.com/6866-1/
35
reference_url https://usn.ubuntu.com/6866-2/
reference_id USN-6866-2
reference_type
scores
url https://usn.ubuntu.com/6866-2/
36
reference_url https://usn.ubuntu.com/6866-3/
reference_id USN-6866-3
reference_type
scores
url https://usn.ubuntu.com/6866-3/
fixed_packages
aliases CVE-2021-33631
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mtrd-vfmy-pbcz
31
url VCID-n2c4-w748-tyau
vulnerability_id VCID-n2c4-w748-tyau
summary kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3623.json
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3623.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3623
reference_id
reference_type
scores
0
value 0.00077
scoring_system epss
scoring_elements 0.22866
published_at 2026-04-26T12:55:00Z
1
value 0.00077
scoring_system epss
scoring_elements 0.2319
published_at 2026-04-02T12:55:00Z
2
value 0.00077
scoring_system epss
scoring_elements 0.23234
published_at 2026-04-04T12:55:00Z
3
value 0.00077
scoring_system epss
scoring_elements 0.23023
published_at 2026-04-07T12:55:00Z
4
value 0.00077
scoring_system epss
scoring_elements 0.23096
published_at 2026-04-08T12:55:00Z
5
value 0.00077
scoring_system epss
scoring_elements 0.23149
published_at 2026-04-09T12:55:00Z
6
value 0.00077
scoring_system epss
scoring_elements 0.23168
published_at 2026-04-11T12:55:00Z
7
value 0.00077
scoring_system epss
scoring_elements 0.2313
published_at 2026-04-12T12:55:00Z
8
value 0.00077
scoring_system epss
scoring_elements 0.23073
published_at 2026-04-13T12:55:00Z
9
value 0.00077
scoring_system epss
scoring_elements 0.23088
published_at 2026-04-16T12:55:00Z
10
value 0.00077
scoring_system epss
scoring_elements 0.23079
published_at 2026-04-18T12:55:00Z
11
value 0.00077
scoring_system epss
scoring_elements 0.23042
published_at 2026-04-21T12:55:00Z
12
value 0.00077
scoring_system epss
scoring_elements 0.22872
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3623
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2165721
reference_id 2165721
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2165721
17
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
18
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
19
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
20
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
21
reference_url https://www.debian.org/security/2023/dsa-5324
reference_id dsa-5324
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:04Z/
url https://www.debian.org/security/2023/dsa-5324
22
reference_url https://vuldb.com/?id.211921
reference_id ?id.211921
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:04Z/
url https://vuldb.com/?id.211921
23
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=fac35ba763ed07ba93154c95ffc0c4a55023707f
reference_id ?id=fac35ba763ed07ba93154c95ffc0c4a55023707f
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:04Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=fac35ba763ed07ba93154c95ffc0c4a55023707f
24
reference_url https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
reference_id msg00000.html
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:04Z/
url https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
25
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
26
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
27
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
28
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
29
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
30
reference_url https://usn.ubuntu.com/5793-1/
reference_id USN-5793-1
reference_type
scores
url https://usn.ubuntu.com/5793-1/
31
reference_url https://usn.ubuntu.com/5793-2/
reference_id USN-5793-2
reference_type
scores
url https://usn.ubuntu.com/5793-2/
32
reference_url https://usn.ubuntu.com/5793-3/
reference_id USN-5793-3
reference_type
scores
url https://usn.ubuntu.com/5793-3/
33
reference_url https://usn.ubuntu.com/5793-4/
reference_id USN-5793-4
reference_type
scores
url https://usn.ubuntu.com/5793-4/
34
reference_url https://usn.ubuntu.com/5851-1/
reference_id USN-5851-1
reference_type
scores
url https://usn.ubuntu.com/5851-1/
35
reference_url https://usn.ubuntu.com/5860-1/
reference_id USN-5860-1
reference_type
scores
url https://usn.ubuntu.com/5860-1/
36
reference_url https://usn.ubuntu.com/5876-1/
reference_id USN-5876-1
reference_type
scores
url https://usn.ubuntu.com/5876-1/
37
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
38
reference_url https://usn.ubuntu.com/5917-1/
reference_id USN-5917-1
reference_type
scores
url https://usn.ubuntu.com/5917-1/
39
reference_url https://usn.ubuntu.com/5934-1/
reference_id USN-5934-1
reference_type
scores
url https://usn.ubuntu.com/5934-1/
40
reference_url https://usn.ubuntu.com/5939-1/
reference_id USN-5939-1
reference_type
scores
url https://usn.ubuntu.com/5939-1/
41
reference_url https://usn.ubuntu.com/5940-1/
reference_id USN-5940-1
reference_type
scores
url https://usn.ubuntu.com/5940-1/
42
reference_url https://usn.ubuntu.com/5951-1/
reference_id USN-5951-1
reference_type
scores
url https://usn.ubuntu.com/5951-1/
43
reference_url https://usn.ubuntu.com/6000-1/
reference_id USN-6000-1
reference_type
scores
url https://usn.ubuntu.com/6000-1/
fixed_packages
aliases CVE-2022-3623
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n2c4-w748-tyau
32
url VCID-nck8-brgn-hkdx
vulnerability_id VCID-nck8-brgn-hkdx
summary kernel: use-after-free after failed devlink reload in devlink_param_get
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3625.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3625.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3625
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05906
published_at 2026-04-26T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05836
published_at 2026-04-21T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05869
published_at 2026-04-24T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06106
published_at 2026-04-04T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.0613
published_at 2026-04-08T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06169
published_at 2026-04-09T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06159
published_at 2026-04-11T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06154
published_at 2026-04-12T12:55:00Z
8
value 0.00023
scoring_system epss
scoring_elements 0.06147
published_at 2026-04-13T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06107
published_at 2026-04-16T12:55:00Z
10
value 0.00023
scoring_system epss
scoring_elements 0.06118
published_at 2026-04-18T12:55:00Z
11
value 0.00023
scoring_system epss
scoring_elements 0.06089
published_at 2026-04-07T12:55:00Z
12
value 0.00023
scoring_system epss
scoring_elements 0.06078
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3625
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3625
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3625
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2144720
reference_id 2144720
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2144720
5
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
6
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
7
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
8
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
9
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
10
reference_url https://usn.ubuntu.com/5728-1/
reference_id USN-5728-1
reference_type
scores
url https://usn.ubuntu.com/5728-1/
11
reference_url https://usn.ubuntu.com/5728-2/
reference_id USN-5728-2
reference_type
scores
url https://usn.ubuntu.com/5728-2/
12
reference_url https://usn.ubuntu.com/5728-3/
reference_id USN-5728-3
reference_type
scores
url https://usn.ubuntu.com/5728-3/
13
reference_url https://usn.ubuntu.com/5729-1/
reference_id USN-5729-1
reference_type
scores
url https://usn.ubuntu.com/5729-1/
14
reference_url https://usn.ubuntu.com/5729-2/
reference_id USN-5729-2
reference_type
scores
url https://usn.ubuntu.com/5729-2/
fixed_packages
aliases CVE-2022-3625
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nck8-brgn-hkdx
33
url VCID-ng25-c2xk-9fem
vulnerability_id VCID-ng25-c2xk-9fem
summary kernel: NULL pointer dereference in traffic control subsystem
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47929.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47929.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-47929
reference_id
reference_type
scores
0
value 0.0003
scoring_system epss
scoring_elements 0.08652
published_at 2026-04-26T12:55:00Z
1
value 0.0003
scoring_system epss
scoring_elements 0.08685
published_at 2026-04-21T12:55:00Z
2
value 0.0003
scoring_system epss
scoring_elements 0.08699
published_at 2026-04-24T12:55:00Z
3
value 0.00033
scoring_system epss
scoring_elements 0.09541
published_at 2026-04-12T12:55:00Z
4
value 0.00033
scoring_system epss
scoring_elements 0.09472
published_at 2026-04-02T12:55:00Z
5
value 0.00033
scoring_system epss
scoring_elements 0.0942
published_at 2026-04-18T12:55:00Z
6
value 0.00033
scoring_system epss
scoring_elements 0.09419
published_at 2026-04-16T12:55:00Z
7
value 0.00033
scoring_system epss
scoring_elements 0.09525
published_at 2026-04-13T12:55:00Z
8
value 0.00033
scoring_system epss
scoring_elements 0.09521
published_at 2026-04-04T12:55:00Z
9
value 0.00033
scoring_system epss
scoring_elements 0.09434
published_at 2026-04-07T12:55:00Z
10
value 0.00033
scoring_system epss
scoring_elements 0.09508
published_at 2026-04-08T12:55:00Z
11
value 0.00033
scoring_system epss
scoring_elements 0.09556
published_at 2026-04-09T12:55:00Z
12
value 0.00033
scoring_system epss
scoring_elements 0.0957
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-47929
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2168246
reference_id 2168246
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2168246
17
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
18
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
19
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
20
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
21
reference_url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.6
reference_id ChangeLog-6.1.6
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/
