Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@4.18.0-372.93.1?arch=el8_6
Typerpm
Namespaceredhat
Namekernel
Version4.18.0-372.93.1
Qualifiers
arch el8_6
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-2n9k-dqfk-gkb9
vulnerability_id VCID-2n9k-dqfk-gkb9
summary kernel: blocking operation in dvb_frontend_get_event and wait_event_interruptible
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-31084.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-31084.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-31084
reference_id
reference_type
scores
0
value 9e-05
scoring_system epss
scoring_elements 0.00829
published_at 2026-04-04T12:55:00Z
1
value 9e-05
scoring_system epss
scoring_elements 0.00867
published_at 2026-04-24T12:55:00Z
2
value 9e-05
scoring_system epss
scoring_elements 0.0083
published_at 2026-04-07T12:55:00Z
3
value 9e-05
scoring_system epss
scoring_elements 0.00834
published_at 2026-04-08T12:55:00Z
4
value 9e-05
scoring_system epss
scoring_elements 0.00831
published_at 2026-04-09T12:55:00Z
5
value 9e-05
scoring_system epss
scoring_elements 0.0082
published_at 2026-04-18T12:55:00Z
6
value 9e-05
scoring_system epss
scoring_elements 0.00815
published_at 2026-04-16T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.00816
published_at 2026-04-13T12:55:00Z
8
value 9e-05
scoring_system epss
scoring_elements 0.00865
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-31084
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
33
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2213139
reference_id 2213139
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2213139
35
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6HIEOLEOURP4BJZMIL7UGGPYRRB44UDN/
reference_id 6HIEOLEOURP4BJZMIL7UGGPYRRB44UDN
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6HIEOLEOURP4BJZMIL7UGGPYRRB44UDN/
36
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AOATNX5UFL7V7W2QDIQKOHFFHYKWFP4W/
reference_id AOATNX5UFL7V7W2QDIQKOHFFHYKWFP4W
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AOATNX5UFL7V7W2QDIQKOHFFHYKWFP4W/
37
reference_url https://lore.kernel.org/all/CA+UBctCu7fXn4q41O_3=id1+OdyQ85tZY1x+TkT-6OVBL6KAUw%40mail.gmail.com/
reference_id CA+UBctCu7fXn4q41O_3=id1+OdyQ85tZY1x+TkT-6OVBL6KAUw%40mail.gmail.com
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/
url https://lore.kernel.org/all/CA+UBctCu7fXn4q41O_3=id1+OdyQ85tZY1x+TkT-6OVBL6KAUw%40mail.gmail.com/
38
reference_url https://www.debian.org/security/2023/dsa-5448
reference_id dsa-5448
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/
url https://www.debian.org/security/2023/dsa-5448
39
reference_url https://www.debian.org/security/2023/dsa-5480
reference_id dsa-5480
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/
url https://www.debian.org/security/2023/dsa-5480
40
reference_url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b8c75e4a1b325ea0a9433fa8834be97b5836b946
reference_id ?id=b8c75e4a1b325ea0a9433fa8834be97b5836b946
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/
url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b8c75e4a1b325ea0a9433fa8834be97b5836b946
41
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
42
reference_url https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
reference_id msg00030.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/
url https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
43
reference_url https://security.netapp.com/advisory/ntap-20230929-0003/
reference_id ntap-20230929-0003
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/
url https://security.netapp.com/advisory/ntap-20230929-0003/
44
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
45
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
46
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
47
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
48
reference_url https://usn.ubuntu.com/6231-1/
reference_id USN-6231-1
reference_type
scores
url https://usn.ubuntu.com/6231-1/
49
reference_url https://usn.ubuntu.com/6309-1/
reference_id USN-6309-1
reference_type
scores
url https://usn.ubuntu.com/6309-1/
50
reference_url https://usn.ubuntu.com/6327-1/
reference_id USN-6327-1
reference_type
scores
url https://usn.ubuntu.com/6327-1/
51
reference_url https://usn.ubuntu.com/6338-1/
reference_id USN-6338-1
reference_type
scores
url https://usn.ubuntu.com/6338-1/
52
