Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel-rt@4.18.0-477.10.1.rt7.274?arch=el8_8
Typerpm
Namespaceredhat
Namekernel-rt
Version4.18.0-477.10.1.rt7.274
Qualifiers
arch el8_8
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1jsv-f7pv-4bbc
vulnerability_id VCID-1jsv-f7pv-4bbc
summary kernel: use-after-free in bss_ref_get in net/wireless/scan.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42720.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42720.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42720
reference_id
reference_type
scores
0
value 0.00599
scoring_system epss
scoring_elements 0.69502
published_at 2026-04-24T12:55:00Z
1
value 0.00599
scoring_system epss
scoring_elements 0.69451
published_at 2026-04-21T12:55:00Z
2
value 0.0065
scoring_system epss
scoring_elements 0.70841
published_at 2026-04-09T12:55:00Z
3
value 0.0065
scoring_system epss
scoring_elements 0.70787
published_at 2026-04-02T12:55:00Z
4
value 0.0065
scoring_system epss
scoring_elements 0.70863
published_at 2026-04-11T12:55:00Z
5
value 0.0065
scoring_system epss
scoring_elements 0.70824
published_at 2026-04-08T12:55:00Z
6
value 0.0065
scoring_system epss
scoring_elements 0.70884
published_at 2026-04-18T12:55:00Z
7
value 0.0065
scoring_system epss
scoring_elements 0.70878
published_at 2026-04-16T12:55:00Z
8
value 0.0065
scoring_system epss
scoring_elements 0.70805
published_at 2026-04-04T12:55:00Z
9
value 0.0065
scoring_system epss
scoring_elements 0.7078
published_at 2026-04-07T12:55:00Z
10
value 0.0065
scoring_system epss
scoring_elements 0.70833
published_at 2026-04-13T12:55:00Z
11
value 0.0065
scoring_system epss
scoring_elements 0.70848
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42720
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
19
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2134451
reference_id 2134451
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2134451
21
reference_url http://www.openwall.com/lists/oss-security/2022/10/13/5
reference_id 5
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-15T20:46:43Z/
url http://www.openwall.com/lists/oss-security/2022/10/13/5
22
reference_url https://security.archlinux.org/ASA-202210-1
reference_id ASA-202210-1
reference_type
scores
url https://security.archlinux.org/ASA-202210-1
23
reference_url https://security.archlinux.org/ASA-202210-2
reference_id ASA-202210-2
reference_type
scores
url https://security.archlinux.org/ASA-202210-2
24
reference_url https://security.archlinux.org/ASA-202210-3
reference_id ASA-202210-3
reference_type
scores
url https://security.archlinux.org/ASA-202210-3
25
reference_url https://security.archlinux.org/ASA-202210-4
reference_id ASA-202210-4
reference_type
scores
url https://security.archlinux.org/ASA-202210-4
26
reference_url https://security.archlinux.org/AVG-2800
reference_id AVG-2800
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2800
27
reference_url https://security.archlinux.org/AVG-2801
reference_id AVG-2801
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2801
28
reference_url https://security.archlinux.org/AVG-2802
reference_id AVG-2802
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2802
29
reference_url https://security.archlinux.org/AVG-2803
reference_id AVG-2803
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2803
30
reference_url https://www.debian.org/security/2022/dsa-5257
reference_id dsa-5257
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-15T20:46:43Z/
url https://www.debian.org/security/2022/dsa-5257
31
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY/
reference_id GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-15T20:46:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY/
32
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/wireless/wireless.git/commit/?id=0b7808818cb9df6680f98996b8e9a439fa7bcc2f
reference_id ?id=0b7808818cb9df6680f98996b8e9a439fa7bcc2f
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-15T20:46:43Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/wireless/wireless.git/commit/?id=0b7808818cb9df6680f98996b8e9a439fa7bcc2f
33
reference_url http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html
reference_id Kernel-Live-Patch-Security-Notice-LSN-0090-1.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-15T20:46:43Z/
url http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html
34
reference_url https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html
reference_id msg00001.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-15T20:46:43Z/
url https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html
35
reference_url https://security.netapp.com/advisory/ntap-20230203-0008/
reference_id ntap-20230203-0008
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-15T20:46:43Z/
url https://security.netapp.com/advisory/ntap-20230203-0008/
36
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
37
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
38
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
39
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
40
reference_url https://access.redhat.com/errata/RHSA-2024:1188
reference_id RHSA-2024:1188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1188
41
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2/
reference_id S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-15T20:46:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2/
42
reference_url https://bugzilla.suse.com/show_bug.cgi?id=1204059
reference_id show_bug.cgi?id=1204059
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-15T20:46:43Z/
url https://bugzilla.suse.com/show_bug.cgi?id=1204059
43
reference_url https://usn.ubuntu.com/5691-1/
reference_id USN-5691-1
reference_type
scores
url https://usn.ubuntu.com/5691-1/
44
reference_url https://usn.ubuntu.com/5692-1/
reference_id USN-5692-1
reference_type
scores
url https://usn.ubuntu.com/5692-1/
45
reference_url https://usn.ubuntu.com/5693-1/
reference_id USN-5693-1
reference_type
scores
url https://usn.ubuntu.com/5693-1/
46
reference_url https://usn.ubuntu.com/5700-1/
reference_id USN-5700-1
reference_type
scores
url https://usn.ubuntu.com/5700-1/
47
reference_url https://usn.ubuntu.com/5708-1/
reference_id USN-5708-1
reference_type
scores
url https://usn.ubuntu.com/5708-1/
48
reference_url https://usn.ubuntu.com/5752-1/
reference_id USN-5752-1
reference_type
scores
url https://usn.ubuntu.com/5752-1/
49
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR/
reference_id VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-15T20:46:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR/
fixed_packages
aliases CVE-2022-42720
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1jsv-f7pv-4bbc
1
url VCID-58sv-d9e3-rfbf
vulnerability_id VCID-58sv-d9e3-rfbf
summary kernel: malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33655.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33655.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-33655
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06243
published_at 2026-04-01T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.0647
published_at 2026-04-24T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06366
published_at 2026-04-12T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06355
published_at 2026-04-13T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06293
published_at 2026-04-16T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06306
published_at 2026-04-18T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06455
published_at 2026-04-21T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06277
published_at 2026-04-02T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.0631
published_at 2026-04-04T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06291
published_at 2026-04-07T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06337
published_at 2026-04-08T12:55:00Z
11
value 0.00024
scoring_system epss
scoring_elements 0.06378
published_at 2026-04-09T12:55:00Z
12
value 0.00024
scoring_system epss
scoring_elements 0.06371
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-33655
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2108691
reference_id 2108691
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2108691
13
reference_url https://security.archlinux.org/AVG-2772
reference_id AVG-2772
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2772
14
reference_url https://security.archlinux.org/AVG-2773
reference_id AVG-2773
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2773
15
reference_url https://security.archlinux.org/AVG-2774
reference_id AVG-2774
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2774
16
reference_url https://security.archlinux.org/AVG-2775
reference_id AVG-2775
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2775
17
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
18
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
19
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
20
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
21
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
22
reference_url https://usn.ubuntu.com/5577-1/
reference_id USN-5577-1
reference_type
scores
url https://usn.ubuntu.com/5577-1/
23
reference_url https://usn.ubuntu.com/5580-1/
reference_id USN-5580-1
reference_type
scores
url https://usn.ubuntu.com/5580-1/
24
reference_url https://usn.ubuntu.com/5596-1/
reference_id USN-5596-1
reference_type
scores
url https://usn.ubuntu.com/5596-1/
25
reference_url https://usn.ubuntu.com/5621-1/
reference_id USN-5621-1
reference_type
scores
url https://usn.ubuntu.com/5621-1/
26
reference_url https://usn.ubuntu.com/5622-1/
reference_id USN-5622-1
reference_type
scores
url https://usn.ubuntu.com/5622-1/
27
reference_url https://usn.ubuntu.com/5623-1/
reference_id USN-5623-1
reference_type
scores
url https://usn.ubuntu.com/5623-1/
28
reference_url https://usn.ubuntu.com/5624-1/
reference_id USN-5624-1
reference_type
scores
url https://usn.ubuntu.com/5624-1/
29
reference_url https://usn.ubuntu.com/5630-1/
reference_id USN-5630-1
reference_type
scores
url https://usn.ubuntu.com/5630-1/
30
reference_url https://usn.ubuntu.com/5633-1/
reference_id USN-5633-1
reference_type
scores
url https://usn.ubuntu.com/5633-1/
31
reference_url https://usn.ubuntu.com/5635-1/
reference_id USN-5635-1
reference_type
scores
url https://usn.ubuntu.com/5635-1/
32
reference_url https://usn.ubuntu.com/5639-1/
reference_id USN-5639-1
reference_type
scores
url https://usn.ubuntu.com/5639-1/
33
reference_url https://usn.ubuntu.com/5640-1/
reference_id USN-5640-1
reference_type
scores
url https://usn.ubuntu.com/5640-1/
34
reference_url https://usn.ubuntu.com/5644-1/
reference_id USN-5644-1
reference_type
scores
url https://usn.ubuntu.com/5644-1/
35
reference_url https://usn.ubuntu.com/5647-1/
reference_id USN-5647-1
reference_type
scores
url https://usn.ubuntu.com/5647-1/
36
reference_url https://usn.ubuntu.com/5648-1/
reference_id USN-5648-1
reference_type
scores
url https://usn.ubuntu.com/5648-1/
37
reference_url https://usn.ubuntu.com/5650-1/
reference_id USN-5650-1
reference_type
scores
url https://usn.ubuntu.com/5650-1/
38
reference_url https://usn.ubuntu.com/5652-1/
reference_id USN-5652-1
reference_type
scores
url https://usn.ubuntu.com/5652-1/
39
reference_url https://usn.ubuntu.com/5654-1/
reference_id USN-5654-1
reference_type
scores
url https://usn.ubuntu.com/5654-1/
40
reference_url https://usn.ubuntu.com/5655-1/
reference_id USN-5655-1
reference_type
scores
url https://usn.ubuntu.com/5655-1/
41
reference_url https://usn.ubuntu.com/5660-1/
reference_id USN-5660-1
reference_type
scores
url https://usn.ubuntu.com/5660-1/
42
reference_url https://usn.ubuntu.com/5683-1/
reference_id USN-5683-1
reference_type
scores
url https://usn.ubuntu.com/5683-1/
fixed_packages
aliases CVE-2021-33655
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-58sv-d9e3-rfbf
2
url VCID-648j-njzx-rkcf
vulnerability_id VCID-648j-njzx-rkcf
summary kernel: BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42721.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42721.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42721
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.06165
published_at 2026-04-24T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.06151
published_at 2026-04-21T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06661
published_at 2026-04-09T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06547
published_at 2026-04-02T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06653
published_at 2026-04-11T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06618
published_at 2026-04-08T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06557
published_at 2026-04-18T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06564
published_at 2026-04-16T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06584
published_at 2026-04-04T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06568
published_at 2026-04-07T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06637
published_at 2026-04-13T12:55:00Z
11
value 0.00024
scoring_system epss
scoring_elements 0.06645
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42721
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
19
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2134506
reference_id 2134506
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2134506
21
reference_url http://www.openwall.com/lists/oss-security/2022/10/13/5
reference_id 5
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T20:44:52Z/
url http://www.openwall.com/lists/oss-security/2022/10/13/5
22
reference_url https://security.archlinux.org/ASA-202210-1
reference_id ASA-202210-1
reference_type
scores
url https://security.archlinux.org/ASA-202210-1
23
reference_url https://security.archlinux.org/ASA-202210-2
reference_id ASA-202210-2
reference_type
scores
url https://security.archlinux.org/ASA-202210-2
24
reference_url https://security.archlinux.org/ASA-202210-3
reference_id ASA-202210-3
reference_type
scores
url https://security.archlinux.org/ASA-202210-3
25
reference_url https://security.archlinux.org/ASA-202210-4
reference_id ASA-202210-4
reference_type
scores
url https://security.archlinux.org/ASA-202210-4
26
reference_url https://security.archlinux.org/AVG-2800
reference_id AVG-2800
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2800
27
reference_url https://security.archlinux.org/AVG-2801
reference_id AVG-2801
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2801
28
reference_url https://security.archlinux.org/AVG-2802
reference_id AVG-2802
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2802
29
reference_url https://security.archlinux.org/AVG-2803
reference_id AVG-2803
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2803
30
reference_url https://www.debian.org/security/2022/dsa-5257
reference_id dsa-5257
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T20:44:52Z/
url https://www.debian.org/security/2022/dsa-5257
31
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY/
reference_id GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T20:44:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY/
32
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/wireless/wireless.git/commit/?id=bcca852027e5878aec911a347407ecc88d6fff7f
reference_id ?id=bcca852027e5878aec911a347407ecc88d6fff7f
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T20:44:52Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/wireless/wireless.git/commit/?id=bcca852027e5878aec911a347407ecc88d6fff7f
33
reference_url http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html
reference_id Kernel-Live-Patch-Security-Notice-LSN-0090-1.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T20:44:52Z/
url http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html
34
reference_url https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html
reference_id msg00001.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T20:44:52Z/
url https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html
35
reference_url https://security.netapp.com/advisory/ntap-20230203-0008/
reference_id ntap-20230203-0008
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T20:44:52Z/
url https://security.netapp.com/advisory/ntap-20230203-0008/
36
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
37
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
38
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
39
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
40
reference_url https://access.redhat.com/errata/RHSA-2024:1188
reference_id RHSA-2024:1188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1188
41
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2/
reference_id S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T20:44:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2/
42
reference_url https://bugzilla.suse.com/show_bug.cgi?id=1204060
reference_id show_bug.cgi?id=1204060
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T20:44:52Z/
url https://bugzilla.suse.com/show_bug.cgi?id=1204060
43
reference_url https://usn.ubuntu.com/5691-1/
reference_id USN-5691-1
reference_type
scores
url https://usn.ubuntu.com/5691-1/
44
reference_url https://usn.ubuntu.com/5692-1/
reference_id USN-5692-1
reference_type
scores
url https://usn.ubuntu.com/5692-1/
45
reference_url https://usn.ubuntu.com/5693-1/
reference_id USN-5693-1
reference_type
scores
url https://usn.ubuntu.com/5693-1/
46
reference_url https://usn.ubuntu.com/5700-1/
reference_id USN-5700-1
reference_type
scores
url https://usn.ubuntu.com/5700-1/
47
reference_url https://usn.ubuntu.com/5708-1/
reference_id USN-5708-1
reference_type
scores
url https://usn.ubuntu.com/5708-1/
48
reference_url https://usn.ubuntu.com/5752-1/
reference_id USN-5752-1
reference_type
scores
url https://usn.ubuntu.com/5752-1/
49
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR/
reference_id VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T20:44:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR/
fixed_packages
aliases CVE-2022-42721
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-648j-njzx-rkcf
3
url VCID-6jc4-7c8b-4bhv
vulnerability_id VCID-6jc4-7c8b-4bhv
summary kernel: use-after-free caused by invalid pointer hostname in fs/cifs/connect.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1195.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1195.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1195
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04075
published_at 2026-04-02T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04202
published_at 2026-04-24T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04058
published_at 2026-04-16T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.04069
published_at 2026-04-18T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.0419
published_at 2026-04-21T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.04093
published_at 2026-04-04T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.04108
published_at 2026-04-07T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.04113
published_at 2026-04-08T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.04132
published_at 2026-04-09T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.04116
published_at 2026-04-11T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.04102
published_at 2026-04-12T12:55:00Z
11
value 0.00017
scoring_system epss
scoring_elements 0.04076
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1195
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/torvalds/linux/commit/153695d36ead0ccc4d0256953c751cabf673e621
reference_id 153695d36ead0ccc4d0256953c751cabf673e621
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:57Z/
url https://github.com/torvalds/linux/commit/153695d36ead0ccc4d0256953c751cabf673e621
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2154171
reference_id 2154171
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2154171
5
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
6
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
7
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
8
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
9
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
10
reference_url https://access.redhat.com/errata/RHSA-2024:0431
reference_id RHSA-2024:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0431
11
reference_url https://access.redhat.com/errata/RHSA-2024:0432
reference_id RHSA-2024:0432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0432
12
reference_url https://usn.ubuntu.com/5970-1/
reference_id USN-5970-1
reference_type
scores
url https://usn.ubuntu.com/5970-1/
13
reference_url https://usn.ubuntu.com/5979-1/
reference_id USN-5979-1
reference_type
scores
url https://usn.ubuntu.com/5979-1/
fixed_packages
aliases CVE-2023-1195
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6jc4-7c8b-4bhv
4
url VCID-7e2m-a86y-c3bd
vulnerability_id VCID-7e2m-a86y-c3bd
summary kernel: media: em28xx: initialize refcount before kref_get
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3239.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3239.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3239
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07549
published_at 2026-04-24T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07568
published_at 2026-04-11T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07554
published_at 2026-04-12T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07542
published_at 2026-04-13T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07455
published_at 2026-04-18T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07588
published_at 2026-04-21T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07466
published_at 2026-04-16T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07505
published_at 2026-04-04T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07487
published_at 2026-04-07T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07546
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3239
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3239
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3239
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2127985
reference_id 2127985
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2127985
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
10
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
11
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
12
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
13
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
14
reference_url https://usn.ubuntu.com/5757-1/
reference_id USN-5757-1
reference_type
scores
url https://usn.ubuntu.com/5757-1/
15
reference_url https://usn.ubuntu.com/5757-2/
reference_id USN-5757-2
reference_type
scores
url https://usn.ubuntu.com/5757-2/
16
reference_url https://usn.ubuntu.com/5758-1/
reference_id USN-5758-1
reference_type
scores
url https://usn.ubuntu.com/5758-1/
17
reference_url https://usn.ubuntu.com/5774-1/
reference_id USN-5774-1
reference_type
scores
url https://usn.ubuntu.com/5774-1/
fixed_packages
aliases CVE-2022-3239
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7e2m-a86y-c3bd
5
url VCID-8ekj-2sge-5kd2
vulnerability_id VCID-8ekj-2sge-5kd2
summary kernel: KVM: NULL pointer dereference in kvm_mmu_invpcid_gva
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1789.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1789.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1789
