Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@4.18.0-372.100.1?arch=el8_6
Typerpm
Namespaceredhat
Namekernel
Version4.18.0-372.100.1
Qualifiers
arch el8_6
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-5rym-k4vn-nye8
vulnerability_id VCID-5rym-k4vn-nye8
summary kernel: NULL pointer dereference in x86_emulate_insn may lead to DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1852.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1852.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1852
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04431
published_at 2026-04-01T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04469
published_at 2026-04-02T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04494
published_at 2026-04-04T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04507
published_at 2026-04-07T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04543
published_at 2026-04-08T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04558
published_at 2026-04-09T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04546
published_at 2026-04-11T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04531
published_at 2026-04-12T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04516
published_at 2026-04-13T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.04488
published_at 2026-04-16T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04497
published_at 2026-04-18T12:55:00Z
11
value 0.00018
scoring_system epss
scoring_elements 0.04633
published_at 2026-04-21T12:55:00Z
12
value 0.00018
scoring_system epss
scoring_elements 0.04675
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1852
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2089815
reference_id 2089815
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2089815
17
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
18
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
19
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
20
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
21
reference_url https://access.redhat.com/errata/RHSA-2024:1877
reference_id RHSA-2024:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1877
22
reference_url https://usn.ubuntu.com/5529-1/
reference_id USN-5529-1
reference_type
scores
url https://usn.ubuntu.com/5529-1/
23
reference_url https://usn.ubuntu.com/5594-1/
reference_id USN-5594-1
reference_type
scores
url https://usn.ubuntu.com/5594-1/
24
reference_url https://usn.ubuntu.com/5599-1/
reference_id USN-5599-1
reference_type
scores
url https://usn.ubuntu.com/5599-1/
25
reference_url https://usn.ubuntu.com/5602-1/
reference_id USN-5602-1
reference_type
scores
url https://usn.ubuntu.com/5602-1/
26
reference_url https://usn.ubuntu.com/5616-1/
reference_id USN-5616-1
reference_type
scores
url https://usn.ubuntu.com/5616-1/
27
reference_url https://usn.ubuntu.com/5623-1/
reference_id USN-5623-1
reference_type
scores
url https://usn.ubuntu.com/5623-1/
fixed_packages
aliases CVE-2022-1852
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5rym-k4vn-nye8
1
url VCID-ep2r-37u6-a7ht
vulnerability_id VCID-ep2r-37u6-a7ht
summary kernel: veth: ensure skb entering GRO are not cloned.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47099.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47099.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-47099
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.02056
published_at 2026-04-01T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02127
published_at 2026-04-02T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.0215
published_at 2026-04-24T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02109
published_at 2026-04-12T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02105
published_at 2026-04-13T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.0208
published_at 2026-04-16T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02094
published_at 2026-04-18T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02181
published_at 2026-04-21T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.02133
published_at 2026-04-04T12:55:00Z
9
value 0.00013
scoring_system epss
scoring_elements 0.02129
published_at 2026-04-08T12:55:00Z
10
value 0.00013
scoring_system epss
scoring_elements 0.02147
published_at 2026-04-09T12:55:00Z
11
value 0.00013
scoring_system epss
scoring_elements 0.02124
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-47099
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2267919
reference_id 2267919
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2267919
4
reference_url https://git.kernel.org/stable/c/9695b7de5b4760ed22132aca919570c0190cb0ce
reference_id 9695b7de5b4760ed22132aca919570c0190cb0ce
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-12T14:24:44Z/
url https://git.kernel.org/stable/c/9695b7de5b4760ed22132aca919570c0190cb0ce
5
reference_url https://git.kernel.org/stable/c/d2269ae48598e05b59ec9ea9e6e44fd33941130d
reference_id d2269ae48598e05b59ec9ea9e6e44fd33941130d
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-12T14:24:44Z/
url https://git.kernel.org/stable/c/d2269ae48598e05b59ec9ea9e6e44fd33941130d
6
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
7
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
8
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
9
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
10
reference_url https://access.redhat.com/errata/RHSA-2024:1877
reference_id RHSA-2024:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1877
