| 0 |
| url |
VCID-1b2u-7w7f-wudv |
| vulnerability_id |
VCID-1b2u-7w7f-wudv |
| summary |
kernel: use-after-free due to race condition in qdisc_graft() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-0590 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01801 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01804 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01818 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01789 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02654 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02766 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02756 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02744 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02682 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02668 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02665 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02646 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-0590 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-0590
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1b2u-7w7f-wudv |
|
| 1 |
| url |
VCID-1jsv-f7pv-4bbc |
| vulnerability_id |
VCID-1jsv-f7pv-4bbc |
| summary |
kernel: use-after-free in bss_ref_get in net/wireless/scan.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-42720 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00599 |
| scoring_system |
epss |
| scoring_elements |
0.69509 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00599 |
| scoring_system |
epss |
| scoring_elements |
0.69451 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00599 |
| scoring_system |
epss |
| scoring_elements |
0.69502 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.0065 |
| scoring_system |
epss |
| scoring_elements |
0.7078 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0065 |
| scoring_system |
epss |
| scoring_elements |
0.70824 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0065 |
| scoring_system |
epss |
| scoring_elements |
0.70805 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.0065 |
| scoring_system |
epss |
| scoring_elements |
0.70787 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.0065 |
| scoring_system |
epss |
| scoring_elements |
0.70884 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.0065 |
| scoring_system |
epss |
| scoring_elements |
0.70878 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.0065 |
| scoring_system |
epss |
| scoring_elements |
0.70833 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.0065 |
| scoring_system |
epss |
| scoring_elements |
0.70848 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.0065 |
| scoring_system |
epss |
| scoring_elements |
0.70863 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.0065 |
| scoring_system |
epss |
| scoring_elements |
0.70841 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-42720 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-42720
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1jsv-f7pv-4bbc |
|
| 2 |
| url |
VCID-4nqf-ct5y-6uev |
| vulnerability_id |
VCID-4nqf-ct5y-6uev |
| summary |
kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-42896 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00421 |
| scoring_system |
epss |
| scoring_elements |
0.62017 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00421 |
| scoring_system |
epss |
| scoring_elements |
0.61966 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00421 |
| scoring_system |
epss |
| scoring_elements |
0.61983 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00421 |
| scoring_system |
epss |
| scoring_elements |
0.62004 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00421 |
| scoring_system |
epss |
| scoring_elements |
0.61994 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00421 |
| scoring_system |
epss |
| scoring_elements |
0.61973 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00421 |
| scoring_system |
epss |
| scoring_elements |
0.62015 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00421 |
| scoring_system |
epss |
| scoring_elements |
0.62021 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00421 |
| scoring_system |
epss |
| scoring_elements |
0.62003 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00421 |
| scoring_system |
epss |
| scoring_elements |
0.62 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00421 |
| scoring_system |
epss |
| scoring_elements |
0.61916 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00421 |
| scoring_system |
epss |
| scoring_elements |
0.61946 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-42896 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-42896
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4nqf-ct5y-6uev |
|
| 3 |
| url |
VCID-58sv-d9e3-rfbf |
| vulnerability_id |
VCID-58sv-d9e3-rfbf |
| summary |
kernel: malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-33655 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06243 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06492 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06355 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06293 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06306 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06455 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.0647 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06277 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.0631 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06291 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06337 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06378 |
| published_at |
2026-04-09T12:55:00Z |
|
| 12 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06371 |
| published_at |
2026-04-11T12:55:00Z |
|
| 13 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06366 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-33655 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-33655
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-58sv-d9e3-rfbf |
|
| 4 |
| url |
VCID-5we4-cmum-y7dm |
| vulnerability_id |
VCID-5we4-cmum-y7dm |
| summary |
kernel: use-after-free in free_pipe_info() could lead to privilege escalation |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1882 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08685 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08714 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08762 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08687 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08763 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08789 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.0879 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08758 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08743 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08631 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.0862 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11607 |
| published_at |
2026-04-26T12:55:00Z |
|
| 12 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11687 |
| published_at |
2026-04-21T12:55:00Z |
|
| 13 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11647 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1882 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1882
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5we4-cmum-y7dm |
|
| 5 |
| url |
VCID-63j6-wgqx-vfg5 |
| vulnerability_id |
VCID-63j6-wgqx-vfg5 |
| summary |
kernel: mptcp: NULL pointer dereference in subflow traversal at disconnect time |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-4128 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14778 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14668 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14675 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.1457 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14576 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14638 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.1467 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14856 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14659 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.1475 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.1481 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14768 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14731 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-4128 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-4128