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04217
published_at 2026-04-01T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04417
published_at 2026-04-24T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04312
published_at 2026-04-12T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.04291
published_at 2026-04-13T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.04262
published_at 2026-04-16T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.04271
published_at 2026-04-18T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.04397
published_at 2026-04-21T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.04255
published_at 2026-04-02T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.04275
published_at 2026-04-04T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.04287
published_at 2026-04-07T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.04319
published_at 2026-04-08T12:55:00Z
11
value 0.00017
scoring_system epss
scoring_elements 0.04334
published_at 2026-04-09T12:55:00Z
12
value 0.00017
scoring_system epss
scoring_elements 0.04326
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1789
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2090723
reference_id 2090723
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2090723
17
reference_url https://security.archlinux.org/AVG-2772
reference_id AVG-2772
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2772
18
reference_url https://security.archlinux.org/AVG-2773
reference_id AVG-2773
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2773
19
reference_url https://security.archlinux.org/AVG-2774
reference_id AVG-2774
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2774
20
reference_url https://security.archlinux.org/AVG-2775
reference_id AVG-2775
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2775
21
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
22
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
23
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
24
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
25
reference_url https://access.redhat.com/errata/RHSA-2024:4447
reference_id RHSA-2024:4447
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4447
26
reference_url https://usn.ubuntu.com/5514-1/
reference_id USN-5514-1
reference_type
scores
url https://usn.ubuntu.com/5514-1/
27
reference_url https://usn.ubuntu.com/5518-1/
reference_id USN-5518-1
reference_type
scores
url https://usn.ubuntu.com/5518-1/
28
reference_url https://usn.ubuntu.com/5529-1/
reference_id USN-5529-1
reference_type
scores
url https://usn.ubuntu.com/5529-1/
29
reference_url https://usn.ubuntu.com/5539-1/
reference_id USN-5539-1
reference_type
scores
url https://usn.ubuntu.com/5539-1/
30
reference_url https://usn.ubuntu.com/5564-1/
reference_id USN-5564-1
reference_type
scores
url https://usn.ubuntu.com/5564-1/
fixed_packages
aliases CVE-2022-1789
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8ekj-2sge-5kd2
6
url VCID-9nyv-n5f5-ekbf
vulnerability_id VCID-9nyv-n5f5-ekbf
summary kernel: memory leak in ipv6_renew_options()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3524.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3524.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3524
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.18819
published_at 2026-04-24T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.18951
published_at 2026-04-13T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.18905
published_at 2026-04-16T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.18918
published_at 2026-04-18T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.18929
published_at 2026-04-21T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.1914
published_at 2026-04-02T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.19192
published_at 2026-04-04T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.18909
published_at 2026-04-07T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.18988
published_at 2026-04-08T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.19042
published_at 2026-04-09T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.19049
published_at 2026-04-11T12:55:00Z
11
value 0.00061
scoring_system epss
scoring_elements 0.19003
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3524
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3524
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2150947
reference_id 2150947
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2150947
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
9
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
10
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
11
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
12
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
13
reference_url https://usn.ubuntu.com/5754-1/
reference_id USN-5754-1
reference_type
scores
url https://usn.ubuntu.com/5754-1/
14
reference_url https://usn.ubuntu.com/5754-2/
reference_id USN-5754-2
reference_type
scores
url https://usn.ubuntu.com/5754-2/
15
reference_url https://usn.ubuntu.com/5755-1/
reference_id USN-5755-1
reference_type
scores
url https://usn.ubuntu.com/5755-1/
16
reference_url https://usn.ubuntu.com/5755-2/
reference_id USN-5755-2
reference_type
scores
url https://usn.ubuntu.com/5755-2/
17
reference_url https://usn.ubuntu.com/5756-1/
reference_id USN-5756-1
reference_type
scores
url https://usn.ubuntu.com/5756-1/
18
reference_url https://usn.ubuntu.com/5756-2/
reference_id USN-5756-2
reference_type
scores
url https://usn.ubuntu.com/5756-2/
19
reference_url https://usn.ubuntu.com/5756-3/
reference_id USN-5756-3
reference_type
scores
url https://usn.ubuntu.com/5756-3/
20
reference_url https://usn.ubuntu.com/5757-1/
reference_id USN-5757-1
reference_type
scores
url https://usn.ubuntu.com/5757-1/
21
reference_url https://usn.ubuntu.com/5757-2/
reference_id USN-5757-2
reference_type
scores
url https://usn.ubuntu.com/5757-2/
22
reference_url https://usn.ubuntu.com/5758-1/
reference_id USN-5758-1
reference_type
scores
url https://usn.ubuntu.com/5758-1/
23
reference_url https://usn.ubuntu.com/5773-1/
reference_id USN-5773-1
reference_type
scores
url https://usn.ubuntu.com/5773-1/
24
reference_url https://usn.ubuntu.com/5774-1/
reference_id USN-5774-1
reference_type
scores
url https://usn.ubuntu.com/5774-1/
25
reference_url https://usn.ubuntu.com/5779-1/
reference_id USN-5779-1
reference_type
scores
url https://usn.ubuntu.com/5779-1/
26
reference_url https://usn.ubuntu.com/5780-1/
reference_id USN-5780-1
reference_type
scores
url https://usn.ubuntu.com/5780-1/
27
reference_url https://usn.ubuntu.com/5789-1/
reference_id USN-5789-1
reference_type
scores
url https://usn.ubuntu.com/5789-1/
fixed_packages
aliases CVE-2022-3524
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9nyv-n5f5-ekbf
7
url VCID-bpkg-a38v-53dv
vulnerability_id VCID-bpkg-a38v-53dv
summary kernel: igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-20141.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-20141.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-20141
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.05773
published_at 2026-04-01T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.05806
published_at 2026-04-02T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.05842
published_at 2026-04-04T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.05836
published_at 2026-04-07T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.05875
published_at 2026-04-08T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.05902
published_at 2026-04-09T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.05882
published_at 2026-04-11T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.05873
published_at 2026-04-12T12:55:00Z
8
value 0.00022
scoring_system epss
scoring_elements 0.05865
published_at 2026-04-13T12:55:00Z
9
value 0.00022
scoring_system epss
scoring_elements 0.0583
published_at 2026-04-16T12:55:00Z
10
value 0.00022
scoring_system epss
scoring_elements 0.05841
published_at 2026-04-18T12:55:00Z
11
value 0.00022
scoring_system epss
scoring_elements 0.05995
published_at 2026-04-21T12:55:00Z
12
value 0.00022
scoring_system epss
scoring_elements 0.06026
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-20141
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20141
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20141
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2114937
reference_id 2114937
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2114937
5
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
6
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
7
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
8
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
9
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
10
reference_url https://usn.ubuntu.com/5540-1/
reference_id USN-5540-1
reference_type
scores
url https://usn.ubuntu.com/5540-1/
fixed_packages
aliases CVE-2022-20141
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bpkg-a38v-53dv
8
url VCID-ckqp-r5m2-j3fx
vulnerability_id VCID-ckqp-r5m2-j3fx
summary kernel: data races around sk->sk_prot
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3567.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3567.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3567
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06395
published_at 2026-04-07T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.0641
published_at 2026-04-18T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.064
published_at 2026-04-16T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06463
published_at 2026-04-13T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06475
published_at 2026-04-12T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06481
published_at 2026-04-11T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06443
published_at 2026-04-08T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06487
published_at 2026-04-09T12:55:00Z
8
value 0.00025
scoring_system epss
scoring_elements 0.068
published_at 2026-04-24T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.06615
published_at 2026-04-02T12:55:00Z
10
value 0.00025
scoring_system epss
scoring_elements 0.06659
published_at 2026-04-04T12:55:00Z
11
value 0.00025
scoring_system epss
scoring_elements 0.06792
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3567
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3567
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2143943
reference_id 2143943
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2143943
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://vuldb.com/?id.211090
reference_id ?id.211090
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:29Z/
url https://vuldb.com/?id.211090
10
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=364f997b5cfe1db0d63a390fe7c801fa2b3115f6
reference_id ?id=364f997b5cfe1db0d63a390fe7c801fa2b3115f6
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:29Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=364f997b5cfe1db0d63a390fe7c801fa2b3115f6
11
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
12
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
13
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
14
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
15
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
16
reference_url https://usn.ubuntu.com/5754-1/
reference_id USN-5754-1
reference_type
scores
url https://usn.ubuntu.com/5754-1/
17
reference_url https://usn.ubuntu.com/5754-2/
reference_id USN-5754-2
reference_type
scores
url https://usn.ubuntu.com/5754-2/
18
reference_url https://usn.ubuntu.com/5755-1/
reference_id USN-5755-1
reference_type
scores
url https://usn.ubuntu.com/5755-1/
19
reference_url https://usn.ubuntu.com/5755-2/
reference_id USN-5755-2
reference_type
scores
url https://usn.ubuntu.com/5755-2/
20
reference_url https://usn.ubuntu.com/5756-1/
reference_id USN-5756-1
reference_type
scores
url https://usn.ubuntu.com/5756-1/
21
reference_url https://usn.ubuntu.com/5756-2/
reference_id USN-5756-2
reference_type
scores
url https://usn.ubuntu.com/5756-2/
22
reference_url https://usn.ubuntu.com/5756-3/
reference_id USN-5756-3
reference_type
scores
url https://usn.ubuntu.com/5756-3/
23
reference_url https://usn.ubuntu.com/5757-1/
reference_id USN-5757-1
reference_type
scores
url https://usn.ubuntu.com/5757-1/
24
reference_url https://usn.ubuntu.com/5757-2/
reference_id USN-5757-2
reference_type
scores
url https://usn.ubuntu.com/5757-2/
25
reference_url https://usn.ubuntu.com/5758-1/
reference_id USN-5758-1
reference_type
scores
url https://usn.ubuntu.com/5758-1/
26
reference_url https://usn.ubuntu.com/5773-1/
reference_id USN-5773-1
reference_type
scores
url https://usn.ubuntu.com/5773-1/
27
reference_url https://usn.ubuntu.com/5774-1/
reference_id USN-5774-1
reference_type
scores
url https://usn.ubuntu.com/5774-1/
28
reference_url https://usn.ubuntu.com/5779-1/
reference_id USN-5779-1
reference_type
scores
url https://usn.ubuntu.com/5779-1/
29
reference_url https://usn.ubuntu.com/5789-1/
reference_id USN-5789-1
reference_type
scores
url https://usn.ubuntu.com/5789-1/
30
reference_url https://usn.ubuntu.com/5914-1/
reference_id USN-5914-1
reference_type
scores
url https://usn.ubuntu.com/5914-1/
fixed_packages
aliases CVE-2022-3567
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ckqp-r5m2-j3fx
9
url VCID-d14e-jv1a-w7d3
vulnerability_id VCID-d14e-jv1a-w7d3
summary kernel: memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3619.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3619.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3619
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07596
published_at 2026-04-24T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07606
published_at 2026-04-08T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07625
published_at 2026-04-09T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07624
published_at 2026-04-11T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07611
published_at 2026-04-12T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07597
published_at 2026-04-13T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07521
published_at 2026-04-16T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.0751
published_at 2026-04-18T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07649
published_at 2026-04-21T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.0753
published_at 2026-04-02T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.0757
published_at 2026-04-04T12:55:00Z
11
value 0.00027
scoring_system epss
scoring_elements 0.07547
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3619
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2154235
reference_id 2154235
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2154235
4
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
5
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
6
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
7
reference_url https://vuldb.com/?id.211918
reference_id ?id.211918
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T16:59:20Z/
url https://vuldb.com/?id.211918
8
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=97097c85c088e11651146da32a4e1cdb9dfa6193
reference_id ?id=97097c85c088e11651146da32a4e1cdb9dfa6193
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T16:59:20Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=97097c85c088e11651146da32a4e1cdb9dfa6193
9
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
10
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
11
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
12
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
13
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
14
reference_url https://usn.ubuntu.com/5780-1/
reference_id USN-5780-1
reference_type
scores
url https://usn.ubuntu.com/5780-1/
15
reference_url https://usn.ubuntu.com/5850-1/
reference_id USN-5850-1
reference_type
scores
url https://usn.ubuntu.com/5850-1/
16
reference_url https://usn.ubuntu.com/5851-1/
reference_id USN-5851-1
reference_type
scores
url https://usn.ubuntu.com/5851-1/
17
reference_url https://usn.ubuntu.com/5860-1/
reference_id USN-5860-1
reference_type
scores
url https://usn.ubuntu.com/5860-1/
18
reference_url https://usn.ubuntu.com/5876-1/
reference_id USN-5876-1
reference_type
scores
url https://usn.ubuntu.com/5876-1/
19
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
20
reference_url https://usn.ubuntu.com/5878-1/
reference_id USN-5878-1
reference_type
scores
url https://usn.ubuntu.com/5878-1/
21
reference_url https://usn.ubuntu.com/5879-1/
reference_id USN-5879-1
reference_type
scores
url https://usn.ubuntu.com/5879-1/
fixed_packages
aliases CVE-2022-3619
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d14e-jv1a-w7d3
10
url VCID-dqhd-grev-t3ge
vulnerability_id VCID-dqhd-grev-t3ge
summary kernel: use-after-free related to leaf anon_vma double reuse
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42703.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42703.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42703
reference_id
reference_type
scores
0
value 0.00985
scoring_system epss
scoring_elements 0.76899
published_at 2026-04-24T12:55:00Z
1
value 0.00985
scoring_system epss
scoring_elements 0.76833
published_at 2026-04-12T12:55:00Z
2
value 0.00985
scoring_system epss
scoring_elements 0.76827
published_at 2026-04-13T12:55:00Z
3
value 0.00985
scoring_system epss
scoring_elements 0.7687
published_at 2026-04-16T12:55:00Z
4
value 0.00985
scoring_system epss
scoring_elements 0.76875
published_at 2026-04-18T12:55:00Z
5
value 0.00985
scoring_system epss
scoring_elements 0.76866
published_at 2026-04-21T12:55:00Z
6
value 0.00985
scoring_system epss
scoring_elements 0.76773
published_at 2026-04-02T12:55:00Z
7
value 0.00985
scoring_system epss
scoring_elements 0.76802
published_at 2026-04-04T12:55:00Z
8
value 0.00985
scoring_system epss
scoring_elements 0.76783
published_at 2026-04-07T12:55:00Z
9
value 0.00985
scoring_system epss
scoring_elements 0.76814
published_at 2026-04-08T12:55:00Z
10
value 0.00985
scoring_system epss
scoring_elements 0.76824
published_at 2026-04-09T12:55:00Z
11
value 0.00985
scoring_system epss
scoring_elements 0.76853
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42703
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42703
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42703
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2133483
reference_id 2133483
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2133483
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://access.redhat.com/errata/RHSA-2023:1091
reference_id RHSA-2023:1091
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1091
10
reference_url https://access.redhat.com/errata/RHSA-2023:1092
reference_id RHSA-2023:1092
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1092
11
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
12
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
13
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
14
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
15
reference_url https://access.redhat.com/errata/RHSA-2023:3388
reference_id RHSA-2023:3388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3388
16
reference_url https://access.redhat.com/errata/RHSA-2023:4137
reference_id RHSA-2023:4137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4137
17
reference_url https://access.redhat.com/errata/RHSA-2023:4138
reference_id RHSA-2023:4138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4138
18
reference_url https://usn.ubuntu.com/5728-1/
reference_id USN-5728-1
reference_type
scores
url https://usn.ubuntu.com/5728-1/
19
reference_url https://usn.ubuntu.com/5728-2/
reference_id USN-5728-2
reference_type
scores
url https://usn.ubuntu.com/5728-2/
20
reference_url https://usn.ubuntu.com/5728-3/
reference_id USN-5728-3
reference_type
scores
url https://usn.ubuntu.com/5728-3/
21
reference_url https://usn.ubuntu.com/5755-1/
reference_id USN-5755-1
reference_type
scores
url https://usn.ubuntu.com/5755-1/
22
reference_url https://usn.ubuntu.com/5755-2/
reference_id USN-5755-2
reference_type
scores
url https://usn.ubuntu.com/5755-2/
23
reference_url https://usn.ubuntu.com/5756-1/
reference_id USN-5756-1
reference_type
scores
url https://usn.ubuntu.com/5756-1/
24
reference_url https://usn.ubuntu.com/5756-2/
reference_id USN-5756-2
reference_type
scores
url https://usn.ubuntu.com/5756-2/
25
reference_url https://usn.ubuntu.com/5756-3/
reference_id USN-5756-3
reference_type
scores
url https://usn.ubuntu.com/5756-3/
26
reference_url https://usn.ubuntu.com/5757-1/
reference_id USN-5757-1
reference_type
scores
url https://usn.ubuntu.com/5757-1/
27
reference_url https://usn.ubuntu.com/5757-2/
reference_id USN-5757-2
reference_type
scores
url https://usn.ubuntu.com/5757-2/
28
reference_url https://usn.ubuntu.com/5758-1/
reference_id USN-5758-1
reference_type
scores
url https://usn.ubuntu.com/5758-1/
29
reference_url https://usn.ubuntu.com/5773-1/
reference_id USN-5773-1
reference_type
scores
url https://usn.ubuntu.com/5773-1/
30
reference_url https://usn.ubuntu.com/5774-1/
reference_id USN-5774-1
reference_type
scores
url https://usn.ubuntu.com/5774-1/
31
reference_url https://usn.ubuntu.com/5779-1/
reference_id USN-5779-1
reference_type
scores
url https://usn.ubuntu.com/5779-1/
32
reference_url https://usn.ubuntu.com/5789-1/
reference_id USN-5789-1
reference_type
scores
url https://usn.ubuntu.com/5789-1/
33
reference_url https://usn.ubuntu.com/5916-1/
reference_id USN-5916-1
reference_type
scores
url https://usn.ubuntu.com/5916-1/
fixed_packages
aliases CVE-2022-42703
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dqhd-grev-t3ge
11
url VCID-dqth-c54y-e7fb
vulnerability_id VCID-dqth-c54y-e7fb
summary kernel: data races around icsk->icsk_af_ops in do_ipv6_setsockopt
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3566.json
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3566.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3566
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.06857
published_at 2026-04-07T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.06853
published_at 2026-04-18T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06869
published_at 2026-04-16T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.0693
published_at 2026-04-13T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.06934
published_at 2026-04-12T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.06942
published_at 2026-04-11T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.06912
published_at 2026-04-08T12:55:00Z
7
value 0.00025
scoring_system epss
scoring_elements 0.06943
published_at 2026-04-09T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.07161
published_at 2026-04-24T12:55:00Z
9
value 0.00026
scoring_system epss
scoring_elements 0.07055
published_at 2026-04-02T12:55:00Z
10
value 0.00026
scoring_system epss
scoring_elements 0.07111
published_at 2026-04-04T12:55:00Z
11
value 0.00026
scoring_system epss
scoring_elements 0.07191
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3566
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3566
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2143893
reference_id 2143893
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2143893
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://vuldb.com/?id.211089
reference_id ?id.211089
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:33Z/