url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.6
22
reference_url https://tldp.org/HOWTO/Traffic-Control-HOWTO/components.html
reference_id components.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/
url https://tldp.org/HOWTO/Traffic-Control-HOWTO/components.html
23
reference_url https://www.debian.org/security/2023/dsa-5324
reference_id dsa-5324
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/
url https://www.debian.org/security/2023/dsa-5324
24
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96398560f26aa07e8f2969d73c8197e6a6d10407
reference_id ?id=96398560f26aa07e8f2969d73c8197e6a6d10407
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96398560f26aa07e8f2969d73c8197e6a6d10407
25
reference_url https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
reference_id msg00000.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/
url https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
26
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
27
reference_url https://www.spinics.net/lists/netdev/msg555705.html
reference_id msg555705.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/
url https://www.spinics.net/lists/netdev/msg555705.html
28
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
29
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
30
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
31
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
32
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
33
reference_url https://usn.ubuntu.com/5915-1/
reference_id USN-5915-1
reference_type
scores
url https://usn.ubuntu.com/5915-1/
34
reference_url https://usn.ubuntu.com/5917-1/
reference_id USN-5917-1
reference_type
scores
url https://usn.ubuntu.com/5917-1/
35
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
36
reference_url https://usn.ubuntu.com/5927-1/
reference_id USN-5927-1
reference_type
scores
url https://usn.ubuntu.com/5927-1/
37
reference_url https://usn.ubuntu.com/5934-1/
reference_id USN-5934-1
reference_type
scores
url https://usn.ubuntu.com/5934-1/
38
reference_url https://usn.ubuntu.com/5939-1/
reference_id USN-5939-1
reference_type
scores
url https://usn.ubuntu.com/5939-1/
39
reference_url https://usn.ubuntu.com/5940-1/
reference_id USN-5940-1
reference_type
scores
url https://usn.ubuntu.com/5940-1/
40
reference_url https://usn.ubuntu.com/5951-1/
reference_id USN-5951-1
reference_type
scores
url https://usn.ubuntu.com/5951-1/
41
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
42
reference_url https://usn.ubuntu.com/5981-1/
reference_id USN-5981-1
reference_type
scores
url https://usn.ubuntu.com/5981-1/
43
reference_url https://usn.ubuntu.com/5984-1/
reference_id USN-5984-1
reference_type
scores
url https://usn.ubuntu.com/5984-1/
44
reference_url https://usn.ubuntu.com/5991-1/
reference_id USN-5991-1
reference_type
scores
url https://usn.ubuntu.com/5991-1/
45
reference_url https://usn.ubuntu.com/6000-1/
reference_id USN-6000-1
reference_type
scores
url https://usn.ubuntu.com/6000-1/
46
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
47
reference_url https://usn.ubuntu.com/6009-1/
reference_id USN-6009-1
reference_type
scores
url https://usn.ubuntu.com/6009-1/
48
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
49
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
50
reference_url https://usn.ubuntu.com/6024-1/
reference_id USN-6024-1
reference_type
scores
url https://usn.ubuntu.com/6024-1/
51
reference_url https://usn.ubuntu.com/6025-1/
reference_id USN-6025-1
reference_type
scores
url https://usn.ubuntu.com/6025-1/
52
reference_url https://usn.ubuntu.com/6030-1/
reference_id USN-6030-1
reference_type
scores
url https://usn.ubuntu.com/6030-1/
53
reference_url https://usn.ubuntu.com/6040-1/
reference_id USN-6040-1
reference_type
scores
url https://usn.ubuntu.com/6040-1/
54
reference_url https://usn.ubuntu.com/6057-1/
reference_id USN-6057-1
reference_type
scores
url https://usn.ubuntu.com/6057-1/
55
reference_url https://usn.ubuntu.com/6134-1/
reference_id USN-6134-1
reference_type
scores
url https://usn.ubuntu.com/6134-1/
56
reference_url https://usn.ubuntu.com/6247-1/
reference_id USN-6247-1
reference_type
scores
url https://usn.ubuntu.com/6247-1/
57
reference_url https://usn.ubuntu.com/6248-1/
reference_id USN-6248-1
reference_type
scores
url https://usn.ubuntu.com/6248-1/
fixed_packages
aliases CVE-2022-47929
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ng25-c2xk-9fem
34
url VCID-p1a3-k51z-byc7
vulnerability_id VCID-p1a3-k51z-byc7
summary kernel: possible race condition in drivers/tty/tty_buffers.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1462.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1462.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1462
reference_id
reference_type
scores
0
value 0.00041
scoring_system epss
scoring_elements 0.12553
published_at 2026-04-01T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.12657
published_at 2026-04-02T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12699
published_at 2026-04-04T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12511
published_at 2026-04-07T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.12589
published_at 2026-04-08T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.12641
published_at 2026-04-09T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12608
published_at 2026-04-11T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.12568
published_at 2026-04-12T12:55:00Z
8
value 0.00041
scoring_system epss
scoring_elements 0.12528
published_at 2026-04-13T12:55:00Z
9
value 0.00041
scoring_system epss
scoring_elements 0.12433
published_at 2026-04-16T12:55:00Z
10
value 0.00041
scoring_system epss
scoring_elements 0.12437
published_at 2026-04-18T12:55:00Z
11
value 0.00041
scoring_system epss
scoring_elements 0.12552
published_at 2026-04-21T12:55:00Z
12
value 0.00041
scoring_system epss
scoring_elements 0.1256
published_at 2026-04-24T12:55:00Z
13
value 0.00041
scoring_system epss
scoring_elements 0.12526
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1462
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1462
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2078466
reference_id 2078466
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2078466
5
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
6
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
7
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
8
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
9
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
10
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
11
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
12
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
fixed_packages
aliases CVE-2022-1462
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p1a3-k51z-byc7
35
url VCID-pf6k-jwex-8kay
vulnerability_id VCID-pf6k-jwex-8kay
summary kernel: Denial of service in beacon protection for P2P-device
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42722.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42722.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42722
reference_id
reference_type
scores
0
value 0.00079
scoring_system epss
scoring_elements 0.23143
published_at 2026-04-26T12:55:00Z
1
value 0.00079
scoring_system epss
scoring_elements 0.23349
published_at 2026-04-13T12:55:00Z
2
value 0.00079
scoring_system epss
scoring_elements 0.23367
published_at 2026-04-16T12:55:00Z
3
value 0.00079
scoring_system epss
scoring_elements 0.23361
published_at 2026-04-18T12:55:00Z
4
value 0.00079
scoring_system epss
scoring_elements 0.23341
published_at 2026-04-21T12:55:00Z
5
value 0.00079
scoring_system epss
scoring_elements 0.2315
published_at 2026-04-24T12:55:00Z
6
value 0.00079
scoring_system epss
scoring_elements 0.23477
published_at 2026-04-02T12:55:00Z
7
value 0.00079
scoring_system epss
scoring_elements 0.23514
published_at 2026-04-04T12:55:00Z
8
value 0.00079
scoring_system epss
scoring_elements 0.23298
published_at 2026-04-07T12:55:00Z
9
value 0.00079
scoring_system epss
scoring_elements 0.2337
published_at 2026-04-08T12:55:00Z
10
value 0.00079
scoring_system epss
scoring_elements 0.23422
published_at 2026-04-09T12:55:00Z
11
value 0.00079
scoring_system epss
scoring_elements 0.23441
published_at 2026-04-11T12:55:00Z
12
value 0.00079
scoring_system epss
scoring_elements 0.23403
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42722
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
19
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2134517
reference_id 2134517
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2134517
21
reference_url https://security.archlinux.org/ASA-202210-1
reference_id ASA-202210-1
reference_type
scores
url https://security.archlinux.org/ASA-202210-1
22
reference_url https://security.archlinux.org/ASA-202210-2
reference_id ASA-202210-2
reference_type
scores
url https://security.archlinux.org/ASA-202210-2
23
reference_url https://security.archlinux.org/ASA-202210-3
reference_id ASA-202210-3
reference_type
scores
url https://security.archlinux.org/ASA-202210-3
24
reference_url https://security.archlinux.org/ASA-202210-4
reference_id ASA-202210-4
reference_type
scores
url https://security.archlinux.org/ASA-202210-4
25
reference_url https://security.archlinux.org/AVG-2800
reference_id AVG-2800
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2800
26
reference_url https://security.archlinux.org/AVG-2801
reference_id AVG-2801
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2801
27
reference_url https://security.archlinux.org/AVG-2802
reference_id AVG-2802
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2802
28
reference_url https://security.archlinux.org/AVG-2803
reference_id AVG-2803
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2803
29
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
30
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
31
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
32
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
33
reference_url https://access.redhat.com/errata/RHSA-2024:1188
reference_id RHSA-2024:1188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1188
34
reference_url https://usn.ubuntu.com/5692-1/