reference_url https://usn.ubuntu.com/6338-2/
reference_id USN-6338-2
reference_type
scores
url https://usn.ubuntu.com/6338-2/
53
reference_url https://usn.ubuntu.com/6339-1/
reference_id USN-6339-1
reference_type
scores
url https://usn.ubuntu.com/6339-1/
54
reference_url https://usn.ubuntu.com/6339-2/
reference_id USN-6339-2
reference_type
scores
url https://usn.ubuntu.com/6339-2/
55
reference_url https://usn.ubuntu.com/6339-3/
reference_id USN-6339-3
reference_type
scores
url https://usn.ubuntu.com/6339-3/
56
reference_url https://usn.ubuntu.com/6339-4/
reference_id USN-6339-4
reference_type
scores
url https://usn.ubuntu.com/6339-4/
57
reference_url https://usn.ubuntu.com/6340-1/
reference_id USN-6340-1
reference_type
scores
url https://usn.ubuntu.com/6340-1/
58
reference_url https://usn.ubuntu.com/6340-2/
reference_id USN-6340-2
reference_type
scores
url https://usn.ubuntu.com/6340-2/
59
reference_url https://usn.ubuntu.com/6342-1/
reference_id USN-6342-1
reference_type
scores
url https://usn.ubuntu.com/6342-1/
60
reference_url https://usn.ubuntu.com/6342-2/
reference_id USN-6342-2
reference_type
scores
url https://usn.ubuntu.com/6342-2/
61
reference_url https://usn.ubuntu.com/6344-1/
reference_id USN-6344-1
reference_type
scores
url https://usn.ubuntu.com/6344-1/
62
reference_url https://usn.ubuntu.com/6349-1/
reference_id USN-6349-1
reference_type
scores
url https://usn.ubuntu.com/6349-1/
63
reference_url https://usn.ubuntu.com/6350-1/
reference_id USN-6350-1
reference_type
scores
url https://usn.ubuntu.com/6350-1/
64
reference_url https://usn.ubuntu.com/6351-1/
reference_id USN-6351-1
reference_type
scores
url https://usn.ubuntu.com/6351-1/
65
reference_url https://usn.ubuntu.com/6357-1/
reference_id USN-6357-1
reference_type
scores
url https://usn.ubuntu.com/6357-1/
66
reference_url https://usn.ubuntu.com/6397-1/
reference_id USN-6397-1
reference_type
scores
url https://usn.ubuntu.com/6397-1/
fixed_packages
aliases CVE-2023-31084
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2n9k-dqfk-gkb9
1
url VCID-4gq7-1egy-p7a4
vulnerability_id VCID-4gq7-1egy-p7a4
summary kernel: vmwgfx: use-after-free in vmw_cmd_res_check
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38457.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38457.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-38457
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.1298
published_at 2026-04-11T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.1302
published_at 2026-04-09T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.12944
published_at 2026-04-12T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.129
published_at 2026-04-13T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.128
published_at 2026-04-16T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.12803
published_at 2026-04-18T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.1289
published_at 2026-04-07T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.12969
published_at 2026-04-08T12:55:00Z
8
value 0.00044
scoring_system epss
scoring_elements 0.13448
published_at 2026-04-02T12:55:00Z
9
value 0.00044
scoring_system epss
scoring_elements 0.13513
published_at 2026-04-04T12:55:00Z
10
value 0.00044
scoring_system epss
scoring_elements 0.13315
published_at 2026-04-21T12:55:00Z
11
value 0.00044
scoring_system epss
scoring_elements 0.13322
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-38457
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38457
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38457
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2133455
reference_id 2133455
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2133455
5
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
6
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
7
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
8
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
9
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
10
reference_url https://access.redhat.com/errata/RHSA-2024:4823
reference_id RHSA-2024:4823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4823
11
reference_url https://access.redhat.com/errata/RHSA-2024:4831
reference_id RHSA-2024:4831
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4831
fixed_packages
aliases CVE-2022-38457
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4gq7-1egy-p7a4
2
url VCID-4w5c-d8pd-uqeb