url https://vuldb.com/?id.211089
10
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57
reference_id ?id=f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:33Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57
11
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
12
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
13
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
14
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
15
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
16
reference_url https://usn.ubuntu.com/5754-1/
reference_id USN-5754-1
reference_type
scores
url https://usn.ubuntu.com/5754-1/
17
reference_url https://usn.ubuntu.com/5754-2/
reference_id USN-5754-2
reference_type
scores
url https://usn.ubuntu.com/5754-2/
18
reference_url https://usn.ubuntu.com/5755-1/
reference_id USN-5755-1
reference_type
scores
url https://usn.ubuntu.com/5755-1/
19
reference_url https://usn.ubuntu.com/5755-2/
reference_id USN-5755-2
reference_type
scores
url https://usn.ubuntu.com/5755-2/
20
reference_url https://usn.ubuntu.com/5756-1/
reference_id USN-5756-1
reference_type
scores
url https://usn.ubuntu.com/5756-1/
21
reference_url https://usn.ubuntu.com/5756-2/
reference_id USN-5756-2
reference_type
scores
url https://usn.ubuntu.com/5756-2/
22
reference_url https://usn.ubuntu.com/5756-3/
reference_id USN-5756-3
reference_type
scores
url https://usn.ubuntu.com/5756-3/
23
reference_url https://usn.ubuntu.com/5757-1/
reference_id USN-5757-1
reference_type
scores
url https://usn.ubuntu.com/5757-1/
24
reference_url https://usn.ubuntu.com/5757-2/
reference_id USN-5757-2
reference_type
scores
url https://usn.ubuntu.com/5757-2/
25
reference_url https://usn.ubuntu.com/5758-1/
reference_id USN-5758-1
reference_type
scores
url https://usn.ubuntu.com/5758-1/
26
reference_url https://usn.ubuntu.com/5773-1/
reference_id USN-5773-1
reference_type
scores
url https://usn.ubuntu.com/5773-1/
27
reference_url https://usn.ubuntu.com/5774-1/
reference_id USN-5774-1
reference_type
scores
url https://usn.ubuntu.com/5774-1/
28
reference_url https://usn.ubuntu.com/5779-1/
reference_id USN-5779-1
reference_type
scores
url https://usn.ubuntu.com/5779-1/
29
reference_url https://usn.ubuntu.com/5789-1/
reference_id USN-5789-1
reference_type
scores
url https://usn.ubuntu.com/5789-1/
fixed_packages
aliases CVE-2022-3566
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dqth-c54y-e7fb
12
url VCID-ejj4-yt8j-c7fm
vulnerability_id VCID-ejj4-yt8j-c7fm
summary kernel: race condition in xfrm_probe_algs can lead to OOB read/write
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3028.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3028.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3028
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01263
published_at 2026-04-24T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01259
published_at 2026-04-21T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.02056
published_at 2026-04-13T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02045
published_at 2026-04-18T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02032
published_at 2026-04-16T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02077
published_at 2026-04-02T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02084
published_at 2026-04-04T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02078
published_at 2026-04-07T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.0208
published_at 2026-04-08T12:55:00Z
9
value 0.00013
scoring_system epss
scoring_elements 0.02098
published_at 2026-04-09T12:55:00Z
10
value 0.00013
scoring_system epss
scoring_elements 0.02075
published_at 2026-04-11T12:55:00Z
11
value 0.00013
scoring_system epss
scoring_elements 0.0206
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3028
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3028
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2122228
reference_id 2122228
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2122228
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
10
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
11
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
12
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
13
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
14
reference_url https://usn.ubuntu.com/5650-1/
reference_id USN-5650-1
reference_type
scores
url https://usn.ubuntu.com/5650-1/
15
reference_url https://usn.ubuntu.com/5693-1/
reference_id USN-5693-1
reference_type
scores
url https://usn.ubuntu.com/5693-1/
16
reference_url https://usn.ubuntu.com/5727-1/
reference_id USN-5727-1
reference_type
scores
url https://usn.ubuntu.com/5727-1/
17
reference_url https://usn.ubuntu.com/5727-2/
reference_id USN-5727-2
reference_type
scores
url https://usn.ubuntu.com/5727-2/
18
reference_url https://usn.ubuntu.com/5728-1/
reference_id USN-5728-1
reference_type
scores
url https://usn.ubuntu.com/5728-1/
19
reference_url https://usn.ubuntu.com/5728-2/
reference_id USN-5728-2
reference_type
scores
url https://usn.ubuntu.com/5728-2/
20
reference_url https://usn.ubuntu.com/5728-3/
reference_id USN-5728-3
reference_type
scores
url https://usn.ubuntu.com/5728-3/
21
reference_url https://usn.ubuntu.com/5729-1/
reference_id USN-5729-1
reference_type
scores
url https://usn.ubuntu.com/5729-1/
22
reference_url https://usn.ubuntu.com/5729-2/
reference_id USN-5729-2
reference_type
scores
url https://usn.ubuntu.com/5729-2/
23
reference_url https://usn.ubuntu.com/5774-1/
reference_id USN-5774-1
reference_type
scores
url https://usn.ubuntu.com/5774-1/
fixed_packages
aliases CVE-2022-3028
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ejj4-yt8j-c7fm
13
url VCID-ezb4-x5pv-myhe
vulnerability_id VCID-ezb4-x5pv-myhe
summary hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26341.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26341.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-26341
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.15515
published_at 2026-04-01T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.15558
published_at 2026-04-02T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15626
published_at 2026-04-04T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15425
published_at 2026-04-07T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.15513
published_at 2026-04-08T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15563
published_at 2026-04-09T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15526
published_at 2026-04-11T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15489
published_at 2026-04-12T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15422
published_at 2026-04-13T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.15343
published_at 2026-04-16T12:55:00Z
10
value 0.0005
scoring_system epss
scoring_elements 0.15348
published_at 2026-04-18T12:55:00Z
11
value 0.0005
scoring_system epss
scoring_elements 0.15399
published_at 2026-04-21T12:55:00Z
12
value 0.0005
scoring_system epss
scoring_elements 0.15444
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-26341
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2061703
reference_id 2061703
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2061703
4
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
5
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
6
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
7
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
8
reference_url https://access.redhat.com/errata/RHSA-2024:1877
reference_id RHSA-2024:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1877
fixed_packages
aliases CVE-2021-26341
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ezb4-x5pv-myhe
14
url VCID-g2k9-eds7-6qe3
vulnerability_id VCID-g2k9-eds7-6qe3
summary kernel: memory corruption in usbmon driver
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43750.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43750.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-43750
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.19108
published_at 2026-04-21T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.19101
published_at 2026-04-18T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19091
published_at 2026-04-16T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.19133
published_at 2026-04-13T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.19187
published_at 2026-04-12T12:55:00Z
5
value 0.00069
scoring_system epss
scoring_elements 0.21309
published_at 2026-04-11T12:55:00Z
6
value 0.00069
scoring_system epss
scoring_elements 0.21138
published_at 2026-04-24T12:55:00Z
7
value 0.00069
scoring_system epss
scoring_elements 0.21351
published_at 2026-04-02T12:55:00Z
8
value 0.00069
scoring_system epss
scoring_elements 0.21406
published_at 2026-04-04T12:55:00Z
9
value 0.00069
scoring_system epss
scoring_elements 0.21158
published_at 2026-04-07T12:55:00Z
10
value 0.00069
scoring_system epss
scoring_elements 0.21237
published_at 2026-04-08T12:55:00Z
11
value 0.00069
scoring_system epss
scoring_elements 0.21299
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-43750
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43750
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2151270
reference_id 2151270
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2151270
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://access.redhat.com/errata/RHSA-2023:1987
reference_id RHSA-2023:1987
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1987
10
reference_url https://access.redhat.com/errata/RHSA-2023:1988
reference_id RHSA-2023:1988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1988
11
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
12
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
13
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
14
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
15
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
16
reference_url https://usn.ubuntu.com/5758-1/
reference_id USN-5758-1
reference_type
scores
url https://usn.ubuntu.com/5758-1/
17
reference_url https://usn.ubuntu.com/5791-1/
reference_id USN-5791-1
reference_type
scores
url https://usn.ubuntu.com/5791-1/
18
reference_url https://usn.ubuntu.com/5791-2/
reference_id USN-5791-2
reference_type
scores
url https://usn.ubuntu.com/5791-2/
19
reference_url https://usn.ubuntu.com/5791-3/
reference_id USN-5791-3
reference_type
scores
url https://usn.ubuntu.com/5791-3/
20
reference_url https://usn.ubuntu.com/5792-1/
reference_id USN-5792-1
reference_type
scores
url https://usn.ubuntu.com/5792-1/
21
reference_url https://usn.ubuntu.com/5792-2/
reference_id USN-5792-2
reference_type
scores
url https://usn.ubuntu.com/5792-2/
22
reference_url https://usn.ubuntu.com/5793-1/
reference_id USN-5793-1
reference_type
scores
url https://usn.ubuntu.com/5793-1/
23
reference_url https://usn.ubuntu.com/5793-2/
reference_id USN-5793-2
reference_type
scores
url https://usn.ubuntu.com/5793-2/
24
reference_url https://usn.ubuntu.com/5793-3/
reference_id USN-5793-3
reference_type
scores
url https://usn.ubuntu.com/5793-3/
25
reference_url https://usn.ubuntu.com/5793-4/
reference_id USN-5793-4
reference_type
scores
url https://usn.ubuntu.com/5793-4/
26
reference_url https://usn.ubuntu.com/5815-1/
reference_id USN-5815-1
reference_type
scores
url https://usn.ubuntu.com/5815-1/
27
reference_url https://usn.ubuntu.com/5854-1/
reference_id USN-5854-1
reference_type
scores
url https://usn.ubuntu.com/5854-1/
28
reference_url https://usn.ubuntu.com/5861-1/
reference_id USN-5861-1
reference_type
scores
url https://usn.ubuntu.com/5861-1/
29
reference_url https://usn.ubuntu.com/5862-1/
reference_id USN-5862-1
reference_type
scores
url https://usn.ubuntu.com/5862-1/
30
reference_url https://usn.ubuntu.com/5865-1/
reference_id USN-5865-1
reference_type
scores
url https://usn.ubuntu.com/5865-1/
31
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
32
reference_url https://usn.ubuntu.com/5883-1/
reference_id USN-5883-1
reference_type
scores
url https://usn.ubuntu.com/5883-1/
33
reference_url https://usn.ubuntu.com/5913-1/
reference_id USN-5913-1
reference_type
scores
url https://usn.ubuntu.com/5913-1/
34
reference_url https://usn.ubuntu.com/5919-1/
reference_id USN-5919-1
reference_type
scores
url https://usn.ubuntu.com/5919-1/
35
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
36
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
37
reference_url https://usn.ubuntu.com/6007-1/
reference_id USN-6007-1
reference_type
scores
url https://usn.ubuntu.com/6007-1/
fixed_packages
aliases CVE-2022-43750
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g2k9-eds7-6qe3
15
url VCID-ge37-2by5-yudu
vulnerability_id VCID-ge37-2by5-yudu
summary kernel: use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1679.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1679.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1679
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.13928
published_at 2026-04-01T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.14011
published_at 2026-04-02T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.14065
published_at 2026-04-04T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13869
published_at 2026-04-07T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13953
published_at 2026-04-08T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.14006
published_at 2026-04-09T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13962
published_at 2026-04-11T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13926
published_at 2026-04-12T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.13876
published_at 2026-04-13T12:55:00Z
9
value 0.00045
scoring_system epss
scoring_elements 0.13783
published_at 2026-04-16T12:55:00Z
10
value 0.00045
scoring_system epss
scoring_elements 0.13778
published_at 2026-04-18T12:55:00Z
11
value 0.00045
scoring_system epss
scoring_elements 0.13853
published_at 2026-04-21T12:55:00Z
12
value 0.00045
scoring_system epss
scoring_elements 0.13878
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1679
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1679
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1679
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2084125
reference_id 2084125
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2084125
5
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
7
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
8
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
9
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
10
reference_url https://usn.ubuntu.com/5500-1/
reference_id USN-5500-1
reference_type
scores
url https://usn.ubuntu.com/5500-1/
11
reference_url https://usn.ubuntu.com/5505-1/
reference_id USN-5505-1
reference_type
scores
url https://usn.ubuntu.com/5505-1/
12
reference_url https://usn.ubuntu.com/5513-1/
reference_id USN-5513-1
reference_type
scores
url https://usn.ubuntu.com/5513-1/
13
reference_url https://usn.ubuntu.com/5517-1/
reference_id USN-5517-1
reference_type
scores
url https://usn.ubuntu.com/5517-1/
14
reference_url https://usn.ubuntu.com/5529-1/
reference_id USN-5529-1
reference_type
scores
url https://usn.ubuntu.com/5529-1/
15
reference_url https://usn.ubuntu.com/5544-1/
reference_id USN-5544-1
reference_type
scores
url https://usn.ubuntu.com/5544-1/
16
reference_url https://usn.ubuntu.com/5560-1/
reference_id USN-5560-1
reference_type
scores
url https://usn.ubuntu.com/5560-1/
17
reference_url https://usn.ubuntu.com/5560-2/
reference_id USN-5560-2
reference_type
scores
url https://usn.ubuntu.com/5560-2/
18
reference_url https://usn.ubuntu.com/5562-1/
reference_id USN-5562-1
reference_type
scores
url https://usn.ubuntu.com/5562-1/
19
reference_url https://usn.ubuntu.com/5564-1/
reference_id USN-5564-1
reference_type
scores
url https://usn.ubuntu.com/5564-1/
20
reference_url https://usn.ubuntu.com/5566-1/
reference_id USN-5566-1
reference_type
scores
url https://usn.ubuntu.com/5566-1/
21
reference_url https://usn.ubuntu.com/5582-1/
reference_id USN-5582-1
reference_type
scores
url https://usn.ubuntu.com/5582-1/
fixed_packages
aliases CVE-2022-1679
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ge37-2by5-yudu
16
url VCID-guqa-19j6-bba4
vulnerability_id VCID-guqa-19j6-bba4
summary kernel: scsi: mpt3sas: Fix use-after-free warning
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48695.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48695.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-48695
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04582
published_at 2026-04-02T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04769
published_at 2026-04-24T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04602
published_at 2026-04-04T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04609
published_at 2026-04-13T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04644
published_at 2026-04-08T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04659
published_at 2026-04-09T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04654
published_at 2026-04-11T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04636
published_at 2026-04-12T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04585
published_at 2026-04-16T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.04594
published_at 2026-04-18T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04732
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-48695
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48695
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2278999
reference_id 2278999
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2278999
5
reference_url https://git.kernel.org/stable/c/41acb064c4e013808bc7d5fc1b506fa449425b0b
reference_id 41acb064c4e013808bc7d5fc1b506fa449425b0b
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:45Z/
url https://git.kernel.org/stable/c/41acb064c4e013808bc7d5fc1b506fa449425b0b
6
reference_url https://git.kernel.org/stable/c/5682c94644fde72f72bded6580c38189ffc856b5
reference_id 5682c94644fde72f72bded6580c38189ffc856b5
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:45Z/
url https://git.kernel.org/stable/c/5682c94644fde72f72bded6580c38189ffc856b5
7
reference_url https://git.kernel.org/stable/c/6229fa494a5949be209bc73afbc5d0a749c2e3c7
reference_id 6229fa494a5949be209bc73afbc5d0a749c2e3c7
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:45Z/
url https://git.kernel.org/stable/c/6229fa494a5949be209bc73afbc5d0a749c2e3c7
8
reference_url https://git.kernel.org/stable/c/82efb917eeb27454dc4c6fe26432fc8f6c75bc16
reference_id 82efb917eeb27454dc4c6fe26432fc8f6c75bc16
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:45Z/
url https://git.kernel.org/stable/c/82efb917eeb27454dc4c6fe26432fc8f6c75bc16
9
reference_url https://git.kernel.org/stable/c/991df3dd5144f2e6b1c38b8d20ed3d4d21e20b34
reference_id 991df3dd5144f2e6b1c38b8d20ed3d4d21e20b34
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:45Z/
url https://git.kernel.org/stable/c/991df3dd5144f2e6b1c38b8d20ed3d4d21e20b34
10
reference_url https://git.kernel.org/stable/c/b8fc9e91b931215110ba824d1a2983c5f60b6f82
reference_id b8fc9e91b931215110ba824d1a2983c5f60b6f82
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:45Z/
url https://git.kernel.org/stable/c/b8fc9e91b931215110ba824d1a2983c5f60b6f82
11
reference_url https://git.kernel.org/stable/c/d4959d09b76eb7a4146f5133962b88d3bddb63d6
reference_id d4959d09b76eb7a4146f5133962b88d3bddb63d6
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:45Z/
url https://git.kernel.org/stable/c/d4959d09b76eb7a4146f5133962b88d3bddb63d6
12
reference_url https://git.kernel.org/stable/c/ea10a652ad2ae2cf3eced6f632a5c98f26727057
reference_id ea10a652ad2ae2cf3eced6f632a5c98f26727057
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:45Z/
url https://git.kernel.org/stable/c/ea10a652ad2ae2cf3eced6f632a5c98f26727057
13
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
14
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
15
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
16
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
17
reference_url https://access.redhat.com/errata/RHSA-2024:9500
reference_id RHSA-2024:9500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9500
fixed_packages
aliases CVE-2022-48695
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-guqa-19j6-bba4
17
url VCID-h82m-mnhk-67e2
vulnerability_id VCID-h82m-mnhk-67e2
summary kernel: TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39189.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39189.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-39189
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05267
published_at 2026-04-02T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05468
published_at 2026-04-24T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05299
published_at 2026-04-04T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05325
published_at 2026-04-07T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05358
published_at 2026-04-08T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05382
published_at 2026-04-09T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.0535
published_at 2026-04-11T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05338
published_at 2026-04-12T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05328
published_at 2026-04-13T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.05276
published_at 2026-04-16T12:55:00Z
10
value 0.0002
scoring_system epss
scoring_elements 0.05277
published_at 2026-04-18T12:55:00Z
11
value 0.0002
scoring_system epss
scoring_elements 0.05428
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-39189
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
33
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2124788
reference_id 2124788
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2124788
35
reference_url https://github.com/torvalds/linux/commit/6cd88243c7e03845a450795e134b488fc2afb736
reference_id 6cd88243c7e03845a450795e134b488fc2afb736
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:29:41Z/
url https://github.com/torvalds/linux/commit/6cd88243c7e03845a450795e134b488fc2afb736
36
reference_url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.17
reference_id ChangeLog-5.18.17
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:29:41Z/
url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.17
37
reference_url https://bugs.chromium.org/p/project-zero/issues/detail?id=2309
reference_id detail?id=2309
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:29:41Z/
url https://bugs.chromium.org/p/project-zero/issues/detail?id=2309
38
reference_url https://www.debian.org/security/2023/dsa-5480
reference_id dsa-5480
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:29:41Z/
url https://www.debian.org/security/2023/dsa-5480
39
reference_url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6cd88243c7e03845a450795e134b488fc2afb736
reference_id ?id=6cd88243c7e03845a450795e134b488fc2afb736
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:29:41Z/
url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6cd88243c7e03845a450795e134b488fc2afb736
40
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:29:41Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
41
reference_url https://security.netapp.com/advisory/ntap-20230214-0007/
reference_id ntap-20230214-0007
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:29:41Z/
url https://security.netapp.com/advisory/ntap-20230214-0007/
42