reference_id USN-5692-1
reference_type
scores
url https://usn.ubuntu.com/5692-1/
35
reference_url https://usn.ubuntu.com/5693-1/
reference_id USN-5693-1
reference_type
scores
url https://usn.ubuntu.com/5693-1/
36
reference_url https://usn.ubuntu.com/5700-1/
reference_id USN-5700-1
reference_type
scores
url https://usn.ubuntu.com/5700-1/
37
reference_url https://usn.ubuntu.com/5708-1/
reference_id USN-5708-1
reference_type
scores
url https://usn.ubuntu.com/5708-1/
38
reference_url https://usn.ubuntu.com/5752-1/
reference_id USN-5752-1
reference_type
scores
url https://usn.ubuntu.com/5752-1/
fixed_packages
aliases CVE-2022-42722
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pf6k-jwex-8kay
36
url VCID-pq7v-b14b-tuhv
vulnerability_id VCID-pq7v-b14b-tuhv
summary Kernel: NULL pointer dereference problem in sctp_sched_dequeue_common
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2177.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2177.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2177
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01455
published_at 2026-04-26T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01443
published_at 2026-04-21T12:55:00Z
2
value 0.00011
scoring_system epss
scoring_elements 0.01451
published_at 2026-04-24T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01463
published_at 2026-04-02T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01466
published_at 2026-04-12T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01472
published_at 2026-04-11T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01477
published_at 2026-04-08T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.01479
published_at 2026-04-09T12:55:00Z
8
value 0.00012
scoring_system epss
scoring_elements 0.01468
published_at 2026-04-13T12:55:00Z
9
value 0.00012
scoring_system epss
scoring_elements 0.01456
published_at 2026-04-16T12:55:00Z
10
value 0.00012
scoring_system epss
scoring_elements 0.01471
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2177
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2177
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2187953
reference_id 2187953
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2187953
5
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=181d8d2066c0
reference_id ?id=181d8d2066c0
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:09Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=181d8d2066c0
6
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
7
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
8
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
9
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
10
reference_url https://access.redhat.com/errata/RHSA-2023:7398
reference_id RHSA-2023:7398
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7398
fixed_packages
aliases CVE-2023-2177
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pq7v-b14b-tuhv
37
url VCID-pyph-7y9k-gkfa
vulnerability_id VCID-pyph-7y9k-gkfa
summary kernel: Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3707.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3707.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3707
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02508
published_at 2026-04-02T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02587
published_at 2026-04-26T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02527
published_at 2026-04-08T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02548
published_at 2026-04-09T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02528
published_at 2026-04-11T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02518
published_at 2026-04-12T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02516
published_at 2026-04-13T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02502
published_at 2026-04-16T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02507
published_at 2026-04-18T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02614
published_at 2026-04-21T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02599
published_at 2026-04-24T12:55:00Z
11
value 0.00014
scoring_system epss
scoring_elements 0.02521
published_at 2026-04-04T12:55:00Z
12
value 0.00014
scoring_system epss
scoring_elements 0.02523
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3707
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3707
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/
reference_id 20221007013708.1946061-1-zyytlz.wz%40163.com
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-07T15:48:00Z/
url https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2137979
reference_id 2137979
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-07T15:48:00Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2137979
6
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-07T15:48:00Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
7
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-07T15:48:00Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
8
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
9
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
10
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
11
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
12
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
13
reference_url https://usn.ubuntu.com/5915-1/
reference_id USN-5915-1
reference_type
scores
url https://usn.ubuntu.com/5915-1/
14
reference_url https://usn.ubuntu.com/6079-1/
reference_id USN-6079-1
reference_type
scores
url https://usn.ubuntu.com/6079-1/
15
reference_url https://usn.ubuntu.com/6080-1/
reference_id USN-6080-1
reference_type
scores
url https://usn.ubuntu.com/6080-1/
16
reference_url https://usn.ubuntu.com/6085-1/
reference_id USN-6085-1
reference_type
scores
url https://usn.ubuntu.com/6085-1/
17
reference_url https://usn.ubuntu.com/6090-1/
reference_id USN-6090-1
reference_type
scores
url https://usn.ubuntu.com/6090-1/
18
reference_url https://usn.ubuntu.com/6091-1/
reference_id USN-6091-1
reference_type
scores
url https://usn.ubuntu.com/6091-1/
19
reference_url https://usn.ubuntu.com/6094-1/
reference_id USN-6094-1
reference_type
scores
url https://usn.ubuntu.com/6094-1/
20
reference_url https://usn.ubuntu.com/6096-1/
reference_id USN-6096-1
reference_type
scores
url https://usn.ubuntu.com/6096-1/
21
reference_url https://usn.ubuntu.com/6109-1/
reference_id USN-6109-1
reference_type
scores
url https://usn.ubuntu.com/6109-1/
22
reference_url https://usn.ubuntu.com/6118-1/
reference_id USN-6118-1
reference_type
scores
url https://usn.ubuntu.com/6118-1/
23
reference_url https://usn.ubuntu.com/6132-1/
reference_id USN-6132-1
reference_type
scores
url https://usn.ubuntu.com/6132-1/
24
reference_url https://usn.ubuntu.com/6133-1/
reference_id USN-6133-1
reference_type
scores
url https://usn.ubuntu.com/6133-1/
25
reference_url https://usn.ubuntu.com/6134-1/
reference_id USN-6134-1
reference_type
scores
url https://usn.ubuntu.com/6134-1/
26
reference_url https://usn.ubuntu.com/6222-1/
reference_id USN-6222-1
reference_type
scores
url https://usn.ubuntu.com/6222-1/
27
reference_url https://usn.ubuntu.com/6256-1/
reference_id USN-6256-1
reference_type
scores
url https://usn.ubuntu.com/6256-1/
fixed_packages
aliases CVE-2022-3707
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pyph-7y9k-gkfa
38
url VCID-qbd9-czms-8qdn
vulnerability_id VCID-qbd9-czms-8qdn
summary kernel: vmwgfx: out-of-bounds write in vmw_kms_cursor_snoop
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36280.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36280.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-36280
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.15294
published_at 2026-04-26T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.15281
published_at 2026-04-13T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.15195
published_at 2026-04-16T12:55:00Z
3
value 0.00049
scoring_system epss
scoring_elements 0.15201
published_at 2026-04-18T12:55:00Z
4
value 0.00049
scoring_system epss
scoring_elements 0.15255
published_at 2026-04-21T12:55:00Z
5
value 0.00049
scoring_system epss
scoring_elements 0.15295
published_at 2026-04-24T12:55:00Z
6
value 0.00049
scoring_system epss
scoring_elements 0.15413
published_at 2026-04-02T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.15482
published_at 2026-04-04T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.15285
published_at 2026-04-07T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.15373
published_at 2026-04-08T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.15423
published_at 2026-04-09T12:55:00Z
11
value 0.00049
scoring_system epss
scoring_elements 0.15384
published_at 2026-04-11T12:55:00Z
12
value 0.00049
scoring_system epss
scoring_elements 0.15345
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-36280
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2133450
reference_id 2133450
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2133450
17
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
18
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
19
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
20
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
21
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
22
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
23
reference_url https://usn.ubuntu.com/5915-1/
reference_id USN-5915-1
reference_type
scores
url https://usn.ubuntu.com/5915-1/
24
reference_url https://usn.ubuntu.com/5917-1/
reference_id USN-5917-1
reference_type
scores
url https://usn.ubuntu.com/5917-1/
25
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
26
reference_url https://usn.ubuntu.com/5927-1/
reference_id USN-5927-1
reference_type
scores
url https://usn.ubuntu.com/5927-1/
27
reference_url https://usn.ubuntu.com/5934-1/
reference_id USN-5934-1
reference_type
scores
url https://usn.ubuntu.com/5934-1/
28
reference_url https://usn.ubuntu.com/5939-1/
reference_id USN-5939-1
reference_type
scores
url https://usn.ubuntu.com/5939-1/
29
reference_url https://usn.ubuntu.com/5940-1/
reference_id USN-5940-1
reference_type
scores
url https://usn.ubuntu.com/5940-1/
30
reference_url https://usn.ubuntu.com/5951-1/