vulnerability_id VCID-4w5c-d8pd-uqeb
summary kernel: use-after-free due to improper update of reference count in net/sched/cls_u32.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29581.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29581.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-29581
reference_id
reference_type
scores
0
value 0.00185
scoring_system epss
scoring_elements 0.40141
published_at 2026-04-24T12:55:00Z
1
value 0.00185
scoring_system epss
scoring_elements 0.40337
published_at 2026-04-11T12:55:00Z
2
value 0.00185
scoring_system epss
scoring_elements 0.403
published_at 2026-04-12T12:55:00Z
3
value 0.00185
scoring_system epss
scoring_elements 0.4028
published_at 2026-04-13T12:55:00Z
4
value 0.00185
scoring_system epss
scoring_elements 0.40327
published_at 2026-04-16T12:55:00Z
5
value 0.00185
scoring_system epss
scoring_elements 0.40296
published_at 2026-04-18T12:55:00Z
6
value 0.00185
scoring_system epss
scoring_elements 0.4022
published_at 2026-04-21T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42113
published_at 2026-04-07T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.42163
published_at 2026-04-08T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42175
published_at 2026-04-09T12:55:00Z
10
value 0.00392
scoring_system epss
scoring_elements 0.60155
published_at 2026-04-02T12:55:00Z
11
value 0.00392
scoring_system epss
scoring_elements 0.60181
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-29581
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
39
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
40
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2088021
reference_id 2088021
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2088021
41
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
42
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
43
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
44
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
45
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
46
reference_url https://usn.ubuntu.com/5442-1/
reference_id USN-5442-1
reference_type
scores
url https://usn.ubuntu.com/5442-1/
47
reference_url https://usn.ubuntu.com/5442-2/
reference_id USN-5442-2
reference_type
scores
url https://usn.ubuntu.com/5442-2/
48
reference_url https://usn.ubuntu.com/5443-1/
reference_id USN-5443-1
reference_type
scores
url https://usn.ubuntu.com/5443-1/
49
reference_url https://usn.ubuntu.com/5443-2/
reference_id USN-5443-2
reference_type
scores
url https://usn.ubuntu.com/5443-2/
50
reference_url https://usn.ubuntu.com/5444-1/
reference_id USN-5444-1
reference_type
scores
url https://usn.ubuntu.com/5444-1/
fixed_packages
aliases CVE-2022-29581
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4w5c-d8pd-uqeb
3
url VCID-58sv-d9e3-rfbf
vulnerability_id VCID-58sv-d9e3-rfbf
summary kernel: malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33655.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33655.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-33655
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06243
published_at 2026-04-01T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.0647
published_at 2026-04-24T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06366
published_at 2026-04-12T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06355
published_at 2026-04-13T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06293
published_at 2026-04-16T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06306
published_at 2026-04-18T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06455
published_at 2026-04-21T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06277
published_at 2026-04-02T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.0631
published_at 2026-04-04T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06291
published_at 2026-04-07T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06337
published_at 2026-04-08T12:55:00Z
11
value 0.00024
scoring_system epss
scoring_elements 0.06378
published_at 2026-04-09T12:55:00Z
12
value 0.00024
scoring_system epss
scoring_elements 0.06371
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-33655
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2108691
reference_id 2108691
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2108691
13
reference_url https://security.archlinux.org/AVG-2772
reference_id AVG-2772