fixed_packages
aliases CVE-2021-47099
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ep2r-37u6-a7ht
2
url VCID-ezb4-x5pv-myhe
vulnerability_id VCID-ezb4-x5pv-myhe
summary hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26341.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26341.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-26341
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.15515
published_at 2026-04-01T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.15558
published_at 2026-04-02T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15626
published_at 2026-04-04T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15425
published_at 2026-04-07T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.15513
published_at 2026-04-08T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15563
published_at 2026-04-09T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15526
published_at 2026-04-11T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15489
published_at 2026-04-12T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15422
published_at 2026-04-13T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.15343
published_at 2026-04-16T12:55:00Z
10
value 0.0005
scoring_system epss
scoring_elements 0.15348
published_at 2026-04-18T12:55:00Z
11
value 0.0005
scoring_system epss
scoring_elements 0.15399
published_at 2026-04-21T12:55:00Z
12
value 0.0005
scoring_system epss
scoring_elements 0.15444
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-26341
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2061703
reference_id 2061703
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2061703
4
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
5
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
6
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
7
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
8
reference_url https://access.redhat.com/errata/RHSA-2024:1877
reference_id RHSA-2024:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1877
fixed_packages
aliases CVE-2021-26341
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ezb4-x5pv-myhe
3
url VCID-j8ze-t6w6-ekak
vulnerability_id VCID-j8ze-t6w6-ekak
summary kernel: Information leak in l2cap_parse_conf_req in net/bluetooth/l2cap_core.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42895.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42895.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42895
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.21296
published_at 2026-04-24T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21444
published_at 2026-04-21T12:55:00Z
2
value 0.00076
scoring_system epss
scoring_elements 0.22822
published_at 2026-04-16T12:55:00Z
3
value 0.00076
scoring_system epss
scoring_elements 0.22816
published_at 2026-04-18T12:55:00Z
4
value 0.00076
scoring_system epss
scoring_elements 0.22829
published_at 2026-04-08T12:55:00Z
5
value 0.00076
scoring_system epss
scoring_elements 0.22882
published_at 2026-04-09T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.22902
published_at 2026-04-11T12:55:00Z
7
value 0.00076
scoring_system epss
scoring_elements 0.22865
published_at 2026-04-12T12:55:00Z
8
value 0.00076
scoring_system epss
scoring_elements 0.22809
published_at 2026-04-13T12:55:00Z
9
value 0.00076
scoring_system epss
scoring_elements 0.22918
published_at 2026-04-02T12:55:00Z
10
value 0.00076
scoring_system epss
scoring_elements 0.22962
published_at 2026-04-04T12:55:00Z
11
value 0.00076
scoring_system epss
scoring_elements 0.22755
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42895
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42895
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2147356
reference_id 2147356
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2147356
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://kernel.dance/#b1a2cd50c0357f243b7435a732b4e62ba3157a2e
reference_id #b1a2cd50c0357f243b7435a732b4e62ba3157a2e
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:36:47Z/
url https://kernel.dance/#b1a2cd50c0357f243b7435a732b4e62ba3157a2e
10
reference_url https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e
reference_id b1a2cd50c0357f243b7435a732b4e62ba3157a2e
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:36:47Z/
url https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e
11
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
12
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
13
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
14
reference_url https://access.redhat.com/errata/RHSA-2024:1877
reference_id RHSA-2024:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1877
15
reference_url https://access.redhat.com/errata/RHSA-2024:2621
reference_id RHSA-2024:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2621
16
reference_url https://usn.ubuntu.com/5780-1/
reference_id USN-5780-1
reference_type
scores
url https://usn.ubuntu.com/5780-1/
17
reference_url https://usn.ubuntu.com/5850-1/
reference_id USN-5850-1
reference_type
scores
url https://usn.ubuntu.com/5850-1/
18
reference_url https://usn.ubuntu.com/5851-1/
reference_id USN-5851-1
reference_type
scores
url https://usn.ubuntu.com/5851-1/
19
reference_url https://usn.ubuntu.com/5853-1/
reference_id USN-5853-1
reference_type
scores
url https://usn.ubuntu.com/5853-1/
20
reference_url https://usn.ubuntu.com/5858-1/
reference_id USN-5858-1
reference_type
scores
url https://usn.ubuntu.com/5858-1/
21
reference_url https://usn.ubuntu.com/5859-1/