reference_id USN-5951-1
reference_type
scores
url https://usn.ubuntu.com/5951-1/
31
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
32
reference_url https://usn.ubuntu.com/5976-1/
reference_id USN-5976-1
reference_type
scores
url https://usn.ubuntu.com/5976-1/
33
reference_url https://usn.ubuntu.com/5981-1/
reference_id USN-5981-1
reference_type
scores
url https://usn.ubuntu.com/5981-1/
34
reference_url https://usn.ubuntu.com/5982-1/
reference_id USN-5982-1
reference_type
scores
url https://usn.ubuntu.com/5982-1/
35
reference_url https://usn.ubuntu.com/5984-1/
reference_id USN-5984-1
reference_type
scores
url https://usn.ubuntu.com/5984-1/
36
reference_url https://usn.ubuntu.com/5987-1/
reference_id USN-5987-1
reference_type
scores
url https://usn.ubuntu.com/5987-1/
37
reference_url https://usn.ubuntu.com/5991-1/
reference_id USN-5991-1
reference_type
scores
url https://usn.ubuntu.com/5991-1/
38
reference_url https://usn.ubuntu.com/6000-1/
reference_id USN-6000-1
reference_type
scores
url https://usn.ubuntu.com/6000-1/
39
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
40
reference_url https://usn.ubuntu.com/6004-1/
reference_id USN-6004-1
reference_type
scores
url https://usn.ubuntu.com/6004-1/
41
reference_url https://usn.ubuntu.com/6009-1/
reference_id USN-6009-1
reference_type
scores
url https://usn.ubuntu.com/6009-1/
42
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
43
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
44
reference_url https://usn.ubuntu.com/6030-1/
reference_id USN-6030-1
reference_type
scores
url https://usn.ubuntu.com/6030-1/
45
reference_url https://usn.ubuntu.com/6032-1/
reference_id USN-6032-1
reference_type
scores
url https://usn.ubuntu.com/6032-1/
46
reference_url https://usn.ubuntu.com/6079-1/
reference_id USN-6079-1
reference_type
scores
url https://usn.ubuntu.com/6079-1/
47
reference_url https://usn.ubuntu.com/6091-1/
reference_id USN-6091-1
reference_type
scores
url https://usn.ubuntu.com/6091-1/
48
reference_url https://usn.ubuntu.com/6096-1/
reference_id USN-6096-1
reference_type
scores
url https://usn.ubuntu.com/6096-1/
fixed_packages
aliases CVE-2022-36280
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qbd9-czms-8qdn
39
url VCID-qkam-j6uv-n7fj
vulnerability_id VCID-qkam-j6uv-n7fj
summary kernel: NULL pointer dereference in rawv6_push_pending_frames
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0394.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0394.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0394
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06362
published_at 2026-04-26T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06318
published_at 2026-04-21T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06335
published_at 2026-04-24T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.06934
published_at 2026-04-12T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.06869
published_at 2026-04-16T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.0687
published_at 2026-04-04T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.06857
published_at 2026-04-07T12:55:00Z
7
value 0.00025
scoring_system epss
scoring_elements 0.06912
published_at 2026-04-08T12:55:00Z
8
value 0.00025
scoring_system epss
scoring_elements 0.06942
published_at 2026-04-09T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.06941
published_at 2026-04-11T12:55:00Z
10
value 0.00025
scoring_system epss
scoring_elements 0.0693
published_at 2026-04-13T12:55:00Z
11
value 0.00025
scoring_system epss
scoring_elements 0.06827
published_at 2026-04-02T12:55:00Z
12
value 0.00025
scoring_system epss
scoring_elements 0.06852
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0394
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162120
reference_id 2162120
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162120
17
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
18
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
19
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
20
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
21
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb3e9864cdbe35ff6378966660edbcbac955fe17
reference_id ?id=cb3e9864cdbe35ff6378966660edbcbac955fe17
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:47:25Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb3e9864cdbe35ff6378966660edbcbac955fe17
22
reference_url https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
reference_id msg00000.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:47:25Z/
url https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
23
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:47:25Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
24
reference_url https://security.netapp.com/advisory/ntap-20230302-0005/
reference_id ntap-20230302-0005
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:47:25Z/
url https://security.netapp.com/advisory/ntap-20230302-0005/
25
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
26
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
27
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
28
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
29
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
30
reference_url https://usn.ubuntu.com/5917-1/
reference_id USN-5917-1
reference_type
scores
url https://usn.ubuntu.com/5917-1/
31
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
32
reference_url https://usn.ubuntu.com/5927-1/
reference_id USN-5927-1
reference_type
scores
url https://usn.ubuntu.com/5927-1/
33
reference_url https://usn.ubuntu.com/5934-1/
reference_id USN-5934-1
reference_type
scores
url https://usn.ubuntu.com/5934-1/
34
reference_url https://usn.ubuntu.com/5939-1/
reference_id USN-5939-1
reference_type
scores
url https://usn.ubuntu.com/5939-1/
35
reference_url https://usn.ubuntu.com/5940-1/
reference_id USN-5940-1
reference_type
scores
url https://usn.ubuntu.com/5940-1/
36
reference_url https://usn.ubuntu.com/5951-1/
reference_id USN-5951-1
reference_type
scores
url https://usn.ubuntu.com/5951-1/
37
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
38
reference_url https://usn.ubuntu.com/5976-1/
reference_id USN-5976-1
reference_type
scores
url https://usn.ubuntu.com/5976-1/
39
reference_url https://usn.ubuntu.com/5978-1/
reference_id USN-5978-1
reference_type
scores
url https://usn.ubuntu.com/5978-1/
40
reference_url https://usn.ubuntu.com/5981-1/
reference_id USN-5981-1
reference_type
scores
url https://usn.ubuntu.com/5981-1/
41
reference_url https://usn.ubuntu.com/5984-1/
reference_id USN-5984-1
reference_type
scores
url https://usn.ubuntu.com/5984-1/
42
reference_url https://usn.ubuntu.com/5991-1/
reference_id USN-5991-1
reference_type
scores
url https://usn.ubuntu.com/5991-1/
43
reference_url https://usn.ubuntu.com/6000-1/
reference_id USN-6000-1
reference_type
scores
url https://usn.ubuntu.com/6000-1/
44
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
45
reference_url https://usn.ubuntu.com/6009-1/
reference_id USN-6009-1
reference_type
scores
url https://usn.ubuntu.com/6009-1/
46
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
47
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
48
reference_url https://usn.ubuntu.com/6025-1/
reference_id USN-6025-1
reference_type
scores
url https://usn.ubuntu.com/6025-1/
49
reference_url https://usn.ubuntu.com/6030-1/
reference_id USN-6030-1
reference_type
scores
url https://usn.ubuntu.com/6030-1/
50
reference_url https://usn.ubuntu.com/6040-1/
reference_id USN-6040-1
reference_type
scores
url https://usn.ubuntu.com/6040-1/
51
reference_url https://usn.ubuntu.com/6057-1/
reference_id USN-6057-1
reference_type
scores
url https://usn.ubuntu.com/6057-1/
52
reference_url https://usn.ubuntu.com/6079-1/
reference_id USN-6079-1
reference_type
scores
url https://usn.ubuntu.com/6079-1/
53
reference_url https://usn.ubuntu.com/6091-1/
reference_id USN-6091-1
reference_type
scores
url https://usn.ubuntu.com/6091-1/
54
reference_url https://usn.ubuntu.com/6096-1/
reference_id USN-6096-1
reference_type
scores
url https://usn.ubuntu.com/6096-1/
55
reference_url https://usn.ubuntu.com/6134-1/
reference_id USN-6134-1
reference_type
scores
url https://usn.ubuntu.com/6134-1/
fixed_packages
aliases CVE-2023-0394
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qkam-j6uv-n7fj
40
url VCID-qrf7-hb33-tqe4
vulnerability_id VCID-qrf7-hb33-tqe4
summary kernel: Recursive locking violation in usb-storage that can cause the kernel to deadlock
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4662.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4662.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-4662
reference_id
reference_type
scores
0
value 6e-05
scoring_system epss
scoring_elements 0.00314
published_at 2026-04-02T12:55:00Z
1
value 6e-05
scoring_system epss
scoring_elements 0.0037
published_at 2026-04-26T12:55:00Z
2
value 6e-05
scoring_system epss
scoring_elements 0.00299
published_at 2026-04-13T12:55:00Z
3
value 6e-05
scoring_system epss
scoring_elements 0.00295
published_at 2026-04-16T12:55:00Z
4
value 6e-05
scoring_system epss
scoring_elements 0.00298
published_at 2026-04-18T12:55:00Z
5
value 6e-05
scoring_system epss
scoring_elements 0.00318
published_at 2026-04-21T12:55:00Z
6
value 6e-05
scoring_system epss
scoring_elements 0.00369
published_at 2026-04-24T12:55:00Z
7
value 6e-05
scoring_system epss
scoring_elements 0.00313
published_at 2026-04-04T12:55:00Z
8
value 6e-05
scoring_system epss
scoring_elements 0.00304
published_at 2026-04-07T12:55:00Z
9
value 6e-05
scoring_system epss
scoring_elements 0.00302
published_at 2026-04-08T12:55:00Z
10
value 6e-05
scoring_system epss
scoring_elements 0.00301
published_at 2026-04-11T12:55:00Z
11
value 6e-05
scoring_system epss
scoring_elements 0.003
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-4662
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4662
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lore.kernel.org/all/20220913140355.910732567%40linuxfoundation.org/
reference_id 20220913140355.910732567%40linuxfoundation.org
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-09T18:03:46Z/
url https://lore.kernel.org/all/20220913140355.910732567%40linuxfoundation.org/