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-63j6-wgqx-vfg5 |
|
| 6 |
| url |
VCID-648j-njzx-rkcf |
| vulnerability_id |
VCID-648j-njzx-rkcf |
| summary |
kernel: BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-42721 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.06196 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.06151 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.06165 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06568 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06618 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06584 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06547 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06557 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06564 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06637 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06645 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06653 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06661 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-42721 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-42721
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-648j-njzx-rkcf |
|
| 7 |
| url |
VCID-6jc4-7c8b-4bhv |
| vulnerability_id |
VCID-6jc4-7c8b-4bhv |
| summary |
kernel: use-after-free caused by invalid pointer hostname in fs/cifs/connect.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-1195 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04075 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04221 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04069 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0419 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04202 |
| published_at |
2026-04-24T12:55:00Z |
|
| 5 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04093 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04113 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04132 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04116 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04102 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04076 |
| published_at |
2026-04-13T12:55:00Z |
|
| 12 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04058 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-1195 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-1195
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6jc4-7c8b-4bhv |
|
| 8 |
| url |
VCID-8ekj-2sge-5kd2 |
| vulnerability_id |
VCID-8ekj-2sge-5kd2 |
| summary |
kernel: KVM: NULL pointer dereference in kvm_mmu_invpcid_gva |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1789 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04217 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04437 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04291 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04262 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04271 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04397 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04417 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04255 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04275 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04287 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04319 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04334 |
| published_at |
2026-04-09T12:55:00Z |
|
| 12 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04326 |
| published_at |
2026-04-11T12:55:00Z |
|
| 13 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04312 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1789 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1789
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8ekj-2sge-5kd2 |
|
| 9 |
| url |
VCID-8htb-kgr8-3yes |
| vulnerability_id |
VCID-8htb-kgr8-3yes |
| summary |
network backend may cause Linux netfront to use freed SKBs |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-33743 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07575 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07618 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07591 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.0765 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07668 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07669 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07694 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07644 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07655 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.0764 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07566 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07554 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.10915 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-33743 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-33743, XSA-405
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
7.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8htb-kgr8-3yes |
|
| 10 |
| url |
VCID-9nyv-n5f5-ekbf |
| vulnerability_id |
VCID-9nyv-n5f5-ekbf |
| summary |
kernel: memory leak in ipv6_renew_options() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3524 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18799 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18905 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18918 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18929 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18819 |
| published_at |
2026-04-24T12:55:00Z |
|
| 5 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.1914 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19192 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18909 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18988 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19042 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19049 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19003 |
| published_at |
2026-04-12T12:55:00Z |
|
| 12 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18951 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3524 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-3524
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9nyv-n5f5-ekbf |
|
| 11 |
| url |
VCID-9pmb-g7fz-3kd6 |
| vulnerability_id |
VCID-9pmb-g7fz-3kd6 |
| summary |
kernel: lockdown bypass using IMA |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-21505 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.14014 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13854 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.1388 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13786 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13782 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13856 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13882 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.14068 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13873 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13957 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.1401 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13966 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13929 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-21505 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-21505
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9pmb-g7fz-3kd6 |
|
| 12 |
| url |
VCID-bpkg-a38v-53dv |
| vulnerability_id |
VCID-bpkg-a38v-53dv |
| summary |
kernel: igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-20141 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05773 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05806 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05842 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05836 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05875 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05902 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05882 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05873 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05865 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.0583 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05841 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05995 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.06026 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.06062 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-20141 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-20141