reference_id USN-5859-1
reference_type
scores
url https://usn.ubuntu.com/5859-1/
22
reference_url https://usn.ubuntu.com/5860-1/
reference_id USN-5860-1
reference_type
scores
url https://usn.ubuntu.com/5860-1/
23
reference_url https://usn.ubuntu.com/5874-1/
reference_id USN-5874-1
reference_type
scores
url https://usn.ubuntu.com/5874-1/
24
reference_url https://usn.ubuntu.com/5875-1/
reference_id USN-5875-1
reference_type
scores
url https://usn.ubuntu.com/5875-1/
25
reference_url https://usn.ubuntu.com/5876-1/
reference_id USN-5876-1
reference_type
scores
url https://usn.ubuntu.com/5876-1/
26
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
27
reference_url https://usn.ubuntu.com/5878-1/
reference_id USN-5878-1
reference_type
scores
url https://usn.ubuntu.com/5878-1/
28
reference_url https://usn.ubuntu.com/5879-1/
reference_id USN-5879-1
reference_type
scores
url https://usn.ubuntu.com/5879-1/
29
reference_url https://usn.ubuntu.com/5883-1/
reference_id USN-5883-1
reference_type
scores
url https://usn.ubuntu.com/5883-1/
30
reference_url https://usn.ubuntu.com/5884-1/
reference_id USN-5884-1
reference_type
scores
url https://usn.ubuntu.com/5884-1/
31
reference_url https://usn.ubuntu.com/5909-1/
reference_id USN-5909-1
reference_type
scores
url https://usn.ubuntu.com/5909-1/
32
reference_url https://usn.ubuntu.com/5918-1/
reference_id USN-5918-1
reference_type
scores
url https://usn.ubuntu.com/5918-1/
33
reference_url https://usn.ubuntu.com/5919-1/
reference_id USN-5919-1
reference_type
scores
url https://usn.ubuntu.com/5919-1/
34
reference_url https://usn.ubuntu.com/5920-1/
reference_id USN-5920-1
reference_type
scores
url https://usn.ubuntu.com/5920-1/
35
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
36
reference_url https://usn.ubuntu.com/5925-1/
reference_id USN-5925-1
reference_type
scores
url https://usn.ubuntu.com/5925-1/
37
reference_url https://usn.ubuntu.com/5926-1/
reference_id USN-5926-1
reference_type
scores
url https://usn.ubuntu.com/5926-1/
38
reference_url https://usn.ubuntu.com/5927-1/
reference_id USN-5927-1
reference_type
scores
url https://usn.ubuntu.com/5927-1/
39
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
40
reference_url https://usn.ubuntu.com/6007-1/
reference_id USN-6007-1
reference_type
scores
url https://usn.ubuntu.com/6007-1/
fixed_packages
aliases CVE-2022-42895
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j8ze-t6w6-ekak
4
url VCID-qmdw-hcza-cycq
vulnerability_id VCID-qmdw-hcza-cycq
summary kernel: use-after-free and memory errors in ext4 when mounting and operating on a corrupted image
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1184.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1184.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1184
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.0628
published_at 2026-04-01T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06313
published_at 2026-04-02T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06346
published_at 2026-04-04T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06327
published_at 2026-04-07T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06374
published_at 2026-04-08T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06416
published_at 2026-04-09T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06409
published_at 2026-04-11T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06403
published_at 2026-04-12T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06392
published_at 2026-04-13T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06332
published_at 2026-04-16T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06343
published_at 2026-04-18T12:55:00Z
11
value 0.00024
scoring_system epss
scoring_elements 0.0649
published_at 2026-04-21T12:55:00Z
12
value 0.00024
scoring_system epss
scoring_elements 0.06503
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1184
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
19
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2070205
reference_id 2070205
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2070205
21
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
22
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
23
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
24
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
25
reference_url https://access.redhat.com/errata/RHSA-2024:1877
reference_id RHSA-2024:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1877
26
reference_url https://usn.ubuntu.com/6221-1/
reference_id USN-6221-1
reference_type
scores
url https://usn.ubuntu.com/6221-1/
27
reference_url https://usn.ubuntu.com/6252-1/
reference_id USN-6252-1
reference_type
scores
url https://usn.ubuntu.com/6252-1/
28
reference_url https://usn.ubuntu.com/6284-1/
reference_id USN-6284-1
reference_type
scores
url https://usn.ubuntu.com/6284-1/
29
reference_url https://usn.ubuntu.com/6301-1/
reference_id USN-6301-1
reference_type
scores
url https://usn.ubuntu.com/6301-1/
30
reference_url https://usn.ubuntu.com/6312-1/
reference_id USN-6312-1
reference_type
scores
url https://usn.ubuntu.com/6312-1/
31
reference_url https://usn.ubuntu.com/6314-1/
reference_id USN-6314-1
reference_type
scores
url https://usn.ubuntu.com/6314-1/
32
reference_url https://usn.ubuntu.com/6331-1/
reference_id USN-6331-1
reference_type
scores
url https://usn.ubuntu.com/6331-1/
33
reference_url https://usn.ubuntu.com/6337-1/
reference_id USN-6337-1
reference_type
scores