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2155788
reference_id 2155788
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2155788
6
reference_url https://lore.kernel.org/all/CAB7eexLLApHJwZfMQ=X-PtRhw0BgO+5KcSMS05FNUYejJXqtSA%40mail.gmail.com/
reference_id CAB7eexLLApHJwZfMQ=X-PtRhw0BgO+5KcSMS05FNUYejJXqtSA%40mail.gmail.com
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-09T18:03:46Z/
url https://lore.kernel.org/all/CAB7eexLLApHJwZfMQ=X-PtRhw0BgO+5KcSMS05FNUYejJXqtSA%40mail.gmail.com/
7
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
8
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
9
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
10
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
11
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
12
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
13
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
14
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
15
reference_url https://usn.ubuntu.com/6071-1/
reference_id USN-6071-1
reference_type
scores
url https://usn.ubuntu.com/6071-1/
fixed_packages
aliases CVE-2022-4662
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qrf7-hb33-tqe4
41
url VCID-svpc-cq3p-y3gw
vulnerability_id VCID-svpc-cq3p-y3gw
summary kernel: mlxsw: spectrum: Protect driver from buggy firmware
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47560.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47560.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-47560
reference_id
reference_type
scores
0
value 0.00028
scoring_system epss
scoring_elements 0.07751
published_at 2026-04-01T12:55:00Z
1
value 0.00028
scoring_system epss
scoring_elements 0.07861
published_at 2026-04-02T12:55:00Z
2
value 0.00028
scoring_system epss
scoring_elements 0.07878
published_at 2026-04-26T12:55:00Z
3
value 0.00028
scoring_system epss
scoring_elements 0.07814
published_at 2026-04-16T12:55:00Z
4
value 0.00028
scoring_system epss
scoring_elements 0.07797
published_at 2026-04-18T12:55:00Z
5
value 0.00028
scoring_system epss
scoring_elements 0.07952
published_at 2026-04-21T12:55:00Z
6
value 0.00028
scoring_system epss
scoring_elements 0.0791
published_at 2026-04-24T12:55:00Z
7
value 0.00028
scoring_system epss
scoring_elements 0.07909
published_at 2026-04-04T12:55:00Z
8
value 0.00028
scoring_system epss
scoring_elements 0.07862
published_at 2026-04-07T12:55:00Z
9
value 0.00028
scoring_system epss
scoring_elements 0.07921
published_at 2026-04-08T12:55:00Z
10
value 0.00028
scoring_system epss
scoring_elements 0.07941
published_at 2026-04-09T12:55:00Z
11
value 0.00028
scoring_system epss
scoring_elements 0.07929
published_at 2026-04-11T12:55:00Z
12
value 0.00028
scoring_system epss
scoring_elements 0.07913
published_at 2026-04-12T12:55:00Z
13
value 0.00028
scoring_system epss
scoring_elements 0.07899
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-47560
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47560
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47560
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2283389
reference_id 2283389
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2283389
5
reference_url https://git.kernel.org/stable/c/63b08b1f6834bbb0b4f7783bf63b80c8c8e9a047
reference_id 63b08b1f6834bbb0b4f7783bf63b80c8c8e9a047
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-24T19:11:25Z/
url https://git.kernel.org/stable/c/63b08b1f6834bbb0b4f7783bf63b80c8c8e9a047
6
reference_url https://git.kernel.org/stable/c/90d0736876c50ecde1a3275636a06b9ddb1cace9
reference_id 90d0736876c50ecde1a3275636a06b9ddb1cace9
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-24T19:11:25Z/
url https://git.kernel.org/stable/c/90d0736876c50ecde1a3275636a06b9ddb1cace9
7
reference_url https://git.kernel.org/stable/c/da4d70199e5d82da664a80077508d6c18f5e76df
reference_id da4d70199e5d82da664a80077508d6c18f5e76df
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-24T19:11:25Z/
url https://git.kernel.org/stable/c/da4d70199e5d82da664a80077508d6c18f5e76df
8
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
9
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
10
reference_url https://access.redhat.com/errata/RHSA-2024:7000
reference_id RHSA-2024:7000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7000
11
reference_url https://access.redhat.com/errata/RHSA-2024:7001
reference_id RHSA-2024:7001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7001
12
reference_url https://access.redhat.com/errata/RHSA-2024:8107
reference_id RHSA-2024:8107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8107
13
reference_url https://access.redhat.com/errata/RHSA-2024:8161
reference_id RHSA-2024:8161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8161
fixed_packages
aliases CVE-2021-47560
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-svpc-cq3p-y3gw
42
url VCID-t2jg-dbdj-r3av
vulnerability_id VCID-t2jg-dbdj-r3av
summary kernel: ICMPv6 “Packet Too Big” packets force a DoS of the Linux kernel by forcing 100% CPU
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52340.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52340.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-52340
reference_id
reference_type
scores
0
value 0.00084
scoring_system epss
scoring_elements 0.24572
published_at 2026-04-02T12:55:00Z
1
value 0.00084
scoring_system epss
scoring_elements 0.24253
published_at 2026-04-26T12:55:00Z
2
value 0.00084
scoring_system epss
scoring_elements 0.24412
published_at 2026-04-13T12:55:00Z
3
value 0.00084
scoring_system epss
scoring_elements 0.24428
published_at 2026-04-16T12:55:00Z
4
value 0.00084
scoring_system epss
scoring_elements 0.24419
published_at 2026-04-18T12:55:00Z
5
value 0.00084
scoring_system epss
scoring_elements 0.24393
published_at 2026-04-21T12:55:00Z
6
value 0.00084
scoring_system epss
scoring_elements 0.24267
published_at 2026-04-24T12:55:00Z
7
value 0.00084
scoring_system epss
scoring_elements 0.24608
published_at 2026-04-04T12:55:00Z
8
value 0.00084
scoring_system epss
scoring_elements 0.24385
published_at 2026-04-07T12:55:00Z
9
value 0.00084
scoring_system epss
scoring_elements 0.24454
published_at 2026-04-08T12:55:00Z
10
value 0.00084
scoring_system epss
scoring_elements 0.24498
published_at 2026-04-09T12:55:00Z
11
value 0.00084
scoring_system epss
scoring_elements 0.24514
published_at 2026-04-11T12:55:00Z
12
value 0.00084
scoring_system epss
scoring_elements 0.2447
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-52340
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52340
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257979
reference_id 2257979
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2257979
5
reference_url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3
reference_id ChangeLog-6.3
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-05T13:36:20Z/
url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3
6
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=af6d10345ca76670c1b7c37799f0d5576ccef277
reference_id commit?id=af6d10345ca76670c1b7c37799f0d5576ccef277
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-05T13:36:20Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=af6d10345ca76670c1b7c37799f0d5576ccef277
7
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
8
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
9
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
10
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
11
reference_url https://usn.ubuntu.com/6725-1/
reference_id USN-6725-1
reference_type
scores
url https://usn.ubuntu.com/6725-1/
12
reference_url https://usn.ubuntu.com/6725-2/
reference_id USN-6725-2
reference_type
scores
url https://usn.ubuntu.com/6725-2/
13
reference_url https://usn.ubuntu.com/6726-1/
reference_id USN-6726-1
reference_type
scores
url https://usn.ubuntu.com/6726-1/
14
reference_url https://usn.ubuntu.com/6726-2/
reference_id USN-6726-2
reference_type
scores
url https://usn.ubuntu.com/6726-2/
15
reference_url https://usn.ubuntu.com/6726-3/
reference_id USN-6726-3
reference_type
scores
url https://usn.ubuntu.com/6726-3/
fixed_packages
aliases CVE-2023-52340
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t2jg-dbdj-r3av
43
url VCID-vqy7-37ym-eufr
vulnerability_id VCID-vqy7-37ym-eufr
summary kernel: xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36879.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36879.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-36879
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.06975
published_at 2026-04-26T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.0682
published_at 2026-04-02T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06863
published_at 2026-04-04T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.06849
published_at 2026-04-07T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.06904
published_at 2026-04-08T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.06935
published_at 2026-04-09T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.06932
published_at 2026-04-11T12:55:00Z
7
value 0.00025
scoring_system epss
scoring_elements 0.06925
published_at 2026-04-12T12:55:00Z
8
value 0.00025
scoring_system epss
scoring_elements 0.06921
published_at 2026-04-13T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.0686
published_at 2026-04-16T12:55:00Z
10
value 0.00025
scoring_system epss
scoring_elements 0.06842
published_at 2026-04-18T12:55:00Z
11
value 0.00025
scoring_system epss
scoring_elements 0.06984
published_at 2026-04-21T12:55:00Z
12
value 0.00025
scoring_system epss
scoring_elements 0.06971
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-36879
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2119855
reference_id 2119855
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2119855
12
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
13
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
14
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
15
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=f85daf0e725358be78dfd208dea5fd665d8cb901
reference_id commit?id=f85daf0e725358be78dfd208dea5fd665d8cb901
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=f85daf0e725358be78dfd208dea5fd665d8cb901