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bpkg-a38v-53dv |
|
| 13 |
| url |
VCID-c3z5-1arv-kqck |
| vulnerability_id |
VCID-c3z5-1arv-kqck |
| summary |
kernel: ext4: use-after-free in ext4_xattr_set_entry() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-2513 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.0214 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02154 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02137 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02122 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02118 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02093 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02106 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02193 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02163 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02146 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02142 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02141 |
| published_at |
2026-04-08T12:55:00Z |
|
| 12 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02159 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-2513 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-2513
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-c3z5-1arv-kqck |
|
| 14 |
| url |
VCID-chuj-redw-v3ek |
| vulnerability_id |
VCID-chuj-redw-v3ek |
| summary |
kernel: out-of-bounds read in fib_nh_match of the file net/ipv4/fib_semantics.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3435 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00069 |
| scoring_system |
epss |
| scoring_elements |
0.21368 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.21923 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22288 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22072 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22153 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22208 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22228 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22187 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22127 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22121 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22075 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.21935 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3435 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://vuldb.com/?id.210357 |
| reference_id |
?id.210357 |
| reference_type |
|
| scores |
| 0 |
| value |
4.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N |
|
| 1 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:10:02Z/ |
|
|
| url |
https://vuldb.com/?id.210357 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-3435
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-chuj-redw-v3ek |
|
| 15 |
| url |
VCID-ckqp-r5m2-j3fx |
| vulnerability_id |
VCID-ckqp-r5m2-j3fx |
| summary |
kernel: data races around sk->sk_prot |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3567 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06395 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.0641 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.064 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06463 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06475 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06481 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06443 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06487 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06819 |
| published_at |
2026-04-26T12:55:00Z |
|
| 9 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06615 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06659 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06792 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.068 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3567 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://vuldb.com/?id.211090 |
| reference_id |
?id.211090 |
| reference_type |
|
| scores |
| 0 |
| value |
4.6 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L |
|
| 1 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:29Z/ |
|
|
| url |
https://vuldb.com/?id.211090 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-3567
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ckqp-r5m2-j3fx |
|
| 16 |
| url |
VCID-d14e-jv1a-w7d3 |
| vulnerability_id |
VCID-d14e-jv1a-w7d3 |
| summary |
kernel: memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3619 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07573 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07625 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07624 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07611 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07597 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07521 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.0751 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07649 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07596 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.0753 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.0757 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07547 |
| published_at |
2026-04-07T12:55:00Z |
|
| 12 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07606 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3619 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://vuldb.com/?id.211918 |
| reference_id |
?id.211918 |
| reference_type |
|
| scores |
| 0 |
| value |
3.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L |
|
| 1 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T16:59:20Z/ |
|
|
| url |
https://vuldb.com/?id.211918 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-3619
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-d14e-jv1a-w7d3 |
|
| 17 |
| url |
VCID-dqhd-grev-t3ge |
| vulnerability_id |
VCID-dqhd-grev-t3ge |
| summary |
kernel: use-after-free related to leaf anon_vma double reuse |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-42703 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00985 |
| scoring_system |
epss |
| scoring_elements |
0.76906 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00985 |
| scoring_system |
epss |
| scoring_elements |
0.76827 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00985 |
| scoring_system |
epss |
| scoring_elements |
0.7687 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00985 |
| scoring_system |
epss |
| scoring_elements |
0.76875 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00985 |
| scoring_system |
epss |
| scoring_elements |
0.76866 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.00985 |
| scoring_system |
epss |
| scoring_elements |
0.76899 |
| published_at |
2026-04-24T12:55:00Z |
|
| 6 |
| value |
0.00985 |
| scoring_system |
epss |
| scoring_elements |
0.76773 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00985 |
| scoring_system |
epss |
| scoring_elements |
0.76802 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00985 |
| scoring_system |
epss |
| scoring_elements |
0.76783 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00985 |
| scoring_system |
epss |
| scoring_elements |
0.76814 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00985 |
| scoring_system |
epss |
| scoring_elements |
0.76824 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00985 |
| scoring_system |
epss |
| scoring_elements |
0.76853 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.00985 |
| scoring_system |
epss |
| scoring_elements |
0.76833 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-42703 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-42703
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dqhd-grev-t3ge |
|
| 18 |
| url |
VCID-dqth-c54y-e7fb |
| vulnerability_id |
VCID-dqth-c54y-e7fb |
| summary |
kernel: data races around icsk->icsk_af_ops in do_ipv6_setsockopt |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3566 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06857 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06853 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06869 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0693 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06934 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06942 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06912 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06943 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07169 |