url https://usn.ubuntu.com/6337-1/
fixed_packages
aliases CVE-2022-1184
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qmdw-hcza-cycq
5
url VCID-wm98-kp5f-mudg
vulnerability_id VCID-wm98-kp5f-mudg
summary kernel: use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3640.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3640.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3640
reference_id
reference_type
scores
0
value 0.00028
scoring_system epss
scoring_elements 0.08042
published_at 2026-04-24T12:55:00Z
1
value 0.00028
scoring_system epss
scoring_elements 0.07946
published_at 2026-04-16T12:55:00Z
2
value 0.00028
scoring_system epss
scoring_elements 0.07932
published_at 2026-04-18T12:55:00Z
3
value 0.00028
scoring_system epss
scoring_elements 0.0809
published_at 2026-04-21T12:55:00Z
4
value 0.00029
scoring_system epss
scoring_elements 0.08217
published_at 2026-04-07T12:55:00Z
5
value 0.00029
scoring_system epss
scoring_elements 0.083
published_at 2026-04-09T12:55:00Z
6
value 0.00029
scoring_system epss
scoring_elements 0.08291
published_at 2026-04-11T12:55:00Z
7
value 0.00029
scoring_system epss
scoring_elements 0.08271
published_at 2026-04-12T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08252
published_at 2026-04-13T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.08281
published_at 2026-04-08T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08214
published_at 2026-04-02T12:55:00Z
11
value 0.00029
scoring_system epss
scoring_elements 0.08267
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3640
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3640
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2139610
reference_id 2139610
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2139610
5
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
6
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
7
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
8
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
9
reference_url https://access.redhat.com/errata/RHSA-2024:1877
reference_id RHSA-2024:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1877
10
reference_url https://access.redhat.com/errata/RHSA-2024:2621
reference_id RHSA-2024:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2621
11
reference_url https://access.redhat.com/errata/RHSA-2025:22910
reference_id RHSA-2025:22910
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22910
12
reference_url https://access.redhat.com/errata/RHSA-2025:22914
reference_id RHSA-2025:22914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22914
13
reference_url https://usn.ubuntu.com/5850-1/
reference_id USN-5850-1
reference_type
scores
url https://usn.ubuntu.com/5850-1/
14
reference_url https://usn.ubuntu.com/5851-1/
reference_id USN-5851-1
reference_type
scores
url https://usn.ubuntu.com/5851-1/
15
reference_url https://usn.ubuntu.com/5853-1/
reference_id USN-5853-1
reference_type
scores
url https://usn.ubuntu.com/5853-1/
16
reference_url https://usn.ubuntu.com/5860-1/
reference_id USN-5860-1
reference_type
scores
url https://usn.ubuntu.com/5860-1/
17
reference_url https://usn.ubuntu.com/5874-1/
reference_id USN-5874-1
reference_type
scores
url https://usn.ubuntu.com/5874-1/
18
reference_url https://usn.ubuntu.com/5875-1/
reference_id USN-5875-1
reference_type
scores
url https://usn.ubuntu.com/5875-1/
19
reference_url https://usn.ubuntu.com/5876-1/
reference_id USN-5876-1
reference_type
scores
url https://usn.ubuntu.com/5876-1/
20
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
21
reference_url https://usn.ubuntu.com/5878-1/
reference_id USN-5878-1
reference_type
scores
url https://usn.ubuntu.com/5878-1/
22
reference_url https://usn.ubuntu.com/5879-1/
reference_id USN-5879-1
reference_type
scores
url https://usn.ubuntu.com/5879-1/
23
reference_url https://usn.ubuntu.com/5883-1/
reference_id USN-5883-1
reference_type
scores
url https://usn.ubuntu.com/5883-1/
24
reference_url https://usn.ubuntu.com/5909-1/
reference_id USN-5909-1
reference_type
scores
url https://usn.ubuntu.com/5909-1/
25
reference_url https://usn.ubuntu.com/5918-1/
reference_id USN-5918-1
reference_type
scores
url https://usn.ubuntu.com/5918-1/
26
reference_url https://usn.ubuntu.com/5919-1/
reference_id USN-5919-1
reference_type
scores
url https://usn.ubuntu.com/5919-1/
27
reference_url https://usn.ubuntu.com/5920-1/
reference_id USN-5920-1
reference_type
scores
url https://usn.ubuntu.com/5920-1/
28
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
29
reference_url https://usn.ubuntu.com/5925-1/
reference_id USN-5925-1
reference_type
scores
url https://usn.ubuntu.com/5925-1/
30
reference_url https://usn.ubuntu.com/5927-1/
reference_id USN-5927-1
reference_type
scores
url https://usn.ubuntu.com/5927-1/
31
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
32
reference_url https://usn.ubuntu.com/6007-1/
reference_id USN-6007-1
reference_type
scores
url https://usn.ubuntu.com/6007-1/
33
reference_url https://usn.ubuntu.com/7607-1/
reference_id USN-7607-1
reference_type
scores
url https://usn.ubuntu.com/7607-1/
34
reference_url https://usn.ubuntu.com/7607-2/
reference_id USN-7607-2
reference_type
scores
url https://usn.ubuntu.com/7607-2/
35
reference_url https://usn.ubuntu.com/7607-3/
reference_id USN-7607-3
reference_type
scores
url https://usn.ubuntu.com/7607-3/
fixed_packages
aliases CVE-2022-3640
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wm98-kp5f-mudg
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-372.100.1%3Farch=el8_6