16
reference_url https://www.debian.org/security/2022/dsa-5207
reference_id dsa-5207
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/
url https://www.debian.org/security/2022/dsa-5207
17
reference_url https://github.com/torvalds/linux/commit/f85daf0e725358be78dfd208dea5fd665d8cb901
reference_id f85daf0e725358be78dfd208dea5fd665d8cb901
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/
url https://github.com/torvalds/linux/commit/f85daf0e725358be78dfd208dea5fd665d8cb901
18
reference_url https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html
reference_id msg00000.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/
url https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html
19
reference_url https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html
reference_id msg00011.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/
url https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html
20
reference_url https://security.netapp.com/advisory/ntap-20220901-0007/
reference_id ntap-20220901-0007
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/
url https://security.netapp.com/advisory/ntap-20220901-0007/
21
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
22
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
23
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
24
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
25
reference_url https://access.redhat.com/errata/RHSA-2023:5627
reference_id RHSA-2023:5627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5627
26
reference_url https://access.redhat.com/errata/RHSA-2024:0431
reference_id RHSA-2024:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0431
27
reference_url https://access.redhat.com/errata/RHSA-2024:0432
reference_id RHSA-2024:0432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0432
28
reference_url https://usn.ubuntu.com/5667-1/
reference_id USN-5667-1
reference_type
scores
url https://usn.ubuntu.com/5667-1/
29
reference_url https://usn.ubuntu.com/5668-1/
reference_id USN-5668-1
reference_type
scores
url https://usn.ubuntu.com/5668-1/
30
reference_url https://usn.ubuntu.com/5677-1/
reference_id USN-5677-1
reference_type
scores
url https://usn.ubuntu.com/5677-1/
31
reference_url https://usn.ubuntu.com/5682-1/
reference_id USN-5682-1
reference_type
scores
url https://usn.ubuntu.com/5682-1/
32
reference_url https://usn.ubuntu.com/5683-1/
reference_id USN-5683-1
reference_type
scores
url https://usn.ubuntu.com/5683-1/
33
reference_url https://usn.ubuntu.com/5703-1/
reference_id USN-5703-1
reference_type
scores
url https://usn.ubuntu.com/5703-1/
34
reference_url https://usn.ubuntu.com/5706-1/
reference_id USN-5706-1
reference_type
scores
url https://usn.ubuntu.com/5706-1/
35
reference_url https://usn.ubuntu.com/5727-1/
reference_id USN-5727-1
reference_type
scores
url https://usn.ubuntu.com/5727-1/
36
reference_url https://usn.ubuntu.com/5727-2/
reference_id USN-5727-2
reference_type
scores
url https://usn.ubuntu.com/5727-2/
37
reference_url https://usn.ubuntu.com/5774-1/
reference_id USN-5774-1
reference_type
scores
url https://usn.ubuntu.com/5774-1/
38
reference_url https://usn.ubuntu.com/5913-1/
reference_id USN-5913-1
reference_type
scores
url https://usn.ubuntu.com/5913-1/
39
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
40
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
41
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
fixed_packages
aliases CVE-2022-36879
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vqy7-37ym-eufr
44
url VCID-vzpr-mm8p-yygx
vulnerability_id VCID-vzpr-mm8p-yygx
summary kernel: netfilter: nf_conntrack_irc message handling issue
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2663.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2663.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2663
reference_id
reference_type
scores
0
value 0.00178
scoring_system epss
scoring_elements 0.3903
published_at 2026-04-26T12:55:00Z
1
value 0.00178
scoring_system epss
scoring_elements 0.39327
published_at 2026-04-13T12:55:00Z
2
value 0.00178
scoring_system epss
scoring_elements 0.39379
published_at 2026-04-16T12:55:00Z
3
value 0.00178
scoring_system epss
scoring_elements 0.39351
published_at 2026-04-18T12:55:00Z
4
value 0.00178
scoring_system epss
scoring_elements 0.39264
published_at 2026-04-21T12:55:00Z
5
value 0.00178
scoring_system epss
scoring_elements 0.39049
published_at 2026-04-24T12:55:00Z
6
value 0.00178
scoring_system epss
scoring_elements 0.39363
published_at 2026-04-02T12:55:00Z
7
value 0.00178
scoring_system epss
scoring_elements 0.39387
published_at 2026-04-04T12:55:00Z
8
value 0.00178
scoring_system epss
scoring_elements 0.393
published_at 2026-04-07T12:55:00Z
9
value 0.00178
scoring_system epss
scoring_elements 0.39356
published_at 2026-04-08T12:55:00Z
10
value 0.00178
scoring_system epss
scoring_elements 0.39373
published_at 2026-04-09T12:55:00Z
11
value 0.00178
scoring_system epss
scoring_elements 0.39385
published_at 2026-04-11T12:55:00Z
12
value 0.00178
scoring_system epss
scoring_elements 0.39345
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2663
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
19
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2123056
reference_id 2123056
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2123056
21
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
22
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
23
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
24
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
25
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
26
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
27
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
28
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
29
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
30
reference_url https://usn.ubuntu.com/5791-1/
reference_id USN-5791-1
reference_type
scores
url https://usn.ubuntu.com/5791-1/
31
reference_url https://usn.ubuntu.com/5791-2/
reference_id USN-5791-2
reference_type
scores
url https://usn.ubuntu.com/5791-2/
32
reference_url https://usn.ubuntu.com/5791-3/
reference_id USN-5791-3
reference_type
scores
url https://usn.ubuntu.com/5791-3/
33
reference_url https://usn.ubuntu.com/5792-1/
reference_id USN-5792-1
reference_type
scores
url https://usn.ubuntu.com/5792-1/
34
reference_url https://usn.ubuntu.com/5792-2/
reference_id USN-5792-2
reference_type
scores
url https://usn.ubuntu.com/5792-2/
35
reference_url https://usn.ubuntu.com/5793-1/
reference_id USN-5793-1
reference_type
scores
url https://usn.ubuntu.com/5793-1/
36
reference_url https://usn.ubuntu.com/5793-2/
reference_id USN-5793-2
reference_type
scores
url https://usn.ubuntu.com/5793-2/
37
reference_url https://usn.ubuntu.com/5793-3/
reference_id USN-5793-3
reference_type
scores
url https://usn.ubuntu.com/5793-3/
38
reference_url https://usn.ubuntu.com/5793-4/
reference_id USN-5793-4
reference_type
scores
url https://usn.ubuntu.com/5793-4/
39
reference_url https://usn.ubuntu.com/5815-1/
reference_id USN-5815-1
reference_type
scores
url https://usn.ubuntu.com/5815-1/
40
reference_url https://usn.ubuntu.com/5854-1/
reference_id USN-5854-1
reference_type
scores
url https://usn.ubuntu.com/5854-1/
41
reference_url https://usn.ubuntu.com/5861-1/
reference_id USN-5861-1
reference_type
scores
url https://usn.ubuntu.com/5861-1/
42
reference_url https://usn.ubuntu.com/5862-1/
reference_id USN-5862-1
reference_type
scores
url https://usn.ubuntu.com/5862-1/
43
reference_url https://usn.ubuntu.com/5865-1/
reference_id USN-5865-1
reference_type
scores
url https://usn.ubuntu.com/5865-1/
44
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
45
reference_url https://usn.ubuntu.com/5883-1/
reference_id USN-5883-1
reference_type
scores
url https://usn.ubuntu.com/5883-1/
46
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
47
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
48
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
49
reference_url https://usn.ubuntu.com/6007-1/
reference_id USN-6007-1
reference_type
scores
url https://usn.ubuntu.com/6007-1/
50
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
51
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
52
reference_url https://usn.ubuntu.com/6247-1/
reference_id USN-6247-1
reference_type
scores
url https://usn.ubuntu.com/6247-1/
fixed_packages
aliases CVE-2022-2663
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vzpr-mm8p-yygx
45
url VCID-wm98-kp5f-mudg
vulnerability_id VCID-wm98-kp5f-mudg
summary kernel: use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3640.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3640.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3640
reference_id
reference_type
scores
0
value 0.00028
scoring_system epss
scoring_elements 0.08007
published_at 2026-04-26T12:55:00Z
1
value 0.00028
scoring_system epss
scoring_elements 0.07946
published_at 2026-04-16T12:55:00Z
2
value 0.00028
scoring_system epss
scoring_elements 0.07932
published_at 2026-04-18T12:55:00Z
3
value 0.00028
scoring_system epss
scoring_elements 0.0809
published_at 2026-04-21T12:55:00Z
4
value 0.00028
scoring_system epss
scoring_elements 0.08042
published_at 2026-04-24T12:55:00Z
5
value 0.00029
scoring_system epss
scoring_elements 0.083
published_at 2026-04-09T12:55:00Z
6
value 0.00029
scoring_system epss
scoring_elements 0.08291
published_at 2026-04-11T12:55:00Z
7
value 0.00029
scoring_system epss
scoring_elements 0.08271
published_at 2026-04-12T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08252
published_at 2026-04-13T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.08281
published_at 2026-04-08T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08214
published_at 2026-04-02T12:55:00Z
11
value 0.00029
scoring_system epss
scoring_elements 0.08267
published_at 2026-04-04T12:55:00Z
12
value 0.00029
scoring_system epss
scoring_elements 0.08217
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3640
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3640
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2139610
reference_id 2139610
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2139610