| published_at |
2026-04-26T12:55:00Z |
|
| 9 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07055 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07111 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07191 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07161 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3566 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://vuldb.com/?id.211089 |
| reference_id |
?id.211089 |
| reference_type |
|
| scores |
| 0 |
| value |
4.6 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L |
|
| 1 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:33Z/ |
|
|
| url |
https://vuldb.com/?id.211089 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-3566
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dqth-c54y-e7fb |
|
| 19 |
| url |
VCID-ejj4-yt8j-c7fm |
| vulnerability_id |
VCID-ejj4-yt8j-c7fm |
| summary |
kernel: race condition in xfrm_probe_algs can lead to OOB read/write |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3028 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.0127 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01259 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01263 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02032 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02045 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02077 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02084 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02078 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.0208 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02098 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02075 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.0206 |
| published_at |
2026-04-12T12:55:00Z |
|
| 12 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02056 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3028 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-3028
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ejj4-yt8j-c7fm |
|
| 20 |
| url |
VCID-ezb4-x5pv-myhe |
| vulnerability_id |
VCID-ezb4-x5pv-myhe |
| summary |
hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-26341 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15515 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15558 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15626 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15425 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15513 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15563 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15526 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15489 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15422 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15343 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15348 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15399 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15444 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15442 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-26341 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-26341
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ezb4-x5pv-myhe |
|
| 21 |
| url |
VCID-g2k9-eds7-6qe3 |
| vulnerability_id |
VCID-g2k9-eds7-6qe3 |
| summary |
kernel: memory corruption in usbmon driver |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-43750 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19108 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19101 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19091 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19133 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19187 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00069 |
| scoring_system |
epss |
| scoring_elements |
0.21309 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00069 |
| scoring_system |
epss |
| scoring_elements |
0.2114 |
| published_at |
2026-04-26T12:55:00Z |
|
| 7 |
| value |
0.00069 |
| scoring_system |
epss |
| scoring_elements |
0.21351 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00069 |
| scoring_system |
epss |
| scoring_elements |
0.21406 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00069 |
| scoring_system |
epss |
| scoring_elements |
0.21158 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00069 |
| scoring_system |
epss |
| scoring_elements |
0.21237 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00069 |
| scoring_system |
epss |
| scoring_elements |
0.21299 |
| published_at |
2026-04-09T12:55:00Z |
|
| 12 |
| value |
0.00069 |
| scoring_system |
epss |
| scoring_elements |
0.21138 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-43750 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-43750
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-g2k9-eds7-6qe3 |
|
| 22 |
| url |
VCID-ghef-adjn-rqcb |
| vulnerability_id |
VCID-ghef-adjn-rqcb |
| summary |
kernel: denial of service in tipc_conn_close |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-1382 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01095 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01091 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01096 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01079 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01073 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01074 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01068 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01077 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03381 |
| published_at |
2026-04-26T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03379 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0339 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00895 |
| published_at |
2026-04-04T12:55:00Z |
|
| 12 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00893 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-1382 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-1382
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ghef-adjn-rqcb |
|
| 23 |
| url |
VCID-guqa-19j6-bba4 |
| vulnerability_id |
VCID-guqa-19j6-bba4 |
| summary |
kernel: scsi: mpt3sas: Fix use-after-free warning |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-48695 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04582 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04804 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04609 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04644 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04659 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04654 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04636 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04585 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04594 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04732 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04769 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04602 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-48695 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-48695
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-guqa-19j6-bba4 |
|
| 24 |
| url |
VCID-h82m-mnhk-67e2 |
| vulnerability_id |
VCID-h82m-mnhk-67e2 |
| summary |
kernel: TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-39189 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05267 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05509 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05299 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05325 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05358 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05382 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.0535 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05338 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05328 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05276 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05277 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05428 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05468 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-39189 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-39189