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
43
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
44
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
45
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
46
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
47
reference_url https://usn.ubuntu.com/5667-1/
reference_id USN-5667-1
reference_type
scores
url https://usn.ubuntu.com/5667-1/
48
reference_url https://usn.ubuntu.com/5683-1/
reference_id USN-5683-1
reference_type
scores
url https://usn.ubuntu.com/5683-1/
49
reference_url https://usn.ubuntu.com/5703-1/
reference_id USN-5703-1
reference_type
scores
url https://usn.ubuntu.com/5703-1/
fixed_packages
aliases CVE-2022-39189
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h82m-mnhk-67e2
18
url VCID-jefe-c9nd-ufc1
vulnerability_id VCID-jefe-c9nd-ufc1
summary kernel: USB-accessible buffer overflow in brcmfmac
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3628.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3628.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3628
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.2055
published_at 2026-04-24T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20767
published_at 2026-04-09T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20785
published_at 2026-04-11T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20742
published_at 2026-04-12T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.2069
published_at 2026-04-13T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20675
published_at 2026-04-16T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.20671
published_at 2026-04-18T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20663
published_at 2026-04-21T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20858
published_at 2026-04-02T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20916
published_at 2026-04-04T12:55:00Z
10
value 0.00067
scoring_system epss
scoring_elements 0.2063
published_at 2026-04-07T12:55:00Z
11
value 0.00067
scoring_system epss
scoring_elements 0.20706
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3628
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3628
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2150960
reference_id 2150960
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2150960
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/drivers/net/wireless/broadcom/brcm80211/brcmfmac/fweh.c?id=6788ba8aed4e28e90f72d68a9d794e34eac17295
reference_id fweh.c?id=6788ba8aed4e28e90f72d68a9d794e34eac17295
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-08T14:15:33Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/drivers/net/wireless/broadcom/brcm80211/brcmfmac/fweh.c?id=6788ba8aed4e28e90f72d68a9d794e34eac17295
10
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
11
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
12
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
13
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
14
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
15
reference_url https://usn.ubuntu.com/5780-1/
reference_id USN-5780-1
reference_type
scores
url https://usn.ubuntu.com/5780-1/
16
reference_url https://usn.ubuntu.com/5850-1/
reference_id USN-5850-1
reference_type
scores
url https://usn.ubuntu.com/5850-1/
17
reference_url https://usn.ubuntu.com/5851-1/
reference_id USN-5851-1
reference_type
scores
url https://usn.ubuntu.com/5851-1/
18
reference_url https://usn.ubuntu.com/5853-1/
reference_id USN-5853-1
reference_type
scores
url https://usn.ubuntu.com/5853-1/
19
reference_url https://usn.ubuntu.com/5860-1/
reference_id USN-5860-1
reference_type
scores
url https://usn.ubuntu.com/5860-1/
20
reference_url https://usn.ubuntu.com/5874-1/
reference_id USN-5874-1
reference_type
scores
url https://usn.ubuntu.com/5874-1/
21
reference_url https://usn.ubuntu.com/5875-1/
reference_id USN-5875-1
reference_type
scores
url https://usn.ubuntu.com/5875-1/
22
reference_url https://usn.ubuntu.com/5876-1/
reference_id USN-5876-1
reference_type
scores
url https://usn.ubuntu.com/5876-1/
23
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
24
reference_url https://usn.ubuntu.com/5878-1/
reference_id USN-5878-1
reference_type
scores
url https://usn.ubuntu.com/5878-1/
25
reference_url https://usn.ubuntu.com/5879-1/
reference_id USN-5879-1
reference_type
scores
url https://usn.ubuntu.com/5879-1/
26
reference_url https://usn.ubuntu.com/5883-1/
reference_id USN-5883-1
reference_type
scores
url https://usn.ubuntu.com/5883-1/
27
reference_url https://usn.ubuntu.com/5909-1/
reference_id USN-5909-1
reference_type
scores
url https://usn.ubuntu.com/5909-1/
28
reference_url https://usn.ubuntu.com/5918-1/
reference_id USN-5918-1
reference_type
scores
url https://usn.ubuntu.com/5918-1/
29
reference_url https://usn.ubuntu.com/5919-1/
reference_id USN-5919-1
reference_type
scores
url https://usn.ubuntu.com/5919-1/
30
reference_url https://usn.ubuntu.com/5920-1/
reference_id USN-5920-1
reference_type
scores
url https://usn.ubuntu.com/5920-1/
31
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
32
reference_url https://usn.ubuntu.com/5925-1/
reference_id USN-5925-1
reference_type
scores
url https://usn.ubuntu.com/5925-1/
33
reference_url https://usn.ubuntu.com/5927-1/
reference_id USN-5927-1
reference_type
scores
url https://usn.ubuntu.com/5927-1/
34
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
35
reference_url https://usn.ubuntu.com/5976-1/
reference_id USN-5976-1
reference_type
scores
url https://usn.ubuntu.com/5976-1/
36
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
37
reference_url https://usn.ubuntu.com/6007-1/
reference_id USN-6007-1
reference_type
scores
url https://usn.ubuntu.com/6007-1/
38
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
39
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
fixed_packages
aliases CVE-2022-3628
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jefe-c9nd-ufc1
19
url VCID-jsr8-pv5g-kba8
vulnerability_id VCID-jsr8-pv5g-kba8
summary kernel: u8 overflow problem in cfg80211_update_notlisted_nontrans()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41674.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41674.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-41674
reference_id
reference_type
scores
0
value 0.00471
scoring_system epss
scoring_elements 0.64641
published_at 2026-04-24T12:55:00Z
1
value 0.00471
scoring_system epss
scoring_elements 0.64621
published_at 2026-04-21T12:55:00Z
2
value 0.00511
scoring_system epss
scoring_elements 0.66455
published_at 2026-04-09T12:55:00Z
3
value 0.00511
scoring_system epss
scoring_elements 0.66396
published_at 2026-04-02T12:55:00Z
4
value 0.00511
scoring_system epss
scoring_elements 0.66432
published_at 2026-04-13T12:55:00Z
5
value 0.00511
scoring_system epss
scoring_elements 0.66463
published_at 2026-04-12T12:55:00Z
6
value 0.00511
scoring_system epss
scoring_elements 0.66422
published_at 2026-04-04T12:55:00Z
7
value 0.00511
scoring_system epss
scoring_elements 0.66392
published_at 2026-04-07T12:55:00Z
8
value 0.00511
scoring_system epss
scoring_elements 0.66441
published_at 2026-04-08T12:55:00Z
9
value 0.00511
scoring_system epss
scoring_elements 0.66475
published_at 2026-04-11T12:55:00Z
10
value 0.00511
scoring_system epss
scoring_elements 0.66486
published_at 2026-04-18T12:55:00Z
11
value 0.00511
scoring_system epss
scoring_elements 0.66468
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-41674
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
19
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
20
reference_url http://www.openwall.com/lists/oss-security/2022/10/13/2
reference_id 2
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/
url http://www.openwall.com/lists/oss-security/2022/10/13/2
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2134377
reference_id 2134377
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2134377
22
reference_url https://www.openwall.com/lists/oss-security/2022/10/13/5
reference_id 5
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/
url https://www.openwall.com/lists/oss-security/2022/10/13/5
23
reference_url https://security.archlinux.org/ASA-202210-1
reference_id ASA-202210-1
reference_type
scores
url https://security.archlinux.org/ASA-202210-1
24
reference_url https://security.archlinux.org/ASA-202210-2
reference_id ASA-202210-2
reference_type
scores
url https://security.archlinux.org/ASA-202210-2
25
reference_url https://security.archlinux.org/ASA-202210-3
reference_id ASA-202210-3
reference_type
scores
url https://security.archlinux.org/ASA-202210-3
26
reference_url https://security.archlinux.org/ASA-202210-4
reference_id ASA-202210-4
reference_type
scores
url https://security.archlinux.org/ASA-202210-4
27
reference_url https://security.archlinux.org/AVG-2800
reference_id AVG-2800
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2800
28
reference_url https://security.archlinux.org/AVG-2801
reference_id AVG-2801
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2801
29
reference_url https://security.archlinux.org/AVG-2802
reference_id AVG-2802
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2802
30
reference_url https://security.archlinux.org/AVG-2803
reference_id AVG-2803
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2803
31
reference_url https://www.debian.org/security/2022/dsa-5257
reference_id dsa-5257
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/
url https://www.debian.org/security/2022/dsa-5257
32
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY/
reference_id GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY/
33
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/wireless/wireless.git/commit/?id=aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d
reference_id ?id=aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/wireless/wireless.git/commit/?id=aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d
34
reference_url http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html
reference_id Kernel-Live-Patch-Security-Notice-LSN-0090-1.html
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/
url http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html
35
reference_url https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html
reference_id msg00001.html
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/
url https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html
36
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
37
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
38
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
39
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
40
reference_url https://access.redhat.com/errata/RHSA-2024:1188
reference_id RHSA-2024:1188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1188
41
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2/
reference_id S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2/
42
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/net/mac80211/scan.c
reference_id scan.c
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/net/mac80211/scan.c
43
reference_url https://bugzilla.suse.com/show_bug.cgi?id=1203770
reference_id show_bug.cgi?id=1203770
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/
url https://bugzilla.suse.com/show_bug.cgi?id=1203770
44
reference_url https://usn.ubuntu.com/5691-1/
reference_id USN-5691-1
reference_type
scores
url https://usn.ubuntu.com/5691-1/
45
reference_url https://usn.ubuntu.com/5692-1/
reference_id USN-5692-1
reference_type
scores
url https://usn.ubuntu.com/5692-1/
46
reference_url https://usn.ubuntu.com/5693-1/
reference_id USN-5693-1
reference_type
scores
url https://usn.ubuntu.com/5693-1/
47
reference_url https://usn.ubuntu.com/5700-1/
reference_id USN-5700-1
reference_type
scores
url https://usn.ubuntu.com/5700-1/
48
reference_url https://usn.ubuntu.com/5708-1/
reference_id USN-5708-1
reference_type
scores
url https://usn.ubuntu.com/5708-1/
49
reference_url https://usn.ubuntu.com/5752-1/
reference_id USN-5752-1
reference_type
scores
url https://usn.ubuntu.com/5752-1/
50
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR/
reference_id VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:25:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR/
fixed_packages
aliases CVE-2022-41674
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jsr8-pv5g-kba8
20
url VCID-m26e-r8mc-jbbq
vulnerability_id VCID-m26e-r8mc-jbbq
summary kernel: KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2196.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2196.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2196
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09677
published_at 2026-04-24T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09629
published_at 2026-04-21T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12452
published_at 2026-04-02T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.1238
published_at 2026-04-08T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.1243
published_at 2026-04-09T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.12437
published_at 2026-04-11T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12398
published_at 2026-04-12T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.12358
published_at 2026-04-13T12:55:00Z
8
value 0.00041
scoring_system epss
scoring_elements 0.12259
published_at 2026-04-16T12:55:00Z
9
value 0.00041
scoring_system epss
scoring_elements 0.12258
published_at 2026-04-18T12:55:00Z
10
value 0.00041
scoring_system epss
scoring_elements 0.12496
published_at 2026-04-04T12:55:00Z
11
value 0.00041
scoring_system epss
scoring_elements 0.12301
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2196
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2196
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2160023
reference_id 2160023
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2160023
5
reference_url https://kernel.dance/#2e7eab81425a
reference_id #2e7eab81425a
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-01T15:07:47Z/
url https://kernel.dance/#2e7eab81425a
6
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2e7eab81425ad6c875f2ed47c0ce01e78afc38a5
reference_id ?id=2e7eab81425ad6c875f2ed47c0ce01e78afc38a5
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-01T15:07:47Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2e7eab81425ad6c875f2ed47c0ce01e78afc38a5
7
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-01T15:07:47Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
8
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
9
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
10
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
11
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
12
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
13
reference_url https://usn.ubuntu.com/5970-1/
reference_id USN-5970-1
reference_type
scores
url https://usn.ubuntu.com/5970-1/
14
reference_url https://usn.ubuntu.com/5976-1/
reference_id USN-5976-1
reference_type
scores
url https://usn.ubuntu.com/5976-1/
15
reference_url https://usn.ubuntu.com/5977-1/
reference_id USN-5977-1
reference_type
scores
url https://usn.ubuntu.com/5977-1/
16
reference_url https://usn.ubuntu.com/5978-1/
reference_id USN-5978-1
reference_type
scores
url https://usn.ubuntu.com/5978-1/
17
reference_url https://usn.ubuntu.com/5979-1/
reference_id USN-5979-1
reference_type
scores
url https://usn.ubuntu.com/5979-1/
18
reference_url https://usn.ubuntu.com/5980-1/
reference_id USN-5980-1
reference_type
scores
url https://usn.ubuntu.com/5980-1/
19
reference_url https://usn.ubuntu.com/5982-1/
reference_id USN-5982-1
reference_type
scores
url https://usn.ubuntu.com/5982-1/
20
reference_url https://usn.ubuntu.com/5985-1/
reference_id USN-5985-1
reference_type
scores
url https://usn.ubuntu.com/5985-1/
21
reference_url https://usn.ubuntu.com/5987-1/
reference_id USN-5987-1
reference_type
scores
url https://usn.ubuntu.com/5987-1/
22
reference_url https://usn.ubuntu.com/6004-1/
reference_id USN-6004-1
reference_type
scores
url https://usn.ubuntu.com/6004-1/
23
reference_url https://usn.ubuntu.com/6020-1/
reference_id USN-6020-1
reference_type
scores
url https://usn.ubuntu.com/6020-1/
24
reference_url https://usn.ubuntu.com/6151-1/
reference_id USN-6151-1
reference_type
scores
url https://usn.ubuntu.com/6151-1/
fixed_packages
aliases CVE-2022-2196
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m26e-r8mc-jbbq
21
url VCID-m4wy-164p-qyh7
vulnerability_id VCID-m4wy-164p-qyh7
summary kernel: net/ulp: use-after-free in listening ULP sockets
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0461.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0461.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0461
reference_id
reference_type
scores
0
value 0.00133
scoring_system epss
scoring_elements 0.32927
published_at 2026-04-02T12:55:00Z
1
value 0.00133
scoring_system epss
scoring_elements 0.32963
published_at 2026-04-04T12:55:00Z
2
value 0.00133
scoring_system epss
scoring_elements 0.32784
published_at 2026-04-07T12:55:00Z
3
value 0.00133
scoring_system epss
scoring_elements 0.32832
published_at 2026-04-08T12:55:00Z
4
value 0.00133
scoring_system epss
scoring_elements 0.32861
published_at 2026-04-09T12:55:00Z
5
value 0.00133
scoring_system epss
scoring_elements 0.32862
published_at 2026-04-11T12:55:00Z
6
value 0.00133
scoring_system epss
scoring_elements 0.32823
published_at 2026-04-12T12:55:00Z
7
value 0.00133
scoring_system epss
scoring_elements 0.32798
published_at 2026-04-13T12:55:00Z
8
value 0.00133
scoring_system epss
scoring_elements 0.32841
published_at 2026-04-16T12:55:00Z
9
value 0.00133
scoring_system epss
scoring_elements 0.32818
published_at 2026-04-18T12:55:00Z
10
value 0.00144
scoring_system epss
scoring_elements 0.34683
published_at 2026-04-21T12:55:00Z
11
value 0.00144
scoring_system epss
scoring_elements 0.3445
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0461
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0461
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2176192
reference_id 2176192
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2176192
5
reference_url https://kernel.dance/#2c02d41d71f90a5168391b6a5f2954112ba2307c
reference_id #2c02d41d71f90a5168391b6a5f2954112ba2307c
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-01T15:55:09Z/
url https://kernel.dance/#2c02d41d71f90a5168391b6a5f2954112ba2307c
6
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2c02d41d71f90a5168391b6a5f2954112ba2307c
reference_id ?id=2c02d41d71f90a5168391b6a5f2954112ba2307c
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-01T15:55:09Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2c02d41d71f90a5168391b6a5f2954112ba2307c
7
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-01T15:55:09Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
8
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-01T15:55:09Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
9
reference_url https://access.redhat.com/errata/RHSA-2023:1556
reference_id RHSA-2023:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1556
10
reference_url https://access.redhat.com/errata/RHSA-2023:1557
reference_id RHSA-2023:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1557
11
reference_url https://access.redhat.com/errata/RHSA-2023:1662
reference_id RHSA-2023:1662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1662
12
reference_url https://access.redhat.com/errata/RHSA-2023:1841
reference_id RHSA-2023:1841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1841
13
reference_url https://access.redhat.com/errata/RHSA-2023:1923
reference_id RHSA-2023:1923
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1923
14
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
15
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
16
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
17
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
18
reference_url https://access.redhat.com/errata/RHSA-2023:3190
reference_id RHSA-2023:3190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3190
19
reference_url https://access.redhat.com/errata/RHSA-2023:3191
reference_id RHSA-2023:3191
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3191
20
reference_url https://access.redhat.com/errata/RHSA-2023:3465
reference_id RHSA-2023:3465
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3465
21
reference_url https://access.redhat.com/errata/RHSA-2023:3470
reference_id RHSA-2023:3470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3470
22
reference_url https://access.redhat.com/errata/RHSA-2023:3490
reference_id RHSA-2023:3490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3490
23
reference_url https://access.redhat.com/errata/RHSA-2023:3491
reference_id RHSA-2023:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3491
24
reference_url https://access.redhat.com/errata/RHSA-2023:4125
reference_id RHSA-2023:4125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4125
25
reference_url https://access.redhat.com/errata/RHSA-2023:4126
reference_id RHSA-2023:4126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4126
26
reference_url https://access.redhat.com/errata/RHSA-2023:4146
reference_id RHSA-2023:4146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4146
27
reference_url https://usn.ubuntu.com/5883-1/
reference_id USN-5883-1
reference_type
scores
url https://usn.ubuntu.com/5883-1/
28
reference_url https://usn.ubuntu.com/5911-1/
reference_id USN-5911-1
reference_type
scores
url https://usn.ubuntu.com/5911-1/
29
reference_url https://usn.ubuntu.com/5912-1/
reference_id USN-5912-1
reference_type
scores
url https://usn.ubuntu.com/5912-1/
30
reference_url https://usn.ubuntu.com/5913-1/
reference_id USN-5913-1
reference_type
scores
url https://usn.ubuntu.com/5913-1/
31
reference_url https://usn.ubuntu.com/5914-1/
reference_id USN-5914-1
reference_type
scores
url https://usn.ubuntu.com/5914-1/
32
reference_url https://usn.ubuntu.com/5915-1/
reference_id USN-5915-1
reference_type
scores
url https://usn.ubuntu.com/5915-1/
33
reference_url https://usn.ubuntu.com/5917-1/
reference_id USN-5917-1
reference_type
scores
url https://usn.ubuntu.com/5917-1/
34
reference_url https://usn.ubuntu.com/5919-1/
reference_id USN-5919-1
reference_type
scores
url https://usn.ubuntu.com/5919-1/
35
reference_url https://usn.ubuntu.com/5920-1/
reference_id USN-5920-1
reference_type
scores
url https://usn.ubuntu.com/5920-1/
36
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
37
reference_url https://usn.ubuntu.com/5925-1/
reference_id USN-5925-1
reference_type
scores
url https://usn.ubuntu.com/5925-1/
38
reference_url https://usn.ubuntu.com/5927-1/
reference_id USN-5927-1
reference_type
scores
url https://usn.ubuntu.com/5927-1/
39
reference_url https://usn.ubuntu.com/5929-1/
reference_id USN-5929-1
reference_type
scores
url https://usn.ubuntu.com/5929-1/
40
reference_url https://usn.ubuntu.com/5934-1/
reference_id USN-5934-1
reference_type
scores
url https://usn.ubuntu.com/5934-1/
41
reference_url https://usn.ubuntu.com/5935-1/
reference_id USN-5935-1
reference_type
scores
url https://usn.ubuntu.com/5935-1/
42
reference_url https://usn.ubuntu.com/5938-1/
reference_id USN-5938-1
reference_type
scores
url https://usn.ubuntu.com/5938-1/
43
reference_url https://usn.ubuntu.com/5939-1/
reference_id USN-5939-1
reference_type
scores
url https://usn.ubuntu.com/5939-1/
44
reference_url https://usn.ubuntu.com/5940-1/
reference_id USN-5940-1
reference_type
scores
url https://usn.ubuntu.com/5940-1/
45