5
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
6
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
7
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
8
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
9
reference_url https://access.redhat.com/errata/RHSA-2024:1877
reference_id RHSA-2024:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1877
10
reference_url https://access.redhat.com/errata/RHSA-2024:2621
reference_id RHSA-2024:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2621
11
reference_url https://access.redhat.com/errata/RHSA-2025:22910
reference_id RHSA-2025:22910
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22910
12
reference_url https://access.redhat.com/errata/RHSA-2025:22914
reference_id RHSA-2025:22914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22914
13
reference_url https://usn.ubuntu.com/5850-1/
reference_id USN-5850-1
reference_type
scores
url https://usn.ubuntu.com/5850-1/
14
reference_url https://usn.ubuntu.com/5851-1/
reference_id USN-5851-1
reference_type
scores
url https://usn.ubuntu.com/5851-1/
15
reference_url https://usn.ubuntu.com/5853-1/
reference_id USN-5853-1
reference_type
scores
url https://usn.ubuntu.com/5853-1/
16
reference_url https://usn.ubuntu.com/5860-1/
reference_id USN-5860-1
reference_type
scores
url https://usn.ubuntu.com/5860-1/
17
reference_url https://usn.ubuntu.com/5874-1/
reference_id USN-5874-1
reference_type
scores
url https://usn.ubuntu.com/5874-1/
18
reference_url https://usn.ubuntu.com/5875-1/
reference_id USN-5875-1
reference_type
scores
url https://usn.ubuntu.com/5875-1/
19
reference_url https://usn.ubuntu.com/5876-1/
reference_id USN-5876-1
reference_type
scores
url https://usn.ubuntu.com/5876-1/
20
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
21
reference_url https://usn.ubuntu.com/5878-1/
reference_id USN-5878-1
reference_type
scores
url https://usn.ubuntu.com/5878-1/
22
reference_url https://usn.ubuntu.com/5879-1/
reference_id USN-5879-1
reference_type
scores
url https://usn.ubuntu.com/5879-1/
23
reference_url https://usn.ubuntu.com/5883-1/
reference_id USN-5883-1
reference_type
scores
url https://usn.ubuntu.com/5883-1/
24
reference_url https://usn.ubuntu.com/5909-1/
reference_id USN-5909-1
reference_type
scores
url https://usn.ubuntu.com/5909-1/
25
reference_url https://usn.ubuntu.com/5918-1/
reference_id USN-5918-1
reference_type
scores
url https://usn.ubuntu.com/5918-1/
26
reference_url https://usn.ubuntu.com/5919-1/
reference_id USN-5919-1
reference_type
scores
url https://usn.ubuntu.com/5919-1/
27
reference_url https://usn.ubuntu.com/5920-1/
reference_id USN-5920-1
reference_type
scores
url https://usn.ubuntu.com/5920-1/
28
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
29
reference_url https://usn.ubuntu.com/5925-1/
reference_id USN-5925-1
reference_type
scores
url https://usn.ubuntu.com/5925-1/
30
reference_url https://usn.ubuntu.com/5927-1/
reference_id USN-5927-1
reference_type
scores
url https://usn.ubuntu.com/5927-1/
31
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
32
reference_url https://usn.ubuntu.com/6007-1/
reference_id USN-6007-1
reference_type
scores
url https://usn.ubuntu.com/6007-1/
33
reference_url https://usn.ubuntu.com/7607-1/
reference_id USN-7607-1
reference_type
scores
url https://usn.ubuntu.com/7607-1/
34
reference_url https://usn.ubuntu.com/7607-2/
reference_id USN-7607-2
reference_type
scores
url https://usn.ubuntu.com/7607-2/
35
reference_url https://usn.ubuntu.com/7607-3/
reference_id USN-7607-3
reference_type
scores
url https://usn.ubuntu.com/7607-3/
fixed_packages
aliases CVE-2022-3640
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wm98-kp5f-mudg
46
url VCID-wudq-7hws-aqft
vulnerability_id VCID-wudq-7hws-aqft
summary kernel: unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39188.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39188.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-39188
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04387
published_at 2026-04-02T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04411
published_at 2026-04-18T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04422
published_at 2026-04-07T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04457
published_at 2026-04-08T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04475
published_at 2026-04-09T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04467
published_at 2026-04-11T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04452
published_at 2026-04-12T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04435
published_at 2026-04-13T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04403
published_at 2026-04-16T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.04546
published_at 2026-04-21T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04578
published_at 2026-04-24T12:55:00Z
11
value 0.00018
scoring_system epss
scoring_elements 0.04597
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-39188
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
19
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2130141
reference_id 2130141
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2130141
21
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
22
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
23
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
24
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
25
reference_url https://access.redhat.com/errata/RHSA-2023:3388
reference_id RHSA-2023:3388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3388
26
reference_url https://access.redhat.com/errata/RHSA-2023:4801
reference_id RHSA-2023:4801
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4801
27
reference_url https://access.redhat.com/errata/RHSA-2023:4814
reference_id RHSA-2023:4814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4814
28
reference_url https://usn.ubuntu.com/5790-1/
reference_id USN-5790-1
reference_type
scores
url https://usn.ubuntu.com/5790-1/
29
reference_url https://usn.ubuntu.com/5791-1/
reference_id USN-5791-1
reference_type
scores
url https://usn.ubuntu.com/5791-1/
30
reference_url https://usn.ubuntu.com/5791-2/
reference_id USN-5791-2
reference_type
scores
url https://usn.ubuntu.com/5791-2/
31
reference_url https://usn.ubuntu.com/5791-3/
reference_id USN-5791-3
reference_type
scores
url https://usn.ubuntu.com/5791-3/
32
reference_url https://usn.ubuntu.com/5792-1/
reference_id USN-5792-1
reference_type
scores
url https://usn.ubuntu.com/5792-1/
33
reference_url https://usn.ubuntu.com/5792-2/
reference_id USN-5792-2
reference_type
scores
url https://usn.ubuntu.com/5792-2/
34
reference_url https://usn.ubuntu.com/5815-1/
reference_id USN-5815-1
reference_type
scores
url https://usn.ubuntu.com/5815-1/
35
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
36
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
37
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
38
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
fixed_packages
aliases CVE-2022-39188
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wudq-7hws-aqft
47
url VCID-wxfm-2u2z-euad
vulnerability_id VCID-wxfm-2u2z-euad
summary kernel: double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28388.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28388.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-28388
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01846
published_at 2026-04-26T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01781
published_at 2026-04-02T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01794
published_at 2026-04-07T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01797
published_at 2026-04-08T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.0181
published_at 2026-04-09T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01803
published_at 2026-04-11T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01793
published_at 2026-04-12T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.0179
published_at 2026-04-13T12:55:00Z
8
value 0.00012
scoring_system epss
scoring_elements 0.01779
published_at 2026-04-16T12:55:00Z
9
value 0.00012
scoring_system epss
scoring_elements 0.01777
published_at 2026-04-18T12:55:00Z
10
value 0.00012
scoring_system epss
scoring_elements 0.0186
published_at 2026-04-21T12:55:00Z
11
value 0.00012
scoring_system epss
scoring_elements 0.0185
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-28388
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
42
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
43
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2073091
reference_id 2073091
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2073091
44
reference_url https://github.com/torvalds/linux/commit/3d3925ff6433f98992685a9679613a2cc97f3ce2
reference_id 3d3925ff6433f98992685a9679613a2cc97f3ce2
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/
url https://github.com/torvalds/linux/commit/3d3925ff6433f98992685a9679613a2cc97f3ce2
45
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW/
reference_id 6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW/
46
reference_url https://security.archlinux.org/AVG-2698
reference_id AVG-2698
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2698
47
reference_url https://security.archlinux.org/AVG-2699
reference_id AVG-2699
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2699
48
reference_url https://security.archlinux.org/AVG-2700
reference_id AVG-2700
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2700
49
reference_url https://security.archlinux.org/AVG-2701
reference_id AVG-2701
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2701
50
reference_url https://www.debian.org/security/2022/dsa-5127
reference_id dsa-5127
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/
url https://www.debian.org/security/2022/dsa-5127
51
reference_url https://www.debian.org/security/2022/dsa-5173
reference_id dsa-5173
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/
url https://www.debian.org/security/2022/dsa-5173
52
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6/
reference_id LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6/
53