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2772
14
reference_url https://security.archlinux.org/AVG-2773
reference_id AVG-2773
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2773
15
reference_url https://security.archlinux.org/AVG-2774
reference_id AVG-2774
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2774
16
reference_url https://security.archlinux.org/AVG-2775
reference_id AVG-2775
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2775
17
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
18
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
19
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
20
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
21
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
22
reference_url https://usn.ubuntu.com/5577-1/
reference_id USN-5577-1
reference_type
scores
url https://usn.ubuntu.com/5577-1/
23
reference_url https://usn.ubuntu.com/5580-1/
reference_id USN-5580-1
reference_type
scores
url https://usn.ubuntu.com/5580-1/
24
reference_url https://usn.ubuntu.com/5596-1/
reference_id USN-5596-1
reference_type
scores
url https://usn.ubuntu.com/5596-1/
25
reference_url https://usn.ubuntu.com/5621-1/
reference_id USN-5621-1
reference_type
scores
url https://usn.ubuntu.com/5621-1/
26
reference_url https://usn.ubuntu.com/5622-1/
reference_id USN-5622-1
reference_type
scores
url https://usn.ubuntu.com/5622-1/
27
reference_url https://usn.ubuntu.com/5623-1/
reference_id USN-5623-1
reference_type
scores
url https://usn.ubuntu.com/5623-1/
28
reference_url https://usn.ubuntu.com/5624-1/
reference_id USN-5624-1
reference_type
scores
url https://usn.ubuntu.com/5624-1/
29
reference_url https://usn.ubuntu.com/5630-1/
reference_id USN-5630-1
reference_type
scores
url https://usn.ubuntu.com/5630-1/
30
reference_url https://usn.ubuntu.com/5633-1/
reference_id USN-5633-1
reference_type
scores
url https://usn.ubuntu.com/5633-1/
31
reference_url https://usn.ubuntu.com/5635-1/
reference_id USN-5635-1
reference_type
scores
url https://usn.ubuntu.com/5635-1/
32
reference_url https://usn.ubuntu.com/5639-1/
reference_id USN-5639-1
reference_type
scores
url https://usn.ubuntu.com/5639-1/
33
reference_url https://usn.ubuntu.com/5640-1/
reference_id USN-5640-1
reference_type
scores
url https://usn.ubuntu.com/5640-1/
34
reference_url https://usn.ubuntu.com/5644-1/
reference_id USN-5644-1
reference_type
scores
url https://usn.ubuntu.com/5644-1/
35
reference_url https://usn.ubuntu.com/5647-1/
reference_id USN-5647-1
reference_type
scores
url https://usn.ubuntu.com/5647-1/
36
reference_url https://usn.ubuntu.com/5648-1/
reference_id USN-5648-1
reference_type
scores
url https://usn.ubuntu.com/5648-1/
37
reference_url https://usn.ubuntu.com/5650-1/
reference_id USN-5650-1
reference_type
scores
url https://usn.ubuntu.com/5650-1/
38
reference_url https://usn.ubuntu.com/5652-1/
reference_id USN-5652-1
reference_type
scores
url https://usn.ubuntu.com/5652-1/
39
reference_url https://usn.ubuntu.com/5654-1/
reference_id USN-5654-1
reference_type
scores
url https://usn.ubuntu.com/5654-1/
40
reference_url https://usn.ubuntu.com/5655-1/
reference_id USN-5655-1
reference_type
scores
url https://usn.ubuntu.com/5655-1/
41
reference_url https://usn.ubuntu.com/5660-1/
reference_id USN-5660-1
reference_type
scores
url https://usn.ubuntu.com/5660-1/
42
reference_url https://usn.ubuntu.com/5683-1/
reference_id USN-5683-1
reference_type
scores
url https://usn.ubuntu.com/5683-1/
fixed_packages
aliases CVE-2021-33655
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-58sv-d9e3-rfbf
4
url VCID-5yqp-43hw-cuhu
vulnerability_id VCID-5yqp-43hw-cuhu
summary kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38096.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38096.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-38096
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10537
published_at 2026-04-08T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10463
published_at 2026-04-07T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.10604
published_at 2026-04-09T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10633
published_at 2026-04-11T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.106
published_at 2026-04-12T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.10576
published_at 2026-04-13T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10445