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
7.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-h82m-mnhk-67e2 |
|
| 25 |
| url |
VCID-jefe-c9nd-ufc1 |
| vulnerability_id |
VCID-jefe-c9nd-ufc1 |
| summary |
kernel: USB-accessible buffer overflow in brcmfmac |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3628 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20547 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20785 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20742 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.2069 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20675 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20671 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20663 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.2055 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20858 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20916 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.2063 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20706 |
| published_at |
2026-04-08T12:55:00Z |
|
| 12 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20767 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3628 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-3628
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jefe-c9nd-ufc1 |
|
| 26 |
| url |
VCID-jsr8-pv5g-kba8 |
| vulnerability_id |
VCID-jsr8-pv5g-kba8 |
| summary |
kernel: u8 overflow problem in cfg80211_update_notlisted_nontrans() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-41674 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00471 |
| scoring_system |
epss |
| scoring_elements |
0.64621 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00471 |
| scoring_system |
epss |
| scoring_elements |
0.64641 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00471 |
| scoring_system |
epss |
| scoring_elements |
0.64653 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00511 |
| scoring_system |
epss |
| scoring_elements |
0.66486 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00511 |
| scoring_system |
epss |
| scoring_elements |
0.66422 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00511 |
| scoring_system |
epss |
| scoring_elements |
0.66396 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00511 |
| scoring_system |
epss |
| scoring_elements |
0.66468 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00511 |
| scoring_system |
epss |
| scoring_elements |
0.66432 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00511 |
| scoring_system |
epss |
| scoring_elements |
0.66463 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00511 |
| scoring_system |
epss |
| scoring_elements |
0.66475 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00511 |
| scoring_system |
epss |
| scoring_elements |
0.66455 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00511 |
| scoring_system |
epss |
| scoring_elements |
0.66441 |
| published_at |
2026-04-08T12:55:00Z |
|
| 12 |
| value |
0.00511 |
| scoring_system |
epss |
| scoring_elements |
0.66392 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-41674 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-41674
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jsr8-pv5g-kba8 |
|
| 27 |
| url |
VCID-m26e-r8mc-jbbq |
| vulnerability_id |
VCID-m26e-r8mc-jbbq |
| summary |
kernel: KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-2196 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09644 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09629 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09677 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12259 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12398 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12358 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12258 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12452 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12496 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12301 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.1238 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.1243 |
| published_at |
2026-04-09T12:55:00Z |
|
| 12 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12437 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-2196 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://kernel.dance/#2e7eab81425a |
| reference_id |
#2e7eab81425a |
| reference_type |
|
| scores |
| 0 |
| value |
5.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L |
|
| 1 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-01T15:07:47Z/ |
|
|
| url |
https://kernel.dance/#2e7eab81425a |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-2196
|
| risk_score |
2.6 |
| exploitability |
0.5 |
| weighted_severity |
5.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-m26e-r8mc-jbbq |
|
| 28 |
| url |
VCID-m4wy-164p-qyh7 |
| vulnerability_id |
VCID-m4wy-164p-qyh7 |
| summary |
kernel: net/ulp: use-after-free in listening ULP sockets |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-0461 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32927 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32963 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32784 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32832 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32861 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32862 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32823 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32798 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32841 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32818 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00144 |
| scoring_system |
epss |
| scoring_elements |
0.3445 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00144 |
| scoring_system |
epss |
| scoring_elements |
0.34431 |
| published_at |
2026-04-26T12:55:00Z |
|
| 12 |
| value |
0.00144 |
| scoring_system |
epss |
| scoring_elements |
0.34683 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-0461 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-0461
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
7.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-m4wy-164p-qyh7 |
|
| 29 |
| url |
VCID-mrhs-1bmb-3bc5 |
| vulnerability_id |
VCID-mrhs-1bmb-3bc5 |
| summary |
kernel: drm/virtio: improper return value check in virtio_gpu_object_shmem_init() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-22998 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05191 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05243 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.0522 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05279 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05299 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05267 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05252 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05239 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05184 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05188 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05926 |
| published_at |
2026-04-26T12:55:00Z |
|
| 11 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05859 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.0589 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-22998 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-22998
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mrhs-1bmb-3bc5 |
|
| 30 |
| url |
VCID-mtrd-vfmy-pbcz |
| vulnerability_id |
VCID-mtrd-vfmy-pbcz |
| summary |
kernel: ext4: kernel bug in ext4_write_inline_data_end() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-33631 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00255 |
| scoring_system |
epss |
| scoring_elements |
0.48844 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00255 |
| scoring_system |
epss |
| scoring_elements |
0.48881 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00255 |
| scoring_system |
epss |
| scoring_elements |
0.4886 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00255 |
| scoring_system |
epss |
| scoring_elements |
0.48916 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00255 |
| scoring_system |
epss |
| scoring_elements |
0.48955 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00255 |
| scoring_system |
epss |
| scoring_elements |