reference_url https://usn.ubuntu.com/5941-1/
reference_id USN-5941-1
reference_type
scores
url https://usn.ubuntu.com/5941-1/
46
reference_url https://usn.ubuntu.com/5950-1/
reference_id USN-5950-1
reference_type
scores
url https://usn.ubuntu.com/5950-1/
47
reference_url https://usn.ubuntu.com/5951-1/
reference_id USN-5951-1
reference_type
scores
url https://usn.ubuntu.com/5951-1/
48
reference_url https://usn.ubuntu.com/5962-1/
reference_id USN-5962-1
reference_type
scores
url https://usn.ubuntu.com/5962-1/
49
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
50
reference_url https://usn.ubuntu.com/5976-1/
reference_id USN-5976-1
reference_type
scores
url https://usn.ubuntu.com/5976-1/
51
reference_url https://usn.ubuntu.com/6000-1/
reference_id USN-6000-1
reference_type
scores
url https://usn.ubuntu.com/6000-1/
52
reference_url https://usn.ubuntu.com/6007-1/
reference_id USN-6007-1
reference_type
scores
url https://usn.ubuntu.com/6007-1/
fixed_packages
aliases CVE-2023-0461
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m4wy-164p-qyh7
22
url VCID-mrhs-1bmb-3bc5
vulnerability_id VCID-mrhs-1bmb-3bc5
summary kernel: drm/virtio: improper return value check in virtio_gpu_object_shmem_init()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22998.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22998.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22998
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05191
published_at 2026-04-02T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05243
published_at 2026-04-07T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.0522
published_at 2026-04-04T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05279
published_at 2026-04-08T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05299
published_at 2026-04-09T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05267
published_at 2026-04-11T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.05252
published_at 2026-04-12T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05239
published_at 2026-04-13T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05184
published_at 2026-04-16T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.05188
published_at 2026-04-18T12:55:00Z
10
value 0.00021
scoring_system epss
scoring_elements 0.0589
published_at 2026-04-24T12:55:00Z
11
value 0.00021
scoring_system epss
scoring_elements 0.05859
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22998
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22998
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22998
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2182429
reference_id 2182429
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2182429
5
reference_url https://github.com/torvalds/linux/commit/c24968734abfed81c8f93dc5f44a7b7a9aecadfa
reference_id c24968734abfed81c8f93dc5f44a7b7a9aecadfa
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:03Z/
url https://github.com/torvalds/linux/commit/c24968734abfed81c8f93dc5f44a7b7a9aecadfa
6
reference_url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0.3
reference_id ChangeLog-6.0.3
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:03Z/
url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0.3
7
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:03Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
8
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
9
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
10
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
11
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
fixed_packages
aliases CVE-2023-22998
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mrhs-1bmb-3bc5
23
url VCID-n2c4-w748-tyau
vulnerability_id VCID-n2c4-w748-tyau
summary kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3623.json
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3623.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3623
reference_id
reference_type
scores
0
value 0.00077
scoring_system epss
scoring_elements 0.22872
published_at 2026-04-24T12:55:00Z
1
value 0.00077
scoring_system epss
scoring_elements 0.2319
published_at 2026-04-02T12:55:00Z
2
value 0.00077
scoring_system epss
scoring_elements 0.23234
published_at 2026-04-04T12:55:00Z
3
value 0.00077
scoring_system epss
scoring_elements 0.23023
published_at 2026-04-07T12:55:00Z
4
value 0.00077
scoring_system epss
scoring_elements 0.23096
published_at 2026-04-08T12:55:00Z
5
value 0.00077
scoring_system epss
scoring_elements 0.23149
published_at 2026-04-09T12:55:00Z
6
value 0.00077
scoring_system epss
scoring_elements 0.23168
published_at 2026-04-11T12:55:00Z
7
value 0.00077
scoring_system epss
scoring_elements 0.2313
published_at 2026-04-12T12:55:00Z
8
value 0.00077
scoring_system epss
scoring_elements 0.23073
published_at 2026-04-13T12:55:00Z
9
value 0.00077
scoring_system epss
scoring_elements 0.23088
published_at 2026-04-16T12:55:00Z
10
value 0.00077
scoring_system epss
scoring_elements 0.23079
published_at 2026-04-18T12:55:00Z
11
value 0.00077
scoring_system epss
scoring_elements 0.23042
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3623
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2165721
reference_id 2165721
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2165721
17
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
18
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
19
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
20
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
21
reference_url https://www.debian.org/security/2023/dsa-5324
reference_id dsa-5324
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:04Z/
url https://www.debian.org/security/2023/dsa-5324
22
reference_url https://vuldb.com/?id.211921
reference_id ?id.211921
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:04Z/
url https://vuldb.com/?id.211921
23
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=fac35ba763ed07ba93154c95ffc0c4a55023707f
reference_id ?id=fac35ba763ed07ba93154c95ffc0c4a55023707f
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:04Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=fac35ba763ed07ba93154c95ffc0c4a55023707f
24
reference_url https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
reference_id msg00000.html
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:04Z/
url https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
25
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
26
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
27
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
28
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
29
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
30
reference_url https://usn.ubuntu.com/5793-1/
reference_id USN-5793-1
reference_type
scores
url https://usn.ubuntu.com/5793-1/
31
reference_url https://usn.ubuntu.com/5793-2/
reference_id USN-5793-2
reference_type
scores
url https://usn.ubuntu.com/5793-2/
32
reference_url https://usn.ubuntu.com/5793-3/
reference_id USN-5793-3
reference_type
scores
url https://usn.ubuntu.com/5793-3/
33
reference_url https://usn.ubuntu.com/5793-4/
reference_id USN-5793-4
reference_type
scores
url https://usn.ubuntu.com/5793-4/
34
reference_url https://usn.ubuntu.com/5851-1/
reference_id USN-5851-1
reference_type
scores
url https://usn.ubuntu.com/5851-1/
35
reference_url https://usn.ubuntu.com/5860-1/
reference_id USN-5860-1
reference_type
scores
url https://usn.ubuntu.com/5860-1/
36
reference_url https://usn.ubuntu.com/5876-1/
reference_id USN-5876-1
reference_type
scores
url https://usn.ubuntu.com/5876-1/
37
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
38
reference_url https://usn.ubuntu.com/5917-1/
reference_id USN-5917-1
reference_type
scores
url https://usn.ubuntu.com/5917-1/
39
reference_url https://usn.ubuntu.com/5934-1/
reference_id USN-5934-1
reference_type
scores
url https://usn.ubuntu.com/5934-1/
40
reference_url https://usn.ubuntu.com/5939-1/
reference_id USN-5939-1
reference_type
scores
url https://usn.ubuntu.com/5939-1/
41
reference_url https://usn.ubuntu.com/5940-1/
reference_id USN-5940-1
reference_type
scores
url https://usn.ubuntu.com/5940-1/
42
reference_url https://usn.ubuntu.com/5951-1/
reference_id USN-5951-1
reference_type
scores
url https://usn.ubuntu.com/5951-1/
43
reference_url https://usn.ubuntu.com/6000-1/
reference_id USN-6000-1
reference_type
scores
url https://usn.ubuntu.com/6000-1/
fixed_packages
aliases CVE-2022-3623
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n2c4-w748-tyau
24
url VCID-nck8-brgn-hkdx
vulnerability_id VCID-nck8-brgn-hkdx
summary kernel: use-after-free after failed devlink reload in devlink_param_get
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3625.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3625.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3625
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05869
published_at 2026-04-24T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05836
published_at 2026-04-21T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06078
published_at 2026-04-02T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06089
published_at 2026-04-07T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.0613
published_at 2026-04-08T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06169
published_at 2026-04-09T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06159
published_at 2026-04-11T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06154
published_at 2026-04-12T12:55:00Z
8
value 0.00023
scoring_system epss
scoring_elements 0.06147
published_at 2026-04-13T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06107
published_at 2026-04-16T12:55:00Z
10
value 0.00023
scoring_system epss
scoring_elements 0.06118
published_at 2026-04-18T12:55:00Z
11
value 0.00023
scoring_system epss
scoring_elements 0.06106
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3625
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3625
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3625
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2144720
reference_id 2144720
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2144720
5
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
6
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
7
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
8
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
9
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
10
reference_url https://usn.ubuntu.com/5728-1/
reference_id USN-5728-1
reference_type
scores
url https://usn.ubuntu.com/5728-1/
11
reference_url https://usn.ubuntu.com/5728-2/
reference_id USN-5728-2
reference_type
scores
url https://usn.ubuntu.com/5728-2/
12
reference_url https://usn.ubuntu.com/5728-3/
reference_id USN-5728-3
reference_type
scores
url https://usn.ubuntu.com/5728-3/
13
reference_url https://usn.ubuntu.com/5729-1/
reference_id USN-5729-1
reference_type
scores
url https://usn.ubuntu.com/5729-1/
14
reference_url https://usn.ubuntu.com/5729-2/
reference_id USN-5729-2
reference_type
scores
url https://usn.ubuntu.com/5729-2/
fixed_packages
aliases CVE-2022-3625
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nck8-brgn-hkdx
25
url VCID-ng25-c2xk-9fem
vulnerability_id VCID-ng25-c2xk-9fem
summary kernel: NULL pointer dereference in traffic control subsystem
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47929.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47929.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-47929
reference_id
reference_type
scores
0
value 0.0003
scoring_system epss
scoring_elements 0.08699
published_at 2026-04-24T12:55:00Z
1
value 0.0003
scoring_system epss
scoring_elements 0.08685
published_at 2026-04-21T12:55:00Z
2
value 0.00033
scoring_system epss
scoring_elements 0.09521
published_at 2026-04-04T12:55:00Z
3
value 0.00033
scoring_system epss
scoring_elements 0.0942
published_at 2026-04-18T12:55:00Z
4
value 0.00033
scoring_system epss
scoring_elements 0.09472
published_at 2026-04-02T12:55:00Z
5
value 0.00033
scoring_system epss
scoring_elements 0.09419
published_at 2026-04-16T12:55:00Z
6
value 0.00033
scoring_system epss
scoring_elements 0.09525
published_at 2026-04-13T12:55:00Z
7
value 0.00033
scoring_system epss
scoring_elements 0.09541
published_at 2026-04-12T12:55:00Z
8
value 0.00033
scoring_system epss
scoring_elements 0.0957
published_at 2026-04-11T12:55:00Z
9
value 0.00033
scoring_system epss
scoring_elements 0.09556
published_at 2026-04-09T12:55:00Z
10
value 0.00033
scoring_system epss
scoring_elements 0.09508
published_at 2026-04-08T12:55:00Z
11
value 0.00033
scoring_system epss
scoring_elements 0.09434
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-47929
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2168246
reference_id 2168246
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2168246
17
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
18
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
19
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
20
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
21
reference_url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.6
reference_id ChangeLog-6.1.6
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/
url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.6
22
reference_url https://tldp.org/HOWTO/Traffic-Control-HOWTO/components.html
reference_id components.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/
url https://tldp.org/HOWTO/Traffic-Control-HOWTO/components.html
23
reference_url https://www.debian.org/security/2023/dsa-5324
reference_id dsa-5324
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/
url https://www.debian.org/security/2023/dsa-5324
24
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96398560f26aa07e8f2969d73c8197e6a6d10407
reference_id ?id=96398560f26aa07e8f2969d73c8197e6a6d10407
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96398560f26aa07e8f2969d73c8197e6a6d10407
25
reference_url https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
reference_id msg00000.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/
url https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
26
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
27
reference_url https://www.spinics.net/lists/netdev/msg555705.html
reference_id msg555705.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/
url https://www.spinics.net/lists/netdev/msg555705.html
28
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
29
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
30
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
31
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
32
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
33
reference_url https://usn.ubuntu.com/5915-1/
reference_id USN-5915-1
reference_type
scores
url https://usn.ubuntu.com/5915-1/
34
reference_url https://usn.ubuntu.com/5917-1/
reference_id USN-5917-1
reference_type
scores
url https://usn.ubuntu.com/5917-1/
35
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
36
reference_url https://usn.ubuntu.com/5927-1/
reference_id USN-5927-1
reference_type
scores
url https://usn.ubuntu.com/5927-1/
37
reference_url https://usn.ubuntu.com/5934-1/
reference_id USN-5934-1
reference_type
scores
url https://usn.ubuntu.com/5934-1/
38
reference_url https://usn.ubuntu.com/5939-1/
reference_id USN-5939-1
reference_type
scores
url https://usn.ubuntu.com/5939-1/
39
reference_url https://usn.ubuntu.com/5940-1/
reference_id USN-5940-1
reference_type
scores
url https://usn.ubuntu.com/5940-1/
40
reference_url https://usn.ubuntu.com/5951-1/
reference_id USN-5951-1
reference_type
scores
url https://usn.ubuntu.com/5951-1/
41
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
42
reference_url https://usn.ubuntu.com/5981-1/
reference_id USN-5981-1
reference_type
scores
url https://usn.ubuntu.com/5981-1/
43
reference_url https://usn.ubuntu.com/5984-1/
reference_id USN-5984-1
reference_type
scores
url https://usn.ubuntu.com/5984-1/
44
reference_url https://usn.ubuntu.com/5991-1/
reference_id USN-5991-1
reference_type
scores
url https://usn.ubuntu.com/5991-1/
45
reference_url https://usn.ubuntu.com/6000-1/
reference_id USN-6000-1
reference_type
scores
url https://usn.ubuntu.com/6000-1/
46
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
47
reference_url https://usn.ubuntu.com/6009-1/
reference_id USN-6009-1
reference_type
scores
url https://usn.ubuntu.com/6009-1/
48
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
49
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
50
reference_url https://usn.ubuntu.com/6024-1/
reference_id USN-6024-1
reference_type
scores
url https://usn.ubuntu.com/6024-1/
51
reference_url https://usn.ubuntu.com/6025-1/
reference_id USN-6025-1
reference_type
scores
url https://usn.ubuntu.com/6025-1/
52
reference_url https://usn.ubuntu.com/6030-1/
reference_id USN-6030-1
reference_type
scores
url https://usn.ubuntu.com/6030-1/
53
reference_url https://usn.ubuntu.com/6040-1/
reference_id USN-6040-1
reference_type
scores
url https://usn.ubuntu.com/6040-1/
54
reference_url https://usn.ubuntu.com/6057-1/
reference_id USN-6057-1
reference_type
scores
url https://usn.ubuntu.com/6057-1/
55
reference_url https://usn.ubuntu.com/6134-1/
reference_id USN-6134-1
reference_type
scores
url https://usn.ubuntu.com/6134-1/
56
reference_url https://usn.ubuntu.com/6247-1/
reference_id USN-6247-1
reference_type
scores
url https://usn.ubuntu.com/6247-1/
57
reference_url https://usn.ubuntu.com/6248-1/
reference_id USN-6248-1
reference_type
scores
url https://usn.ubuntu.com/6248-1/
fixed_packages
aliases CVE-2022-47929
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ng25-c2xk-9fem
26
url VCID-p1a3-k51z-byc7
vulnerability_id VCID-p1a3-k51z-byc7
summary kernel: possible race condition in drivers/tty/tty_buffers.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1462.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1462.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1462
reference_id
reference_type
scores
0
value 0.00041
scoring_system epss
scoring_elements 0.12553
published_at 2026-04-01T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.12657
published_at 2026-04-02T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12699
published_at 2026-04-04T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12511
published_at 2026-04-07T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.12589
published_at 2026-04-08T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.12641
published_at 2026-04-09T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12608
published_at 2026-04-11T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.12568
published_at 2026-04-12T12:55:00Z
8
value 0.00041
scoring_system epss
scoring_elements 0.12528
published_at 2026-04-13T12:55:00Z
9
value 0.00041
scoring_system epss
scoring_elements 0.12433
published_at 2026-04-16T12:55:00Z
10
value 0.00041
scoring_system epss
scoring_elements 0.12437
published_at 2026-04-18T12:55:00Z
11
value 0.00041
scoring_system epss
scoring_elements 0.12552
published_at 2026-04-21T12:55:00Z
12
value 0.00041
scoring_system epss
scoring_elements 0.1256
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1462
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1462
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2078466
reference_id 2078466
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2078466
5
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
6
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
7
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
8
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
9
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
10
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
11
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
12
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
fixed_packages
aliases CVE-2022-1462
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p1a3-k51z-byc7
27
url VCID-pf6k-jwex-8kay
vulnerability_id VCID-pf6k-jwex-8kay
summary kernel: Denial of service in beacon protection for P2P-device
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42722.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42722.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42722
reference_id
reference_type
scores
0
value 0.00079
scoring_system epss
scoring_elements 0.2315
published_at 2026-04-24T12:55:00Z
1
value 0.00079
scoring_system epss
scoring_elements 0.23403
published_at 2026-04-12T12:55:00Z
2
value 0.00079
scoring_system epss
scoring_elements 0.23349
published_at 2026-04-13T12:55:00Z
3
value 0.00079
scoring_system epss
scoring_elements 0.23367
published_at 2026-04-16T12:55:00Z
4
value 0.00079
scoring_system epss
scoring_elements 0.23361
published_at 2026-04-18T12:55:00Z
5
value 0.00079
scoring_system epss
scoring_elements 0.23341
published_at 2026-04-21T12:55:00Z
6
value 0.00079
scoring_system epss
scoring_elements 0.23477
published_at 2026-04-02T12:55:00Z
7
value 0.00079
scoring_system epss
scoring_elements 0.23514
published_at 2026-04-04T12:55:00Z
8
value 0.00079
scoring_system epss
scoring_elements 0.23298
published_at 2026-04-07T12:55:00Z
9
value 0.00079
scoring_system epss
scoring_elements 0.2337
published_at 2026-04-08T12:55:00Z
10
value 0.00079
scoring_system epss
scoring_elements 0.23422
published_at 2026-04-09T12:55:00Z
11
value 0.00079
scoring_system epss
scoring_elements 0.23441
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42722
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
19
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2134517
reference_id 2134517
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2134517
21
reference_url https://security.archlinux.org/ASA-202210-1
reference_id ASA-202210-1
reference_type
scores
url https://security.archlinux.org/ASA-202210-1
22
reference_url https://security.archlinux.org/ASA-202210-2
reference_id ASA-202210-2
reference_type
scores
url https://security.archlinux.org/ASA-202210-2
23
reference_url https://security.archlinux.org/ASA-202210-3
reference_id ASA-202210-3
reference_type
scores
url https://security.archlinux.org/ASA-202210-3
24
reference_url https://security.archlinux.org/ASA-202210-4
reference_id ASA-202210-4
reference_type
scores
url https://security.archlinux.org/ASA-202210-4
25
reference_url https://security.archlinux.org/AVG-2800
reference_id AVG-2800
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2800
26
reference_url https://security.archlinux.org/AVG-2801
reference_id AVG-2801
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2801
27
reference_url https://security.archlinux.org/AVG-2802
reference_id AVG-2802
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2802
28
reference_url https://security.archlinux.org/AVG-2803
reference_id AVG-2803
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2803
29
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
30
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
31
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
32
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
33
reference_url https://access.redhat.com/errata/RHSA-2024:1188
reference_id RHSA-2024:1188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1188
34
reference_url https://usn.ubuntu.com/5692-1/
reference_id USN-5692-1
reference_type
scores
url https://usn.ubuntu.com/5692-1/
35
reference_url https://usn.ubuntu.com/5693-1/
reference_id USN-5693-1
reference_type
scores
url https://usn.ubuntu.com/5693-1/
36
reference_url https://usn.ubuntu.com/5700-1/
reference_id USN-5700-1
reference_type
scores