published_at 2026-04-16T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10427
published_at 2026-04-18T12:55:00Z
8
value 0.00037
scoring_system epss
scoring_elements 0.11039
published_at 2026-04-04T12:55:00Z
9
value 0.00037
scoring_system epss
scoring_elements 0.10937
published_at 2026-04-21T12:55:00Z
10
value 0.00037
scoring_system epss
scoring_elements 0.10977
published_at 2026-04-02T12:55:00Z
11
value 0.00037
scoring_system epss
scoring_elements 0.10892
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-38096
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38096
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2133452
reference_id 2133452
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2133452
5
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T13:45:25Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
6
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
7
reference_url https://access.redhat.com/errata/RHSA-2024:1018
reference_id RHSA-2024:1018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1018
8
reference_url https://access.redhat.com/errata/RHSA-2024:1019
reference_id RHSA-2024:1019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1019
9
reference_url https://access.redhat.com/errata/RHSA-2024:1250
reference_id RHSA-2024:1250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1250
10
reference_url https://access.redhat.com/errata/RHSA-2024:1268
reference_id RHSA-2024:1268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1268
11
reference_url https://access.redhat.com/errata/RHSA-2024:1269
reference_id RHSA-2024:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1269
12
reference_url https://access.redhat.com/errata/RHSA-2024:1306
reference_id RHSA-2024:1306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1306
13
reference_url https://access.redhat.com/errata/RHSA-2024:1367
reference_id RHSA-2024:1367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1367
14
reference_url https://access.redhat.com/errata/RHSA-2024:1382
reference_id RHSA-2024:1382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1382
15
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
16
reference_url https://access.redhat.com/errata/RHSA-2024:1607
reference_id RHSA-2024:1607
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1607
17
reference_url https://access.redhat.com/errata/RHSA-2024:1614
reference_id RHSA-2024:1614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1614
18
reference_url https://access.redhat.com/errata/RHSA-2024:2093
reference_id RHSA-2024:2093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2093
19
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
20
reference_url https://bugzilla.openanolis.cn/show_bug.cgi?id=2073
reference_id show_bug.cgi?id=2073
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T13:45:25Z/
url https://bugzilla.openanolis.cn/show_bug.cgi?id=2073
21
reference_url https://usn.ubuntu.com/6816-1/
reference_id USN-6816-1
reference_type
scores
url https://usn.ubuntu.com/6816-1/
22
reference_url https://usn.ubuntu.com/6817-1/
reference_id USN-6817-1
reference_type
scores
url https://usn.ubuntu.com/6817-1/
23
reference_url https://usn.ubuntu.com/6817-2/
reference_id USN-6817-2
reference_type
scores
url https://usn.ubuntu.com/6817-2/
24
reference_url https://usn.ubuntu.com/6817-3/
reference_id USN-6817-3
reference_type
scores
url https://usn.ubuntu.com/6817-3/
25
reference_url https://usn.ubuntu.com/6878-1/
reference_id USN-6878-1
reference_type
scores
url https://usn.ubuntu.com/6878-1/
26
reference_url https://usn.ubuntu.com/6898-1/
reference_id USN-6898-1
reference_type
scores
url https://usn.ubuntu.com/6898-1/
27
reference_url https://usn.ubuntu.com/6898-2/
reference_id USN-6898-2
reference_type
scores
url https://usn.ubuntu.com/6898-2/
28
reference_url https://usn.ubuntu.com/6898-3/
reference_id USN-6898-3
reference_type
scores
url https://usn.ubuntu.com/6898-3/
29
reference_url https://usn.ubuntu.com/6898-4/
reference_id USN-6898-4
reference_type
scores
url https://usn.ubuntu.com/6898-4/
30
reference_url https://usn.ubuntu.com/6917-1/
reference_id USN-6917-1
reference_type
scores
url https://usn.ubuntu.com/6917-1/
31
reference_url https://usn.ubuntu.com/6919-1/
reference_id USN-6919-1
reference_type
scores
url https://usn.ubuntu.com/6919-1/
32
reference_url https://usn.ubuntu.com/6927-1/
reference_id USN-6927-1
reference_type