0.48958 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00255 |
| scoring_system |
epss |
| scoring_elements |
0.48911 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00255 |
| scoring_system |
epss |
| scoring_elements |
0.48903 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00255 |
| scoring_system |
epss |
| scoring_elements |
0.48929 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00255 |
| scoring_system |
epss |
| scoring_elements |
0.48912 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00255 |
| scoring_system |
epss |
| scoring_elements |
0.48914 |
| published_at |
2026-04-26T12:55:00Z |
|
| 11 |
| value |
0.00255 |
| scoring_system |
epss |
| scoring_elements |
0.48907 |
| published_at |
2026-04-04T12:55:00Z |
|
| 12 |
| value |
0.00255 |
| scoring_system |
epss |
| scoring_elements |
0.48904 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-33631 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-33631
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mtrd-vfmy-pbcz |
|
| 31 |
| url |
VCID-n2c4-w748-tyau |
| vulnerability_id |
VCID-n2c4-w748-tyau |
| summary |
kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3623 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.22866 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.2319 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.23234 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.23023 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.23096 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.23149 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.23168 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.2313 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.23073 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.23088 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.23079 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.23042 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.22872 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3623 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
| reference_url |
https://vuldb.com/?id.211921 |
| reference_id |
?id.211921 |
| reference_type |
|
| scores |
| 0 |
| value |
5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L |
|
| 1 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:04Z/ |
|
|
| url |
https://vuldb.com/?id.211921 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-3623
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-n2c4-w748-tyau |
|
| 32 |
| url |
VCID-nck8-brgn-hkdx |
| vulnerability_id |
VCID-nck8-brgn-hkdx |
| summary |
kernel: use-after-free after failed devlink reload in devlink_param_get |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3625 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05906 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05836 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05869 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06106 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.0613 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06169 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06159 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06154 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06147 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06107 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06118 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06089 |
| published_at |
2026-04-07T12:55:00Z |
|
| 12 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06078 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3625 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-3625
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
7.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nck8-brgn-hkdx |
|
| 33 |
| url |
VCID-ng25-c2xk-9fem |
| vulnerability_id |
VCID-ng25-c2xk-9fem |
| summary |
kernel: NULL pointer dereference in traffic control subsystem |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-47929 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08652 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08685 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08699 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09541 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09472 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.0942 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09419 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09525 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09521 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09434 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09508 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09556 |
| published_at |
2026-04-09T12:55:00Z |
|
| 12 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.0957 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-47929 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-47929
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ng25-c2xk-9fem |
|
| 34 |
| url |
VCID-p1a3-k51z-byc7 |
| vulnerability_id |
VCID-p1a3-k51z-byc7 |
| summary |
kernel: possible race condition in drivers/tty/tty_buffers.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1462 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12553 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12657 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12699 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12511 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12589 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12641 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12608 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12568 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12528 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12433 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12437 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12552 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.1256 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12526 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1462 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1462
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-p1a3-k51z-byc7 |
|
| 35 |
| url |
VCID-pf6k-jwex-8kay |
| vulnerability_id |
VCID-pf6k-jwex-8kay |
| summary |
kernel: Denial of service in beacon protection for P2P-device |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-42722 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00079 |
| scoring_system |
epss |
| scoring_elements |
0.23143 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00079 |
| scoring_system |
epss |
| scoring_elements |
0.23349 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00079 |
| scoring_system |
epss |
| scoring_elements |
0.23367 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00079 |
| scoring_system |
epss |
| scoring_elements |
0.23361 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00079 |
| scoring_system |
epss |
| scoring_elements |
0.23341 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.00079 |
| scoring_system |
epss |
| scoring_elements |
0.2315 |
| published_at |
2026-04-24T12:55:00Z |
|
| 6 |
| value |
0.00079 |
| scoring_system |
epss |
| scoring_elements |
0.23477 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00079 |
| scoring_system |
epss |
| scoring_elements |
0.23514 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00079 |
| scoring_system |
epss |
| scoring_elements |
0.23298 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00079 |
| scoring_system |
epss |
| scoring_elements |
0.2337 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00079 |
| scoring_system |
epss |
| scoring_elements |
0.23422 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00079 |
| scoring_system |
epss |
| scoring_elements |
0.23441 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.00079 |
| scoring_system |
epss |
| scoring_elements |
0.23403 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-42722 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-42722
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pf6k-jwex-8kay |
|
| 36 |
| url |
VCID-pq7v-b14b-tuhv |
| vulnerability_id |
VCID-pq7v-b14b-tuhv |
| summary |