url https://usn.ubuntu.com/5700-1/
37
reference_url https://usn.ubuntu.com/5708-1/
reference_id USN-5708-1
reference_type
scores
url https://usn.ubuntu.com/5708-1/
38
reference_url https://usn.ubuntu.com/5752-1/
reference_id USN-5752-1
reference_type
scores
url https://usn.ubuntu.com/5752-1/
fixed_packages
aliases CVE-2022-42722
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pf6k-jwex-8kay
28
url VCID-pphs-rtxe-wfca
vulnerability_id VCID-pphs-rtxe-wfca
summary kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3564.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3564.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3564
reference_id
reference_type
scores
0
value 0.00089
scoring_system epss
scoring_elements 0.25131
published_at 2026-04-24T12:55:00Z
1
value 0.00089
scoring_system epss
scoring_elements 0.25302
published_at 2026-04-11T12:55:00Z
2
value 0.00089
scoring_system epss
scoring_elements 0.2526
published_at 2026-04-12T12:55:00Z
3
value 0.00089
scoring_system epss
scoring_elements 0.25207
published_at 2026-04-18T12:55:00Z
4
value 0.00089
scoring_system epss
scoring_elements 0.25217
published_at 2026-04-16T12:55:00Z
5
value 0.00089
scoring_system epss
scoring_elements 0.25178
published_at 2026-04-21T12:55:00Z
6
value 0.00089
scoring_system epss
scoring_elements 0.25362
published_at 2026-04-02T12:55:00Z
7
value 0.00089
scoring_system epss
scoring_elements 0.25398
published_at 2026-04-04T12:55:00Z
8
value 0.00089
scoring_system epss
scoring_elements 0.25174
published_at 2026-04-07T12:55:00Z
9
value 0.00089
scoring_system epss
scoring_elements 0.25243
published_at 2026-04-08T12:55:00Z
10
value 0.00089
scoring_system epss
scoring_elements 0.25288
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3564
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3564
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2150999
reference_id 2150999
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2150999
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://access.redhat.com/errata/RHSA-2023:0856
reference_id RHSA-2023:0856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0856
10
reference_url https://access.redhat.com/errata/RHSA-2023:0858
reference_id RHSA-2023:0858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0858
11
reference_url https://access.redhat.com/errata/RHSA-2023:0951
reference_id RHSA-2023:0951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0951
12
reference_url https://access.redhat.com/errata/RHSA-2023:0979
reference_id RHSA-2023:0979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0979
13
reference_url https://access.redhat.com/errata/RHSA-2023:1008
reference_id RHSA-2023:1008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1008
14
reference_url https://access.redhat.com/errata/RHSA-2023:1202
reference_id RHSA-2023:1202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1202
15
reference_url https://access.redhat.com/errata/RHSA-2023:1203
reference_id RHSA-2023:1203
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1203
16
reference_url https://access.redhat.com/errata/RHSA-2023:1220
reference_id RHSA-2023:1220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1220
17
reference_url https://access.redhat.com/errata/RHSA-2023:1221
reference_id RHSA-2023:1221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1221
18
reference_url https://access.redhat.com/errata/RHSA-2023:1251
reference_id RHSA-2023:1251
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1251
19
reference_url https://access.redhat.com/errata/RHSA-2023:1435
reference_id RHSA-2023:1435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1435
20
reference_url https://access.redhat.com/errata/RHSA-2023:1559
reference_id RHSA-2023:1559
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1559
21
reference_url https://access.redhat.com/errata/RHSA-2023:1560
reference_id RHSA-2023:1560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1560
22
reference_url https://access.redhat.com/errata/RHSA-2023:1666
reference_id RHSA-2023:1666
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1666
23
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
24
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
25
reference_url https://access.redhat.com/errata/RHSA-2023:3277
reference_id RHSA-2023:3277
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3277
26
reference_url https://access.redhat.com/errata/RHSA-2023:3278
reference_id RHSA-2023:3278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3278
27
reference_url https://access.redhat.com/errata/RHSA-2023:3388
reference_id RHSA-2023:3388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3388
28
reference_url https://access.redhat.com/errata/RHSA-2023:3431
reference_id RHSA-2023:3431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3431
29
reference_url https://access.redhat.com/errata/RHSA-2023:3491
reference_id RHSA-2023:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3491
30
reference_url https://access.redhat.com/errata/RHSA-2023:4020
reference_id RHSA-2023:4020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4020
31
reference_url https://access.redhat.com/errata/RHSA-2023:4021
reference_id RHSA-2023:4021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4021
32
reference_url https://access.redhat.com/errata/RHSA-2023:4150
reference_id RHSA-2023:4150
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4150
33
reference_url https://access.redhat.com/errata/RHSA-2023:4151
reference_id RHSA-2023:4151
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4151
34
reference_url https://access.redhat.com/errata/RHSA-2023:4215
reference_id RHSA-2023:4215
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4215
35
reference_url https://usn.ubuntu.com/5754-1/
reference_id USN-5754-1
reference_type
scores
url https://usn.ubuntu.com/5754-1/
36
reference_url https://usn.ubuntu.com/5754-2/
reference_id USN-5754-2
reference_type
scores
url https://usn.ubuntu.com/5754-2/
37
reference_url https://usn.ubuntu.com/5755-1/
reference_id USN-5755-1
reference_type
scores
url https://usn.ubuntu.com/5755-1/
38
reference_url https://usn.ubuntu.com/5755-2/
reference_id USN-5755-2
reference_type
scores
url https://usn.ubuntu.com/5755-2/
39
reference_url https://usn.ubuntu.com/5756-1/
reference_id USN-5756-1
reference_type
scores
url https://usn.ubuntu.com/5756-1/
40
reference_url https://usn.ubuntu.com/5756-2/
reference_id USN-5756-2
reference_type
scores
url https://usn.ubuntu.com/5756-2/
41
reference_url https://usn.ubuntu.com/5756-3/
reference_id USN-5756-3
reference_type
scores
url https://usn.ubuntu.com/5756-3/
42
reference_url https://usn.ubuntu.com/5757-1/
reference_id USN-5757-1
reference_type
scores
url https://usn.ubuntu.com/5757-1/
43
reference_url https://usn.ubuntu.com/5757-2/
reference_id USN-5757-2
reference_type
scores
url https://usn.ubuntu.com/5757-2/
44
reference_url https://usn.ubuntu.com/5758-1/
reference_id USN-5758-1
reference_type
scores
url https://usn.ubuntu.com/5758-1/
45
reference_url https://usn.ubuntu.com/5773-1/
reference_id USN-5773-1
reference_type
scores
url https://usn.ubuntu.com/5773-1/
46
reference_url https://usn.ubuntu.com/5774-1/
reference_id USN-5774-1
reference_type
scores
url https://usn.ubuntu.com/5774-1/
47
reference_url https://usn.ubuntu.com/5779-1/
reference_id USN-5779-1
reference_type
scores
url https://usn.ubuntu.com/5779-1/
48
reference_url https://usn.ubuntu.com/5789-1/
reference_id USN-5789-1
reference_type
scores
url https://usn.ubuntu.com/5789-1/
fixed_packages
aliases CVE-2022-3564
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pphs-rtxe-wfca
29
url VCID-pq7v-b14b-tuhv
vulnerability_id VCID-pq7v-b14b-tuhv
summary Kernel: NULL pointer dereference problem in sctp_sched_dequeue_common
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2177.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2177.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2177
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01451
published_at 2026-04-24T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01443
published_at 2026-04-21T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01463
published_at 2026-04-02T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01468
published_at 2026-04-13T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01456
published_at 2026-04-16T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01471
published_at 2026-04-18T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01466
published_at 2026-04-12T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.01472
published_at 2026-04-11T12:55:00Z
8
value 0.00012
scoring_system epss
scoring_elements 0.01477
published_at 2026-04-08T12:55:00Z
9
value 0.00012
scoring_system epss
scoring_elements 0.01479
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2177
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2177
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2187953
reference_id 2187953
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2187953
5
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=181d8d2066c0
reference_id ?id=181d8d2066c0
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:09Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=181d8d2066c0
6
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
7
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
8
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
9
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
10
reference_url https://access.redhat.com/errata/RHSA-2023:7398
reference_id RHSA-2023:7398
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7398
fixed_packages
aliases CVE-2023-2177
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pq7v-b14b-tuhv
30
url VCID-pyph-7y9k-gkfa
vulnerability_id VCID-pyph-7y9k-gkfa
summary kernel: Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3707.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3707.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3707
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02508
published_at 2026-04-02T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02599
published_at 2026-04-24T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02523
published_at 2026-04-07T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02527
published_at 2026-04-08T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02548
published_at 2026-04-09T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02528
published_at 2026-04-11T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02518
published_at 2026-04-12T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02516
published_at 2026-04-13T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02502
published_at 2026-04-16T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02507
published_at 2026-04-18T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02614
published_at 2026-04-21T12:55:00Z
11
value 0.00014
scoring_system epss
scoring_elements 0.02521
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3707
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3707
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/
reference_id 20221007013708.1946061-1-zyytlz.wz%40163.com
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-07T15:48:00Z/
url https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2137979
reference_id 2137979
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-07T15:48:00Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2137979
6
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-07T15:48:00Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
7
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-07T15:48:00Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
8
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
9
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
10
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
11
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
12
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
13
reference_url https://usn.ubuntu.com/5915-1/
reference_id USN-5915-1
reference_type
scores
url https://usn.ubuntu.com/5915-1/
14
reference_url https://usn.ubuntu.com/6079-1/
reference_id USN-6079-1
reference_type
scores
url https://usn.ubuntu.com/6079-1/
15
reference_url https://usn.ubuntu.com/6080-1/
reference_id USN-6080-1
reference_type
scores
url https://usn.ubuntu.com/6080-1/
16
reference_url https://usn.ubuntu.com/6085-1/
reference_id USN-6085-1
reference_type
scores
url https://usn.ubuntu.com/6085-1/
17
reference_url https://usn.ubuntu.com/6090-1/
reference_id USN-6090-1
reference_type
scores
url https://usn.ubuntu.com/6090-1/
18
reference_url https://usn.ubuntu.com/6091-1/
reference_id USN-6091-1
reference_type
scores
url https://usn.ubuntu.com/6091-1/
19
reference_url https://usn.ubuntu.com/6094-1/
reference_id USN-6094-1
reference_type
scores
url https://usn.ubuntu.com/6094-1/
20
reference_url https://usn.ubuntu.com/6096-1/
reference_id USN-6096-1
reference_type
scores
url https://usn.ubuntu.com/6096-1/
21
reference_url https://usn.ubuntu.com/6109-1/
reference_id USN-6109-1
reference_type
scores
url https://usn.ubuntu.com/6109-1/
22
reference_url https://usn.ubuntu.com/6118-1/
reference_id USN-6118-1
reference_type
scores
url https://usn.ubuntu.com/6118-1/
23
reference_url https://usn.ubuntu.com/6132-1/
reference_id USN-6132-1
reference_type
scores
url https://usn.ubuntu.com/6132-1/
24
reference_url https://usn.ubuntu.com/6133-1/
reference_id USN-6133-1
reference_type
scores
url https://usn.ubuntu.com/6133-1/
25
reference_url https://usn.ubuntu.com/6134-1/
reference_id USN-6134-1
reference_type
scores
url https://usn.ubuntu.com/6134-1/
26
reference_url https://usn.ubuntu.com/6222-1/
reference_id USN-6222-1
reference_type
scores
url https://usn.ubuntu.com/6222-1/
27
reference_url https://usn.ubuntu.com/6256-1/
reference_id USN-6256-1
reference_type
scores
url https://usn.ubuntu.com/6256-1/
fixed_packages
aliases CVE-2022-3707
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pyph-7y9k-gkfa
31
url VCID-q5kt-n8qx-57dd
vulnerability_id VCID-q5kt-n8qx-57dd
summary kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1095.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1095.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1095
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03721
published_at 2026-04-02T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03799
published_at 2026-04-24T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03711
published_at 2026-04-12T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03685
published_at 2026-04-13T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03661
published_at 2026-04-16T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03673
published_at 2026-04-18T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03794
published_at 2026-04-21T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03732
published_at 2026-04-04T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03746
published_at 2026-04-07T12:55:00Z
9
value 0.00016
scoring_system epss
scoring_elements 0.0375
published_at 2026-04-08T12:55:00Z
10
value 0.00016
scoring_system epss
scoring_elements 0.03774
published_at 2026-04-09T12:55:00Z
11
value 0.00016
scoring_system epss
scoring_elements 0.03733
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1095
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1095
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2173973
reference_id 2173973
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T17:30:41Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2173973
5
reference_url https://github.com/torvalds/linux/commit/580077855a40741cf511766129702d97ff02f4d9
reference_id 580077855a40741cf511766129702d97ff02f4d9
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T17:30:41Z/
url https://github.com/torvalds/linux/commit/580077855a40741cf511766129702d97ff02f4d9
6
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
7
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
8
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
9
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
10
reference_url https://access.redhat.com/errata/RHSA-2023:5627
reference_id RHSA-2023:5627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5627
11
reference_url https://access.redhat.com/errata/RHSA-2023:5628
reference_id RHSA-2023:5628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5628
12
reference_url https://access.redhat.com/errata/RHSA-2023:6813
reference_id RHSA-2023:6813
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6813
13
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
14
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
15
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
16
reference_url https://usn.ubuntu.com/6031-1/
reference_id USN-6031-1
reference_type
scores
url https://usn.ubuntu.com/6031-1/
fixed_packages
aliases CVE-2023-1095
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q5kt-n8qx-57dd
32
url VCID-qkam-j6uv-n7fj
vulnerability_id VCID-qkam-j6uv-n7fj
summary kernel: NULL pointer dereference in rawv6_push_pending_frames
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0394.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0394.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0394
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06335
published_at 2026-04-24T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06318
published_at 2026-04-21T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06941
published_at 2026-04-11T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.06852
published_at 2026-04-18T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.06869
published_at 2026-04-16T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.0693
published_at 2026-04-13T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.0687
published_at 2026-04-04T12:55:00Z
7
value 0.00025
scoring_system epss
scoring_elements 0.06857
published_at 2026-04-07T12:55:00Z
8
value 0.00025
scoring_system epss
scoring_elements 0.06912
published_at 2026-04-08T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.06942
published_at 2026-04-09T12:55:00Z
10
value 0.00025
scoring_system epss
scoring_elements 0.06934
published_at 2026-04-12T12:55:00Z
11
value 0.00025
scoring_system epss
scoring_elements 0.06827
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0394
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162120
reference_id 2162120
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162120
17
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
18
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
19
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
20
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
21
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb3e9864cdbe35ff6378966660edbcbac955fe17
reference_id ?id=cb3e9864cdbe35ff6378966660edbcbac955fe17
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:47:25Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb3e9864cdbe35ff6378966660edbcbac955fe17
22
reference_url https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
reference_id msg00000.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:47:25Z/
url https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
23
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:47:25Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
24
reference_url https://security.netapp.com/advisory/ntap-20230302-0005/
reference_id ntap-20230302-0005
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:47:25Z/
url https://security.netapp.com/advisory/ntap-20230302-0005/
25
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
26
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
27
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
28
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
29
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
30
reference_url https://usn.ubuntu.com/5917-1/
reference_id USN-5917-1
reference_type
scores
url https://usn.ubuntu.com/5917-1/
31
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
32
reference_url https://usn.ubuntu.com/5927-1/
reference_id USN-5927-1
reference_type
scores
url https://usn.ubuntu.com/5927-1/
33
reference_url https://usn.ubuntu.com/5934-1/
reference_id USN-5934-1
reference_type
scores
url https://usn.ubuntu.com/5934-1/
34
reference_url https://usn.ubuntu.com/5939-1/
reference_id USN-5939-1
reference_type
scores
url https://usn.ubuntu.com/5939-1/
35
reference_url https://usn.ubuntu.com/5940-1/
reference_id USN-5940-1
reference_type
scores
url https://usn.ubuntu.com/5940-1/
36
reference_url https://usn.ubuntu.com/5951-1/
reference_id USN-5951-1
reference_type
scores
url https://usn.ubuntu.com/5951-1/
37
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
38
reference_url https://usn.ubuntu.com/5976-1/
reference_id USN-5976-1
reference_type
scores
url https://usn.ubuntu.com/5976-1/
39
reference_url https://usn.ubuntu.com/5978-1/
reference_id USN-5978-1
reference_type
scores
url https://usn.ubuntu.com/5978-1/
40
reference_url https://usn.ubuntu.com/5981-1/
reference_id USN-5981-1
reference_type
scores
url https://usn.ubuntu.com/5981-1/
41
reference_url https://usn.ubuntu.com/5984-1/
reference_id USN-5984-1
reference_type
scores
url https://usn.ubuntu.com/5984-1/
42
reference_url https://usn.ubuntu.com/5991-1/
reference_id USN-5991-1
reference_type
scores
url https://usn.ubuntu.com/5991-1/
43
reference_url https://usn.ubuntu.com/6000-1/
reference_id USN-6000-1
reference_type
scores
url https://usn.ubuntu.com/6000-1/
44
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
45
reference_url https://usn.ubuntu.com/6009-1/
reference_id USN-6009-1
reference_type
scores
url https://usn.ubuntu.com/6009-1/
46
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
47
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
48
reference_url https://usn.ubuntu.com/6025-1/
reference_id USN-6025-1
reference_type
scores
url https://usn.ubuntu.com/6025-1/
49
reference_url https://usn.ubuntu.com/6030-1/
reference_id USN-6030-1
reference_type
scores
url https://usn.ubuntu.com/6030-1/
50
reference_url https://usn.ubuntu.com/6040-1/
reference_id USN-6040-1
reference_type
scores
url https://usn.ubuntu.com/6040-1/
51
reference_url https://usn.ubuntu.com/6057-1/
reference_id USN-6057-1
reference_type
scores
url https://usn.ubuntu.com/6057-1/
52
reference_url https://usn.ubuntu.com/6079-1/
reference_id USN-6079-1
reference_type
scores
url https://usn.ubuntu.com/6079-1/
53
reference_url https://usn.ubuntu.com/6091-1/
reference_id USN-6091-1
reference_type
scores
url https://usn.ubuntu.com/6091-1/
54
reference_url https://usn.ubuntu.com/6096-1/
reference_id USN-6096-1
reference_type
scores
url https://usn.ubuntu.com/6096-1/
55
reference_url https://usn.ubuntu.com/6134-1/
reference_id USN-6134-1
reference_type
scores
url https://usn.ubuntu.com/6134-1/
fixed_packages
aliases CVE-2023-0394
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qkam-j6uv-n7fj
33
url VCID-qrf7-hb33-tqe4
vulnerability_id VCID-qrf7-hb33-tqe4
summary kernel: Recursive locking violation in usb-storage that can cause the kernel to deadlock
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4662.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4662.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-4662
reference_id
reference_type
scores
0
value 6e-05
scoring_system epss
scoring_elements 0.00314
published_at 2026-04-02T12:55:00Z
1
value 6e-05
scoring_system epss
scoring_elements 0.00369
published_at 2026-04-24T12:55:00Z
2