reference_url https://security.netapp.com/advisory/ntap-20220513-0001/
reference_id ntap-20220513-0001
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/
url https://security.netapp.com/advisory/ntap-20220513-0001/
54
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
55
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
56
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
57
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
58
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
59
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
60
reference_url https://usn.ubuntu.com/5416-1/
reference_id USN-5416-1
reference_type
scores
url https://usn.ubuntu.com/5416-1/
61
reference_url https://usn.ubuntu.com/5469-1/
reference_id USN-5469-1
reference_type
scores
url https://usn.ubuntu.com/5469-1/
62
reference_url https://usn.ubuntu.com/5493-1/
reference_id USN-5493-1
reference_type
scores
url https://usn.ubuntu.com/5493-1/
63
reference_url https://usn.ubuntu.com/5493-2/
reference_id USN-5493-2
reference_type
scores
url https://usn.ubuntu.com/5493-2/
64
reference_url https://usn.ubuntu.com/5505-1/
reference_id USN-5505-1
reference_type
scores
url https://usn.ubuntu.com/5505-1/
65
reference_url https://usn.ubuntu.com/5513-1/
reference_id USN-5513-1
reference_type
scores
url https://usn.ubuntu.com/5513-1/
66
reference_url https://usn.ubuntu.com/5539-1/
reference_id USN-5539-1
reference_type
scores
url https://usn.ubuntu.com/5539-1/
67
reference_url https://usn.ubuntu.com/5541-1/
reference_id USN-5541-1
reference_type
scores
url https://usn.ubuntu.com/5541-1/
68
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT/
reference_id XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT/
fixed_packages
aliases CVE-2022-28388
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wxfm-2u2z-euad
48
url VCID-xxe5-16mk-dqe5
vulnerability_id VCID-xxe5-16mk-dqe5
summary kernel: l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4129.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4129.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-4129
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.0503
published_at 2026-04-26T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.04956
published_at 2026-04-21T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.04989
published_at 2026-04-24T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05365
published_at 2026-04-18T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05709
published_at 2026-04-02T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05746
published_at 2026-04-07T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.0575
published_at 2026-04-04T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05739
published_at 2026-04-16T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05776
published_at 2026-04-13T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.05782
published_at 2026-04-12T12:55:00Z
10
value 0.00021
scoring_system epss
scoring_elements 0.0579
published_at 2026-04-11T12:55:00Z
11
value 0.00021
scoring_system epss
scoring_elements 0.05811
published_at 2026-04-09T12:55:00Z
12
value 0.00021
scoring_system epss
scoring_elements 0.05786
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-4129
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4129
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4129
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2134528
reference_id 2134528
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2134528
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5SPXMXXFANDASPCKER2JIQO2F3UHCP/
reference_id 7X5SPXMXXFANDASPCKER2JIQO2F3UHCP
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:37:45Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5SPXMXXFANDASPCKER2JIQO2F3UHCP/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AM5KFIE6JNZXHBA5A2KYDZAT3MEX2B67/
reference_id AM5KFIE6JNZXHBA5A2KYDZAT3MEX2B67
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:37:45Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AM5KFIE6JNZXHBA5A2KYDZAT3MEX2B67/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOKXNIM2R4FQCDRQV67UMAY6EBC72QFG/
reference_id JOKXNIM2R4FQCDRQV67UMAY6EBC72QFG
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:37:45Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOKXNIM2R4FQCDRQV67UMAY6EBC72QFG/
8
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:37:45Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
9
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
10
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
11
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
12
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
13
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
14
reference_url https://lore.kernel.org/all/20221114191619.124659-1-jakub%40cloudflare.com/t
reference_id t
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:37:45Z/
url https://lore.kernel.org/all/20221114191619.124659-1-jakub%40cloudflare.com/t
15
reference_url https://lore.kernel.org/netdev/20221121085426.21315-1-jakub%40cloudflare.com/t
reference_id t
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:37:45Z/
url https://lore.kernel.org/netdev/20221121085426.21315-1-jakub%40cloudflare.com/t
16
reference_url https://usn.ubuntu.com/6025-1/
reference_id USN-6025-1
reference_type
scores
url https://usn.ubuntu.com/6025-1/
17
reference_url https://usn.ubuntu.com/6027-1/
reference_id USN-6027-1
reference_type
scores
url https://usn.ubuntu.com/6027-1/
18
reference_url https://usn.ubuntu.com/6040-1/
reference_id USN-6040-1
reference_type
scores
url https://usn.ubuntu.com/6040-1/
19
reference_url https://usn.ubuntu.com/6057-1/
reference_id USN-6057-1
reference_type
scores
url https://usn.ubuntu.com/6057-1/
20
reference_url https://usn.ubuntu.com/6079-1/
reference_id USN-6079-1
reference_type
scores
url https://usn.ubuntu.com/6079-1/
21
reference_url https://usn.ubuntu.com/6091-1/
reference_id USN-6091-1
reference_type
scores
url https://usn.ubuntu.com/6091-1/
22
reference_url https://usn.ubuntu.com/6093-1/
reference_id USN-6093-1
reference_type
scores
url https://usn.ubuntu.com/6093-1/
23
reference_url https://usn.ubuntu.com/6096-1/
reference_id USN-6096-1
reference_type
scores
url https://usn.ubuntu.com/6096-1/
24
reference_url https://usn.ubuntu.com/6134-1/
reference_id USN-6134-1
reference_type
scores
url https://usn.ubuntu.com/6134-1/
25
reference_url https://usn.ubuntu.com/6222-1/
reference_id USN-6222-1
reference_type
scores
url https://usn.ubuntu.com/6222-1/
26
reference_url https://usn.ubuntu.com/6256-1/
reference_id USN-6256-1
reference_type
scores
url https://usn.ubuntu.com/6256-1/
fixed_packages
aliases CVE-2022-4129
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xxe5-16mk-dqe5
49
url VCID-y835-khqt-aybn
vulnerability_id VCID-y835-khqt-aybn
summary kernel: race condition in hugetlb_no_page() in mm/hugetlb.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3522.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3522.json
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2150979
reference_id 2150979
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2150979
3
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
4
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
5
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
6
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
7
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
fixed_packages
aliases CVE-2022-3522
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y835-khqt-aybn
50
url VCID-zc8z-cpdy-xkak
vulnerability_id VCID-zc8z-cpdy-xkak
summary kernel: net: stmmac: fix tc flower deletion for VLAN priority Rx steering
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47592.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47592.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-47592
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.0403
published_at 2026-04-01T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04068
published_at 2026-04-02T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04217
published_at 2026-04-26T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.04071
published_at 2026-04-13T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.04053
published_at 2026-04-16T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.04064
published_at 2026-04-18T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.04186
published_at 2026-04-21T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.04198
published_at 2026-04-24T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.04087
published_at 2026-04-04T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.04101
published_at 2026-04-07T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.04106
published_at 2026-04-08T12:55:00Z
11
value 0.00017
scoring_system epss
scoring_elements 0.04125
published_at 2026-04-09T12:55:00Z
12
value 0.00017
scoring_system epss
scoring_elements 0.0411
published_at 2026-04-11T12:55:00Z
13
value 0.00017
scoring_system epss
scoring_elements 0.04097
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-47592
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2293235
reference_id 2293235
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2293235
4
reference_url https://git.kernel.org/stable/c/97cb5c82aa1dd85a39b1bd021c8b5f18af623779
reference_id 97cb5c82aa1dd85a39b1bd021c8b5f18af623779
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-20T15:19:38Z/
url https://git.kernel.org/stable/c/97cb5c82aa1dd85a39b1bd021c8b5f18af623779
5
reference_url https://git.kernel.org/stable/c/aeb7c75cb77478fdbf821628e9c95c4baa9adc63
reference_id aeb7c75cb77478fdbf821628e9c95c4baa9adc63
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-20T15:19:38Z/
url https://git.kernel.org/stable/c/aeb7c75cb77478fdbf821628e9c95c4baa9adc63
6
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
7
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
8
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
9
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
fixed_packages
aliases CVE-2021-47592
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zc8z-cpdy-xkak
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@5.14.0-284.11.1.rt14.296%3Farch=el9_2