Kernel: NULL pointer dereference problem in sctp_sched_dequeue_common |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-2177 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01455 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01443 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01451 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01463 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01466 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01472 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01477 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01479 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01468 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01456 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01471 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-2177 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-2177
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pq7v-b14b-tuhv |
|
| 37 |
| url |
VCID-pyph-7y9k-gkfa |
| vulnerability_id |
VCID-pyph-7y9k-gkfa |
| summary |
kernel: Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3707 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02508 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02587 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02527 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02548 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02528 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02518 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02516 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02502 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02507 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02614 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02599 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02521 |
| published_at |
2026-04-04T12:55:00Z |
|
| 12 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02523 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3707 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-3707
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pyph-7y9k-gkfa |
|
| 38 |
| url |
VCID-qbd9-czms-8qdn |
| vulnerability_id |
VCID-qbd9-czms-8qdn |
| summary |
kernel: vmwgfx: out-of-bounds write in vmw_kms_cursor_snoop |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-36280 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15294 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15281 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15195 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15201 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15255 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15295 |
| published_at |
2026-04-24T12:55:00Z |
|
| 6 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15413 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15482 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15285 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15373 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15423 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15384 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15345 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-36280 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-36280
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qbd9-czms-8qdn |
|
| 39 |
| url |
VCID-qkam-j6uv-n7fj |
| vulnerability_id |
VCID-qkam-j6uv-n7fj |
| summary |
kernel: NULL pointer dereference in rawv6_push_pending_frames |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-0394 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06362 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06318 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06335 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06934 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06869 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0687 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06857 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06912 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06942 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06941 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0693 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06827 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06852 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-0394 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-0394
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qkam-j6uv-n7fj |
|
| 40 |
| url |
VCID-qrf7-hb33-tqe4 |
| vulnerability_id |
VCID-qrf7-hb33-tqe4 |
| summary |
kernel: Recursive locking violation in usb-storage that can cause the kernel to deadlock |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-4662 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00314 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0037 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00299 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00295 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00298 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00318 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00369 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00313 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00304 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00302 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00301 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.003 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-4662 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-4662
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qrf7-hb33-tqe4 |
|
| 41 |
| url |
VCID-svpc-cq3p-y3gw |
| vulnerability_id |
VCID-svpc-cq3p-y3gw |
| summary |
kernel: mlxsw: spectrum: Protect driver from buggy firmware |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47560 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07751 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07861 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07878 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07814 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07797 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07952 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.0791 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07909 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07862 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07921 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07941 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07929 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07913 |
| published_at |
2026-04-12T12:55:00Z |
|
| 13 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07899 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47560 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-47560
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-svpc-cq3p-y3gw |
|
| 42 |
| url |
VCID-t2jg-dbdj-r3av |
| vulnerability_id |
VCID-t2jg-dbdj-r3av |
| summary |
kernel: ICMPv6 “Packet Too Big” packets force a DoS of the Linux kernel by forcing 100% CPU |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52340 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24572 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24253 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24412 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24428 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24419 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24393 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24267 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24608 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24385 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24454 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24498 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24514 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.2447 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52340 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-52340
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t2jg-dbdj-r3av |
|
| 43 |
| url |
VCID-vqy7-37ym-eufr |
| vulnerability_id |
VCID-vqy7-37ym-eufr |
| summary |