value 6e-05
scoring_system epss
scoring_elements 0.003
published_at 2026-04-12T12:55:00Z
3
value 6e-05
scoring_system epss
scoring_elements 0.00299
published_at 2026-04-13T12:55:00Z
4
value 6e-05
scoring_system epss
scoring_elements 0.00295
published_at 2026-04-16T12:55:00Z
5
value 6e-05
scoring_system epss
scoring_elements 0.00298
published_at 2026-04-18T12:55:00Z
6
value 6e-05
scoring_system epss
scoring_elements 0.00318
published_at 2026-04-21T12:55:00Z
7
value 6e-05
scoring_system epss
scoring_elements 0.00313
published_at 2026-04-04T12:55:00Z
8
value 6e-05
scoring_system epss
scoring_elements 0.00304
published_at 2026-04-07T12:55:00Z
9
value 6e-05
scoring_system epss
scoring_elements 0.00302
published_at 2026-04-08T12:55:00Z
10
value 6e-05
scoring_system epss
scoring_elements 0.00301
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-4662
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4662
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lore.kernel.org/all/20220913140355.910732567%40linuxfoundation.org/
reference_id 20220913140355.910732567%40linuxfoundation.org
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-09T18:03:46Z/
url https://lore.kernel.org/all/20220913140355.910732567%40linuxfoundation.org/
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2155788
reference_id 2155788
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2155788
6
reference_url https://lore.kernel.org/all/CAB7eexLLApHJwZfMQ=X-PtRhw0BgO+5KcSMS05FNUYejJXqtSA%40mail.gmail.com/
reference_id CAB7eexLLApHJwZfMQ=X-PtRhw0BgO+5KcSMS05FNUYejJXqtSA%40mail.gmail.com
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-09T18:03:46Z/
url https://lore.kernel.org/all/CAB7eexLLApHJwZfMQ=X-PtRhw0BgO+5KcSMS05FNUYejJXqtSA%40mail.gmail.com/
7
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
8
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
9
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
10
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
11
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
12
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
13
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
14
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
15
reference_url https://usn.ubuntu.com/6071-1/
reference_id USN-6071-1
reference_type
scores
url https://usn.ubuntu.com/6071-1/
fixed_packages
aliases CVE-2022-4662
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qrf7-hb33-tqe4
34
url VCID-sv4s-h2k7-aygu
vulnerability_id VCID-sv4s-h2k7-aygu
summary kernel: Report vmalloc UAF in dvb-core/dmxdev
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41218.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41218.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-41218
reference_id
reference_type
scores
0
value 0.00426
scoring_system epss
scoring_elements 0.62301
published_at 2026-04-24T12:55:00Z
1
value 0.00426
scoring_system epss
scoring_elements 0.62204
published_at 2026-04-02T12:55:00Z
2
value 0.00426
scoring_system epss
scoring_elements 0.62234
published_at 2026-04-04T12:55:00Z
3
value 0.00426
scoring_system epss
scoring_elements 0.62201
published_at 2026-04-07T12:55:00Z
4
value 0.00426
scoring_system epss
scoring_elements 0.6225
published_at 2026-04-08T12:55:00Z
5
value 0.00426
scoring_system epss
scoring_elements 0.62268
published_at 2026-04-09T12:55:00Z
6
value 0.00426
scoring_system epss
scoring_elements 0.62286
published_at 2026-04-11T12:55:00Z
7
value 0.00426
scoring_system epss
scoring_elements 0.62276
published_at 2026-04-12T12:55:00Z
8
value 0.00426
scoring_system epss
scoring_elements 0.62254
published_at 2026-04-13T12:55:00Z
9
value 0.00426
scoring_system epss
scoring_elements 0.62299
published_at 2026-04-16T12:55:00Z
10
value 0.00426
scoring_system epss
scoring_elements 0.62307
published_at 2026-04-18T12:55:00Z
11
value 0.00426
scoring_system epss
scoring_elements 0.62291
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-41218
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url http://www.openwall.com/lists/oss-security/2022/09/24/1
reference_id 1
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:28:21Z/
url http://www.openwall.com/lists/oss-security/2022/09/24/1
17
reference_url http://www.openwall.com/lists/oss-security/2022/09/24/2
reference_id 2
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:28:21Z/
url http://www.openwall.com/lists/oss-security/2022/09/24/2
18
reference_url https://lore.kernel.org/all/20220908132754.30532-1-tiwai%40suse.de/
reference_id 20220908132754.30532-1-tiwai%40suse.de
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:28:21Z/
url https://lore.kernel.org/all/20220908132754.30532-1-tiwai%40suse.de/
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2122960
reference_id 2122960
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2122960
20
reference_url http://www.openwall.com/lists/oss-security/2022/09/23/4
reference_id 4
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:28:21Z/
url http://www.openwall.com/lists/oss-security/2022/09/23/4
21
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
22
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
23
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
24
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
25
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/media/dvb-core/dmxdev.c
reference_id dmxdev.c
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:28:21Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/media/dvb-core/dmxdev.c
26
reference_url https://www.debian.org/security/2023/dsa-5324
reference_id dsa-5324
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:28:21Z/
url https://www.debian.org/security/2023/dsa-5324
27
reference_url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fd3d91ab1c6ab0628fe642dd570b56302c30a792
reference_id ?id=fd3d91ab1c6ab0628fe642dd570b56302c30a792
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:28:21Z/
url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fd3d91ab1c6ab0628fe642dd570b56302c30a792
28
reference_url https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
reference_id msg00000.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:28:21Z/
url https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
29
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:28:21Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
30
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
31
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
32
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
33
reference_url https://usn.ubuntu.com/5915-1/
reference_id USN-5915-1
reference_type
scores
url https://usn.ubuntu.com/5915-1/
34
reference_url https://usn.ubuntu.com/5917-1/
reference_id USN-5917-1
reference_type
scores
url https://usn.ubuntu.com/5917-1/
35
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
36
reference_url https://usn.ubuntu.com/5927-1/
reference_id USN-5927-1
reference_type
scores
url https://usn.ubuntu.com/5927-1/
37
reference_url https://usn.ubuntu.com/5934-1/
reference_id USN-5934-1
reference_type
scores
url https://usn.ubuntu.com/5934-1/
38
reference_url https://usn.ubuntu.com/5939-1/
reference_id USN-5939-1
reference_type
scores
url https://usn.ubuntu.com/5939-1/
39
reference_url https://usn.ubuntu.com/5940-1/
reference_id USN-5940-1
reference_type
scores
url https://usn.ubuntu.com/5940-1/
40
reference_url https://usn.ubuntu.com/5951-1/
reference_id USN-5951-1
reference_type
scores
url https://usn.ubuntu.com/5951-1/
41
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
42
reference_url https://usn.ubuntu.com/5981-1/
reference_id USN-5981-1
reference_type
scores
url https://usn.ubuntu.com/5981-1/
43
reference_url https://usn.ubuntu.com/5982-1/
reference_id USN-5982-1
reference_type
scores
url https://usn.ubuntu.com/5982-1/
44
reference_url https://usn.ubuntu.com/5984-1/
reference_id USN-5984-1
reference_type
scores
url https://usn.ubuntu.com/5984-1/
45
reference_url https://usn.ubuntu.com/5987-1/
reference_id USN-5987-1
reference_type
scores
url https://usn.ubuntu.com/5987-1/
46
reference_url https://usn.ubuntu.com/5991-1/
reference_id USN-5991-1
reference_type
scores
url https://usn.ubuntu.com/5991-1/
47
reference_url https://usn.ubuntu.com/6000-1/
reference_id USN-6000-1
reference_type
scores
url https://usn.ubuntu.com/6000-1/
48
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
49
reference_url https://usn.ubuntu.com/6004-1/
reference_id USN-6004-1
reference_type
scores
url https://usn.ubuntu.com/6004-1/
50
reference_url https://usn.ubuntu.com/6009-1/
reference_id USN-6009-1
reference_type
scores
url https://usn.ubuntu.com/6009-1/
51
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
52
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
53
reference_url https://usn.ubuntu.com/6024-1/
reference_id USN-6024-1
reference_type
scores
url https://usn.ubuntu.com/6024-1/
54
reference_url https://usn.ubuntu.com/6030-1/
reference_id USN-6030-1
reference_type
scores
url https://usn.ubuntu.com/6030-1/
fixed_packages
aliases CVE-2022-41218
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sv4s-h2k7-aygu
35
url VCID-v9sh-maqh-puec
vulnerability_id VCID-v9sh-maqh-puec
summary kernel: Soft lockup occurred during __page_mapcount
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1582.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1582.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1582
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02371
published_at 2026-04-09T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02348
published_at 2026-04-11T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02335
published_at 2026-04-12T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02334
published_at 2026-04-13T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02319
published_at 2026-04-16T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02325
published_at 2026-04-18T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02421
published_at 2026-04-21T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02346
published_at 2026-04-07T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.0235
published_at 2026-04-08T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.02987
published_at 2026-04-02T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03002
published_at 2026-04-04T12:55:00Z
11
value 0.00016
scoring_system epss
scoring_elements 0.03477
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1582
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1582
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2180936
reference_id 2180936
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2180936
5
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
6
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
7
reference_url https://lore.kernel.org/linux-mm/Yg6ac8WlwtnDH6M0%40kroah.com/
reference_id Yg6ac8WlwtnDH6M0%40kroah.com
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T15:00:24Z/
url https://lore.kernel.org/linux-mm/Yg6ac8WlwtnDH6M0%40kroah.com/
fixed_packages
aliases CVE-2023-1582
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v9sh-maqh-puec
36
url VCID-vmbf-nbfs-5bbb
vulnerability_id VCID-vmbf-nbfs-5bbb
summary kernel: slab-out-of-bounds read vulnerabilities in cbq_classify
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23454.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23454.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-23454
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11323
published_at 2026-04-24T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11383
published_at 2026-04-21T12:55:00Z
2
value 0.0006
scoring_system epss
scoring_elements 0.1861
published_at 2026-04-07T12:55:00Z
3
value 0.0006
scoring_system epss
scoring_elements 0.18609
published_at 2026-04-18T12:55:00Z
4
value 0.0006
scoring_system epss
scoring_elements 0.18597
published_at 2026-04-16T12:55:00Z
5
value 0.0006
scoring_system epss
scoring_elements 0.18652
published_at 2026-04-13T12:55:00Z
6
value 0.0006
scoring_system epss
scoring_elements 0.18701
published_at 2026-04-12T12:55:00Z
7
value 0.0006
scoring_system epss
scoring_elements 0.18748
published_at 2026-04-11T12:55:00Z
8
value 0.0006
scoring_system epss
scoring_elements 0.18743
published_at 2026-04-09T12:55:00Z
9
value 0.0006
scoring_system epss
scoring_elements 0.18889
published_at 2026-04-04T12:55:00Z
10
value 0.0006
scoring_system epss
scoring_elements 0.18689
published_at 2026-04-08T12:55:00Z
11
value 0.0006
scoring_system epss
scoring_elements 0.18836
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-23454
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://www.openwall.com/lists/oss-security/2023/01/10/1
reference_id 1
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:34Z/
url https://www.openwall.com/lists/oss-security/2023/01/10/1
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2168297
reference_id 2168297
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2168297
18
reference_url https://www.openwall.com/lists/oss-security/2023/01/10/4
reference_id 4
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:34Z/
url https://www.openwall.com/lists/oss-security/2023/01/10/4
19
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
20
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
21
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
22
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
23
reference_url https://www.debian.org/security/2023/dsa-5324
reference_id dsa-5324
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:34Z/
url https://www.debian.org/security/2023/dsa-5324
24
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=caa4b35b4317d5147b3ab0fbdc9c075c7d2e9c12
reference_id ?id=caa4b35b4317d5147b3ab0fbdc9c075c7d2e9c12
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:34Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=caa4b35b4317d5147b3ab0fbdc9c075c7d2e9c12
25
reference_url https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
reference_id msg00000.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:34Z/
url https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
26
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:34Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
27
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
28
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
29
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
30
reference_url https://usn.ubuntu.com/5915-1/
reference_id USN-5915-1
reference_type
scores
url https://usn.ubuntu.com/5915-1/
31
reference_url https://usn.ubuntu.com/5917-1/
reference_id USN-5917-1
reference_type
scores
url https://usn.ubuntu.com/5917-1/
32
reference_url https://usn.ubuntu.com/5934-1/
reference_id USN-5934-1
reference_type
scores
url https://usn.ubuntu.com/5934-1/
33
reference_url https://usn.ubuntu.com/5939-1/
reference_id USN-5939-1
reference_type
scores
url https://usn.ubuntu.com/5939-1/
34
reference_url https://usn.ubuntu.com/5940-1/
reference_id USN-5940-1
reference_type
scores
url https://usn.ubuntu.com/5940-1/
35
reference_url https://usn.ubuntu.com/5951-1/
reference_id USN-5951-1
reference_type
scores
url https://usn.ubuntu.com/5951-1/
36
reference_url https://usn.ubuntu.com/5982-1/
reference_id USN-5982-1
reference_type
scores
url https://usn.ubuntu.com/5982-1/
37
reference_url https://usn.ubuntu.com/5987-1/
reference_id USN-5987-1
reference_type
scores
url https://usn.ubuntu.com/5987-1/
38
reference_url https://usn.ubuntu.com/6000-1/
reference_id USN-6000-1
reference_type
scores
url https://usn.ubuntu.com/6000-1/
39
reference_url https://usn.ubuntu.com/6004-1/
reference_id USN-6004-1
reference_type
scores
url https://usn.ubuntu.com/6004-1/
40
reference_url https://usn.ubuntu.com/6079-1/
reference_id USN-6079-1
reference_type
scores
url https://usn.ubuntu.com/6079-1/
41
reference_url https://usn.ubuntu.com/6091-1/
reference_id USN-6091-1
reference_type
scores
url https://usn.ubuntu.com/6091-1/
42
reference_url https://usn.ubuntu.com/6096-1/
reference_id USN-6096-1
reference_type
scores
url https://usn.ubuntu.com/6096-1/
fixed_packages
aliases CVE-2023-23454
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vmbf-nbfs-5bbb
37
url VCID-vqy7-37ym-eufr
vulnerability_id VCID-vqy7-37ym-eufr
summary kernel: xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36879.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36879.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-36879
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.06971
published_at 2026-04-24T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.0682
published_at 2026-04-02T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06863
published_at 2026-04-04T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.06849
published_at 2026-04-07T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.06904
published_at 2026-04-08T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.06935
published_at 2026-04-09T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.06932
published_at 2026-04-11T12:55:00Z
7
value 0.00025
scoring_system epss
scoring_elements 0.06925
published_at 2026-04-12T12:55:00Z
8
value 0.00025
scoring_system epss
scoring_elements 0.06921
published_at 2026-04-13T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.0686
published_at 2026-04-16T12:55:00Z
10
value 0.00025
scoring_system epss
scoring_elements 0.06842
published_at 2026-04-18T12:55:00Z
11
value 0.00025
scoring_system epss
scoring_elements 0.06984
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-36879
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2119855
reference_id 2119855
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2119855
12
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
13
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
14
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
15
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=f85daf0e725358be78dfd208dea5fd665d8cb901
reference_id commit?id=f85daf0e725358be78dfd208dea5fd665d8cb901
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=f85daf0e725358be78dfd208dea5fd665d8cb901
16
reference_url https://www.debian.org/security/2022/dsa-5207
reference_id dsa-5207
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/
url https://www.debian.org/security/2022/dsa-5207
17
reference_url https://github.com/torvalds/linux/commit/f85daf0e725358be78dfd208dea5fd665d8cb901
reference_id f85daf0e725358be78dfd208dea5fd665d8cb901
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/
url https://github.com/torvalds/linux/commit/f85daf0e725358be78dfd208dea5fd665d8cb901
18
reference_url https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html
reference_id msg00000.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/
url https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html
19
reference_url https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html
reference_id msg00011.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/
url https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html
20
reference_url https://security.netapp.com/advisory/ntap-20220901-0007/
reference_id ntap-20220901-0007
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/
url https://security.netapp.com/advisory/ntap-20220901-0007/
21
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
22
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
23
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
24
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
25
reference_url https://access.redhat.com/errata/RHSA-2023:5627
reference_id RHSA-2023:5627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5627
26
reference_url https://access.redhat.com/errata/RHSA-2024:0431
reference_id RHSA-2024:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0431
27
reference_url https://access.redhat.com/errata/RHSA-2024:0432
reference_id RHSA-2024:0432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0432
28
reference_url https://usn.ubuntu.com/5667-1/
reference_id USN-5667-1
reference_type
scores
url https://usn.ubuntu.com/5667-1/
29
reference_url https://usn.ubuntu.com/5668-1/
reference_id USN-5668-1
reference_type
scores
url https://usn.ubuntu.com/5668-1/
30
reference_url https://usn.ubuntu.com/5677-1/
reference_id USN-5677-1
reference_type
scores
url https://usn.ubuntu.com/5677-1/
31
reference_url https://usn.ubuntu.com/5682-1/
reference_id USN-5682-1
reference_type
scores
url https://usn.ubuntu.com/5682-1/
32
reference_url https://usn.ubuntu.com/5683-1/
reference_id USN-5683-1
reference_type
scores
url https://usn.ubuntu.com/5683-1/
33
reference_url https://usn.ubuntu.com/5703-1/
reference_id USN-5703-1
reference_type
scores
url https://usn.ubuntu.com/5703-1/
34
reference_url https://usn.ubuntu.com/5706-1/
reference_id USN-5706-1
reference_type
scores
url https://usn.ubuntu.com/5706-1/
35
reference_url https://usn.ubuntu.com/5727-1/
reference_id USN-5727-1
reference_type
scores
url https://usn.ubuntu.com/5727-1/
36
reference_url https://usn.ubuntu.com/5727-2/
reference_id USN-5727-2
reference_type
scores
url https://usn.ubuntu.com/5727-2/
37
reference_url https://usn.ubuntu.com/5774-1/
reference_id USN-5774-1
reference_type
scores
url https://usn.ubuntu.com/5774-1/
38
reference_url https://usn.ubuntu.com/5913-1/
reference_id USN-5913-1
reference_type
scores
url https://usn.ubuntu.com/5913-1/
39
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
40
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
41
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
fixed_packages
aliases CVE-2022-36879
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vqy7-37ym-eufr
38
url VCID-vzpr-mm8p-yygx
vulnerability_id VCID-vzpr-mm8p-yygx
summary kernel: netfilter: nf_conntrack_irc message handling issue
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2663.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2663.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2663
reference_id
reference_type
scores
0
value 0.00178
scoring_system epss
scoring_elements 0.39049
published_at 2026-04-24T12:55:00Z
1
value 0.00178
scoring_system epss
scoring_elements 0.39345
published_at 2026-04-12T12:55:00Z
2
value 0.00178
scoring_system epss
scoring_elements 0.39327
published_at 2026-04-13T12:55:00Z
3
value 0.00178
scoring_system epss
scoring_elements 0.39379
published_at 2026-04-16T12:55:00Z
4
value 0.00178
scoring_system epss
scoring_elements 0.39351
published_at 2026-04-18T12:55:00Z
5
value 0.00178
scoring_system epss
scoring_elements 0.39264
published_at 2026-04-21T12:55:00Z
6
value 0.00178
scoring_system epss
scoring_elements 0.39363
published_at 2026-04-02T12:55:00Z
7
value 0.00178
scoring_system epss
scoring_elements 0.39387
published_at 2026-04-04T12:55:00Z
8
value 0.00178
scoring_system epss
scoring_elements 0.393
published_at 2026-04-07T12:55:00Z
9
value 0.00178
scoring_system epss
scoring_elements 0.39356
published_at 2026-04-08T12:55:00Z
10
value 0.00178
scoring_system epss
scoring_elements 0.39373
published_at 2026-04-09T12:55:00Z
11
value 0.00178
scoring_system epss
scoring_elements 0.39385
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2663
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
19
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2123056
reference_id 2123056
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2123056
21
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
22
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
23
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
24
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
25