kernel: xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-36879 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06975 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0682 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06863 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06849 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06904 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06935 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06932 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06925 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06921 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0686 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06842 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06984 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06971 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-36879 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-36879
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vqy7-37ym-eufr |
|
| 44 |
| url |
VCID-vzpr-mm8p-yygx |
| vulnerability_id |
VCID-vzpr-mm8p-yygx |
| summary |
kernel: netfilter: nf_conntrack_irc message handling issue |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-2663 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00178 |
| scoring_system |
epss |
| scoring_elements |
0.3903 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00178 |
| scoring_system |
epss |
| scoring_elements |
0.39327 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00178 |
| scoring_system |
epss |
| scoring_elements |
0.39379 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00178 |
| scoring_system |
epss |
| scoring_elements |
0.39351 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00178 |
| scoring_system |
epss |
| scoring_elements |
0.39264 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.00178 |
| scoring_system |
epss |
| scoring_elements |
0.39049 |
| published_at |
2026-04-24T12:55:00Z |
|
| 6 |
| value |
0.00178 |
| scoring_system |
epss |
| scoring_elements |
0.39363 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00178 |
| scoring_system |
epss |
| scoring_elements |
0.39387 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00178 |
| scoring_system |
epss |
| scoring_elements |
0.393 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00178 |
| scoring_system |
epss |
| scoring_elements |
0.39356 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00178 |
| scoring_system |
epss |
| scoring_elements |
0.39373 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00178 |
| scoring_system |
epss |
| scoring_elements |
0.39385 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.00178 |
| scoring_system |
epss |
| scoring_elements |
0.39345 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-2663 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-2663
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vzpr-mm8p-yygx |
|
| 45 |
| url |
VCID-wm98-kp5f-mudg |
| vulnerability_id |
VCID-wm98-kp5f-mudg |
| summary |
kernel: use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3640 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.08007 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07946 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07932 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.0809 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.08042 |
| published_at |
2026-04-24T12:55:00Z |
|
| 5 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.083 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08291 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08271 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08252 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08281 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08214 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08267 |
| published_at |
2026-04-04T12:55:00Z |
|
| 12 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08217 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3640 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-3640
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wm98-kp5f-mudg |
|
| 46 |
| url |
VCID-wudq-7hws-aqft |
| vulnerability_id |
VCID-wudq-7hws-aqft |
| summary |
kernel: unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-39188 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04387 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04411 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04422 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04457 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04475 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04467 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04452 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04435 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04403 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04546 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04578 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04597 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-39188 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-39188
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wudq-7hws-aqft |
|
| 47 |
| url |
VCID-wxfm-2u2z-euad |
| vulnerability_id |
VCID-wxfm-2u2z-euad |
| summary |
kernel: double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-28388 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01846 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01781 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01794 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01797 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0181 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01803 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01793 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0179 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01779 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01777 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0186 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0185 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-28388 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-28388
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wxfm-2u2z-euad |
|
| 48 |
| url |
VCID-xxe5-16mk-dqe5 |
| vulnerability_id |
VCID-xxe5-16mk-dqe5 |
| summary |
kernel: l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-4129 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.0503 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04956 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04989 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05365 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05709 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05746 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.0575 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05739 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05776 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05782 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.0579 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05811 |
| published_at |
2026-04-09T12:55:00Z |
|
| 12 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05786 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-4129 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-4129
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xxe5-16mk-dqe5 |
|
| 49 |
|
| 50 |
| url |
VCID-zc8z-cpdy-xkak |
| vulnerability_id |
VCID-zc8z-cpdy-xkak |
| summary |
kernel: net: stmmac: fix tc flower deletion for VLAN priority Rx steering |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47592 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0403 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04068 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04217 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04071 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04053 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04064 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04186 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04198 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04087 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04101 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04106 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04125 |
| published_at |
2026-04-09T12:55:00Z |
|
| 12 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0411 |
| published_at |
2026-04-11T12:55:00Z |
|
| 13 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04097 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47592 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-47592
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zc8z-cpdy-xkak |
|