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
26
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
27
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
28
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
29
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
30
reference_url https://usn.ubuntu.com/5791-1/
reference_id USN-5791-1
reference_type
scores
url https://usn.ubuntu.com/5791-1/
31
reference_url https://usn.ubuntu.com/5791-2/
reference_id USN-5791-2
reference_type
scores
url https://usn.ubuntu.com/5791-2/
32
reference_url https://usn.ubuntu.com/5791-3/
reference_id USN-5791-3
reference_type
scores
url https://usn.ubuntu.com/5791-3/
33
reference_url https://usn.ubuntu.com/5792-1/
reference_id USN-5792-1
reference_type
scores
url https://usn.ubuntu.com/5792-1/
34
reference_url https://usn.ubuntu.com/5792-2/
reference_id USN-5792-2
reference_type
scores
url https://usn.ubuntu.com/5792-2/
35
reference_url https://usn.ubuntu.com/5793-1/
reference_id USN-5793-1
reference_type
scores
url https://usn.ubuntu.com/5793-1/
36
reference_url https://usn.ubuntu.com/5793-2/
reference_id USN-5793-2
reference_type
scores
url https://usn.ubuntu.com/5793-2/
37
reference_url https://usn.ubuntu.com/5793-3/
reference_id USN-5793-3
reference_type
scores
url https://usn.ubuntu.com/5793-3/
38
reference_url https://usn.ubuntu.com/5793-4/
reference_id USN-5793-4
reference_type
scores
url https://usn.ubuntu.com/5793-4/
39
reference_url https://usn.ubuntu.com/5815-1/
reference_id USN-5815-1
reference_type
scores
url https://usn.ubuntu.com/5815-1/
40
reference_url https://usn.ubuntu.com/5854-1/
reference_id USN-5854-1
reference_type
scores
url https://usn.ubuntu.com/5854-1/
41
reference_url https://usn.ubuntu.com/5861-1/
reference_id USN-5861-1
reference_type
scores
url https://usn.ubuntu.com/5861-1/
42
reference_url https://usn.ubuntu.com/5862-1/
reference_id USN-5862-1
reference_type
scores
url https://usn.ubuntu.com/5862-1/
43
reference_url https://usn.ubuntu.com/5865-1/
reference_id USN-5865-1
reference_type
scores
url https://usn.ubuntu.com/5865-1/
44
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
45
reference_url https://usn.ubuntu.com/5883-1/
reference_id USN-5883-1
reference_type
scores
url https://usn.ubuntu.com/5883-1/
46
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
47
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
48
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
49
reference_url https://usn.ubuntu.com/6007-1/
reference_id USN-6007-1
reference_type
scores
url https://usn.ubuntu.com/6007-1/
50
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
51
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
52
reference_url https://usn.ubuntu.com/6247-1/
reference_id USN-6247-1
reference_type
scores
url https://usn.ubuntu.com/6247-1/
fixed_packages
aliases CVE-2022-2663
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vzpr-mm8p-yygx
39
url VCID-war3-a6kb-r7fx
vulnerability_id VCID-war3-a6kb-r7fx
summary kernel: Executable Space Protection Bypass
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-25265.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-25265.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-25265
reference_id
reference_type
scores
0
value 0.00271
scoring_system epss
scoring_elements 0.50559
published_at 2026-04-04T12:55:00Z
1
value 0.00271
scoring_system epss
scoring_elements 0.50513
published_at 2026-04-07T12:55:00Z
2
value 0.00271
scoring_system epss
scoring_elements 0.50568
published_at 2026-04-08T12:55:00Z
3
value 0.00271
scoring_system epss
scoring_elements 0.50564
published_at 2026-04-09T12:55:00Z
4
value 0.00271
scoring_system epss
scoring_elements 0.50607
published_at 2026-04-11T12:55:00Z
5
value 0.00271
scoring_system epss
scoring_elements 0.50583
published_at 2026-04-12T12:55:00Z
6
value 0.00271
scoring_system epss
scoring_elements 0.50569
published_at 2026-04-13T12:55:00Z
7
value 0.00271
scoring_system epss
scoring_elements 0.50611
published_at 2026-04-16T12:55:00Z
8
value 0.00271
scoring_system epss
scoring_elements 0.50616
published_at 2026-04-18T12:55:00Z
9
value 0.00271
scoring_system epss
scoring_elements 0.50594
published_at 2026-04-21T12:55:00Z
10
value 0.00271
scoring_system epss
scoring_elements 0.50543
published_at 2026-04-24T12:55:00Z
11
value 0.00272
scoring_system epss
scoring_elements 0.50585
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-25265
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25265
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2055499
reference_id 2055499
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2055499
4
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
5
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
6
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
fixed_packages
aliases CVE-2022-25265
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-war3-a6kb-r7fx
40
url VCID-wcxk-yf59-c3h2
vulnerability_id VCID-wcxk-yf59-c3h2
summary kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30594.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30594.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-30594
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06264
published_at 2026-04-02T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06283
published_at 2026-04-04T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.0626
published_at 2026-04-07T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06305
published_at 2026-04-08T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06346
published_at 2026-04-09T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.07008
published_at 2026-04-21T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.06995
published_at 2026-04-24T12:55:00Z
7
value 0.00025
scoring_system epss
scoring_elements 0.06959
published_at 2026-04-11T12:55:00Z
8
value 0.00025
scoring_system epss
scoring_elements 0.06951
published_at 2026-04-12T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.06946
published_at 2026-04-13T12:55:00Z
10
value 0.00025
scoring_system epss
scoring_elements 0.06882
published_at 2026-04-16T12:55:00Z
11
value 0.00025
scoring_system epss
scoring_elements 0.06865
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-30594
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
39
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
40
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2085300
reference_id 2085300
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2085300
41
reference_url https://access.redhat.com/errata/RHSA-2022:7318
reference_id RHSA-2022:7318
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7318
42
reference_url https://access.redhat.com/errata/RHSA-2022:7319
reference_id RHSA-2022:7319
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7319
43
reference_url https://access.redhat.com/errata/RHSA-2023:0300
reference_id RHSA-2023:0300
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0300
44
reference_url https://access.redhat.com/errata/RHSA-2023:0334
reference_id RHSA-2023:0334
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0334
45
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
46
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
47
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
48
reference_url https://usn.ubuntu.com/5442-1/
reference_id USN-5442-1
reference_type
scores
url https://usn.ubuntu.com/5442-1/
49
reference_url https://usn.ubuntu.com/5442-2/
reference_id USN-5442-2
reference_type
scores
url https://usn.ubuntu.com/5442-2/
50
reference_url https://usn.ubuntu.com/5443-1/
reference_id USN-5443-1
reference_type
scores
url https://usn.ubuntu.com/5443-1/
51
reference_url https://usn.ubuntu.com/5443-2/
reference_id USN-5443-2
reference_type
scores
url https://usn.ubuntu.com/5443-2/
52
reference_url https://usn.ubuntu.com/5465-1/
reference_id USN-5465-1
reference_type
scores
url https://usn.ubuntu.com/5465-1/
fixed_packages
aliases CVE-2022-30594
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wcxk-yf59-c3h2
41
url VCID-wudq-7hws-aqft
vulnerability_id VCID-wudq-7hws-aqft
summary kernel: unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39188.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39188.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-39188
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04387
published_at 2026-04-02T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04411
published_at 2026-04-18T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04422
published_at 2026-04-07T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04457
published_at 2026-04-08T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04475
published_at 2026-04-09T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04467
published_at 2026-04-11T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04452
published_at 2026-04-12T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04435
published_at 2026-04-13T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04403
published_at 2026-04-16T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.04546
published_at 2026-04-21T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04578
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-39188
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
19
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2130141
reference_id 2130141
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2130141
21
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
22
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
23
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
24
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
25
reference_url https://access.redhat.com/errata/RHSA-2023:3388
reference_id RHSA-2023:3388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3388
26
reference_url https://access.redhat.com/errata/RHSA-2023:4801
reference_id RHSA-2023:4801
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4801
27
reference_url https://access.redhat.com/errata/RHSA-2023:4814
reference_id RHSA-2023:4814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4814
28
reference_url https://usn.ubuntu.com/5790-1/
reference_id USN-5790-1
reference_type
scores
url https://usn.ubuntu.com/5790-1/
29
reference_url https://usn.ubuntu.com/5791-1/
reference_id USN-5791-1
reference_type
scores
url https://usn.ubuntu.com/5791-1/
30
reference_url https://usn.ubuntu.com/5791-2/
reference_id USN-5791-2
reference_type
scores
url https://usn.ubuntu.com/5791-2/
31
reference_url https://usn.ubuntu.com/5791-3/
reference_id USN-5791-3
reference_type
scores
url https://usn.ubuntu.com/5791-3/
32
reference_url https://usn.ubuntu.com/5792-1/
reference_id USN-5792-1
reference_type
scores
url https://usn.ubuntu.com/5792-1/
33
reference_url https://usn.ubuntu.com/5792-2/
reference_id USN-5792-2
reference_type
scores
url https://usn.ubuntu.com/5792-2/
34
reference_url https://usn.ubuntu.com/5815-1/
reference_id USN-5815-1
reference_type
scores
url https://usn.ubuntu.com/5815-1/
35
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
36
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
37
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
38
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
fixed_packages
aliases CVE-2022-39188
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wudq-7hws-aqft
42
url VCID-xp56-daaq-r7fg
vulnerability_id VCID-xp56-daaq-r7fg
summary kernel: when setting font with malicious data by ioctl PIO_FONT, kernel will write memory out of bounds
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33656.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33656.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-33656
reference_id
reference_type
scores
0
value 0.0003
scoring_system epss
scoring_elements 0.08573
published_at 2026-04-01T12:55:00Z
1
value 0.0003
scoring_system epss
scoring_elements 0.086
published_at 2026-04-02T12:55:00Z
2
value 0.0003
scoring_system epss
scoring_elements 0.08652
published_at 2026-04-04T12:55:00Z
3
value 0.0003
scoring_system epss
scoring_elements 0.0857
published_at 2026-04-07T12:55:00Z
4
value 0.0003
scoring_system epss
scoring_elements 0.08644
published_at 2026-04-08T12:55:00Z
5
value 0.0003
scoring_system epss
scoring_elements 0.08668
published_at 2026-04-09T12:55:00Z
6
value 0.0003
scoring_system epss
scoring_elements 0.08666
published_at 2026-04-11T12:55:00Z
7
value 0.0003
scoring_system epss
scoring_elements 0.08643
published_at 2026-04-12T12:55:00Z
8
value 0.0003
scoring_system epss
scoring_elements 0.0863
published_at 2026-04-13T12:55:00Z
9
value 0.0003
scoring_system epss
scoring_elements 0.0852
published_at 2026-04-16T12:55:00Z
10
value 0.0003
scoring_system epss
scoring_elements 0.08507
published_at 2026-04-18T12:55:00Z
11
value 0.0003
scoring_system epss
scoring_elements 0.08659
published_at 2026-04-21T12:55:00Z
12
value 0.0003
scoring_system epss
scoring_elements 0.08671
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-33656
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33656
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2108696
reference_id 2108696
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2108696
5
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
6
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
7
reference_url https://access.redhat.com/errata/RHSA-2023:4789
reference_id RHSA-2023:4789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4789
8
reference_url https://usn.ubuntu.com/5580-1/
reference_id USN-5580-1
reference_type
scores
url https://usn.ubuntu.com/5580-1/
9
reference_url https://usn.ubuntu.com/5589-1/
reference_id USN-5589-1
reference_type
scores
url https://usn.ubuntu.com/5589-1/
10
reference_url https://usn.ubuntu.com/5591-1/
reference_id USN-5591-1
reference_type
scores
url https://usn.ubuntu.com/5591-1/
11
reference_url https://usn.ubuntu.com/5591-2/
reference_id USN-5591-2
reference_type
scores
url https://usn.ubuntu.com/5591-2/
12
reference_url https://usn.ubuntu.com/5591-3/
reference_id USN-5591-3
reference_type
scores
url https://usn.ubuntu.com/5591-3/
13
reference_url https://usn.ubuntu.com/5591-4/
reference_id USN-5591-4
reference_type
scores
url https://usn.ubuntu.com/5591-4/
14
reference_url https://usn.ubuntu.com/5592-1/
reference_id USN-5592-1
reference_type
scores
url https://usn.ubuntu.com/5592-1/
15
reference_url https://usn.ubuntu.com/5595-1/
reference_id USN-5595-1
reference_type
scores
url https://usn.ubuntu.com/5595-1/
16
reference_url https://usn.ubuntu.com/5597-1/
reference_id USN-5597-1
reference_type
scores
url https://usn.ubuntu.com/5597-1/
17
reference_url https://usn.ubuntu.com/5598-1/
reference_id USN-5598-1
reference_type
scores
url https://usn.ubuntu.com/5598-1/
18
reference_url https://usn.ubuntu.com/5600-1/
reference_id USN-5600-1
reference_type
scores
url https://usn.ubuntu.com/5600-1/
19
reference_url https://usn.ubuntu.com/5603-1/
reference_id USN-5603-1
reference_type
scores
url https://usn.ubuntu.com/5603-1/
20
reference_url https://usn.ubuntu.com/5605-1/
reference_id USN-5605-1
reference_type
scores
url https://usn.ubuntu.com/5605-1/
21
reference_url https://usn.ubuntu.com/5650-1/
reference_id USN-5650-1
reference_type
scores
url https://usn.ubuntu.com/5650-1/
fixed_packages
aliases CVE-2021-33656
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xp56-daaq-r7fg
43
url VCID-xxe5-16mk-dqe5
vulnerability_id VCID-xxe5-16mk-dqe5
summary kernel: l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4129.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4129.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-4129
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.04989
published_at 2026-04-24T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.04956
published_at 2026-04-21T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05365
published_at 2026-04-18T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05709
published_at 2026-04-02T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05746
published_at 2026-04-07T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.0575
published_at 2026-04-04T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05739
published_at 2026-04-16T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05776
published_at 2026-04-13T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05782
published_at 2026-04-12T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.0579
published_at 2026-04-11T12:55:00Z
10
value 0.00021
scoring_system epss
scoring_elements 0.05811
published_at 2026-04-09T12:55:00Z
11
value 0.00021
scoring_system epss
scoring_elements 0.05786
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-4129
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4129
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4129
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2134528
reference_id 2134528
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2134528
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5SPXMXXFANDASPCKER2JIQO2F3UHCP/
reference_id 7X5SPXMXXFANDASPCKER2JIQO2F3UHCP
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:37:45Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5SPXMXXFANDASPCKER2JIQO2F3UHCP/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AM5KFIE6JNZXHBA5A2KYDZAT3MEX2B67/
reference_id AM5KFIE6JNZXHBA5A2KYDZAT3MEX2B67
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:37:45Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AM5KFIE6JNZXHBA5A2KYDZAT3MEX2B67/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOKXNIM2R4FQCDRQV67UMAY6EBC72QFG/
reference_id JOKXNIM2R4FQCDRQV67UMAY6EBC72QFG
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:37:45Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOKXNIM2R4FQCDRQV67UMAY6EBC72QFG/
8
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:37:45Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
9
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
10
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
11
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
12
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
13
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
14
reference_url https://lore.kernel.org/all/20221114191619.124659-1-jakub%40cloudflare.com/t
reference_id t
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:37:45Z/
url https://lore.kernel.org/all/20221114191619.124659-1-jakub%40cloudflare.com/t
15
reference_url https://lore.kernel.org/netdev/20221121085426.21315-1-jakub%40cloudflare.com/t
reference_id t
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:37:45Z/
url https://lore.kernel.org/netdev/20221121085426.21315-1-jakub%40cloudflare.com/t
16
reference_url https://usn.ubuntu.com/6025-1/
reference_id USN-6025-1
reference_type
scores
url https://usn.ubuntu.com/6025-1/
17
reference_url https://usn.ubuntu.com/6027-1/
reference_id USN-6027-1
reference_type
scores
url https://usn.ubuntu.com/6027-1/
18
reference_url https://usn.ubuntu.com/6040-1/
reference_id USN-6040-1
reference_type
scores
url https://usn.ubuntu.com/6040-1/
19
reference_url https://usn.ubuntu.com/6057-1/
reference_id USN-6057-1
reference_type
scores
url https://usn.ubuntu.com/6057-1/
20
reference_url https://usn.ubuntu.com/6079-1/
reference_id USN-6079-1
reference_type
scores
url https://usn.ubuntu.com/6079-1/
21
reference_url https://usn.ubuntu.com/6091-1/
reference_id USN-6091-1
reference_type
scores
url https://usn.ubuntu.com/6091-1/
22
reference_url https://usn.ubuntu.com/6093-1/
reference_id USN-6093-1
reference_type
scores
url https://usn.ubuntu.com/6093-1/
23
reference_url https://usn.ubuntu.com/6096-1/
reference_id USN-6096-1
reference_type
scores
url https://usn.ubuntu.com/6096-1/
24
reference_url https://usn.ubuntu.com/6134-1/
reference_id USN-6134-1
reference_type
scores
url https://usn.ubuntu.com/6134-1/
25
reference_url https://usn.ubuntu.com/6222-1/
reference_id USN-6222-1
reference_type
scores
url https://usn.ubuntu.com/6222-1/
26
reference_url https://usn.ubuntu.com/6256-1/
reference_id USN-6256-1
reference_type
scores
url https://usn.ubuntu.com/6256-1/
fixed_packages
aliases CVE-2022-4129
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xxe5-16mk-dqe5
44
url VCID-y835-khqt-aybn
vulnerability_id VCID-y835-khqt-aybn
summary kernel: race condition in hugetlb_no_page() in mm/hugetlb.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3522.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3522.json
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2150979
reference_id 2150979
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2150979
3
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
4
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
5
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
6
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
7
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
fixed_packages
aliases CVE-2022-3522
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y835-khqt-aybn
45
url VCID-zc8z-cpdy-xkak
vulnerability_id VCID-zc8z-cpdy-xkak
summary kernel: net: stmmac: fix tc flower deletion for VLAN priority Rx steering
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47592.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47592.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-47592
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.0403
published_at 2026-04-01T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04068
published_at 2026-04-02T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04198
published_at 2026-04-24T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.04097
published_at 2026-04-12T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.04071
published_at 2026-04-13T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.04053
published_at 2026-04-16T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.04064
published_at 2026-04-18T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.04186
published_at 2026-04-21T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.04087
published_at 2026-04-04T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.04101
published_at 2026-04-07T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.04106
published_at 2026-04-08T12:55:00Z
11
value 0.00017
scoring_system epss
scoring_elements 0.04125
published_at 2026-04-09T12:55:00Z
12
value 0.00017
scoring_system epss
scoring_elements 0.0411
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-47592
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2293235
reference_id 2293235
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2293235
4
reference_url https://git.kernel.org/stable/c/97cb5c82aa1dd85a39b1bd021c8b5f18af623779
reference_id 97cb5c82aa1dd85a39b1bd021c8b5f18af623779
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-20T15:19:38Z/
url https://git.kernel.org/stable/c/97cb5c82aa1dd85a39b1bd021c8b5f18af623779
5
reference_url https://git.kernel.org/stable/c/aeb7c75cb77478fdbf821628e9c95c4baa9adc63
reference_id aeb7c75cb77478fdbf821628e9c95c4baa9adc63
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-20T15:19:38Z/
url https://git.kernel.org/stable/c/aeb7c75cb77478fdbf821628e9c95c4baa9adc63
6
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
7
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
8
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
9
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
fixed_packages
aliases CVE-2021-47592
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zc8z-cpdy-xkak
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@4.18.0-477.10.1.rt7.274%3Farch=el8_8