scores
url https://usn.ubuntu.com/6927-1/
33
reference_url https://usn.ubuntu.com/7019-1/
reference_id USN-7019-1
reference_type
scores
url https://usn.ubuntu.com/7019-1/
34
reference_url https://usn.ubuntu.com/7173-1/
reference_id USN-7173-1
reference_type
scores
url https://usn.ubuntu.com/7173-1/
35
reference_url https://usn.ubuntu.com/7173-2/
reference_id USN-7173-2
reference_type
scores
url https://usn.ubuntu.com/7173-2/
36
reference_url https://usn.ubuntu.com/7173-3/
reference_id USN-7173-3
reference_type
scores
url https://usn.ubuntu.com/7173-3/
37
reference_url https://usn.ubuntu.com/7195-1/
reference_id USN-7195-1
reference_type
scores
url https://usn.ubuntu.com/7195-1/
38
reference_url https://usn.ubuntu.com/7195-2/
reference_id USN-7195-2
reference_type
scores
url https://usn.ubuntu.com/7195-2/
39
reference_url https://usn.ubuntu.com/7413-1/
reference_id USN-7413-1
reference_type
scores
url https://usn.ubuntu.com/7413-1/
fixed_packages
aliases CVE-2022-38096
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5yqp-43hw-cuhu
5
url VCID-5zmf-5v9v-k3h1
vulnerability_id VCID-5zmf-5v9v-k3h1
summary kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51042.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51042.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-51042
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.0907
published_at 2026-04-02T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09179
published_at 2026-04-24T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.0912
published_at 2026-04-12T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09105
published_at 2026-04-13T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09001
published_at 2026-04-16T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.0898
published_at 2026-04-18T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09136
published_at 2026-04-21T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09123
published_at 2026-04-04T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.09042
published_at 2026-04-07T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.09122
published_at 2026-04-08T12:55:00Z
10
value 0.00032
scoring_system epss
scoring_elements 0.09151
published_at 2026-04-09T12:55:00Z
11
value 0.00032
scoring_system epss
scoring_elements 0.09153
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-51042
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51042
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2259866
reference_id 2259866
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2259866
5
reference_url https://github.com/torvalds/linux/commit/2e54154b9f27262efd0cb4f903cc7d5ad1fe9628
reference_id 2e54154b9f27262efd0cb4f903cc7d5ad1fe9628
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:10Z/
url https://github.com/torvalds/linux/commit/2e54154b9f27262efd0cb4f903cc7d5ad1fe9628
6
reference_url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.12
reference_id ChangeLog-6.4.12
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:10Z/
url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.12
7
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
8
reference_url https://access.redhat.com/errata/RHSA-2024:1018
reference_id RHSA-2024:1018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1018
9
reference_url https://access.redhat.com/errata/RHSA-2024:1019
reference_id RHSA-2024:1019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1019
10
reference_url https://access.redhat.com/errata/RHSA-2024:1248
reference_id RHSA-2024:1248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1248
11
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
12
reference_url https://access.redhat.com/errata/RHSA-2024:1607
reference_id RHSA-2024:1607
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1607
13
reference_url https://access.redhat.com/errata/RHSA-2024:1614
reference_id RHSA-2024:1614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1614
14
reference_url https://access.redhat.com/errata/RHSA-2024:2093
reference_id RHSA-2024:2093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2093
15
reference_url https://access.redhat.com/errata/RHSA-2024:2094
reference_id RHSA-2024:2094
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2094
fixed_packages
aliases CVE-2023-51042
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5zmf-5v9v-k3h1
6
url VCID-7e2m-a86y-c3bd
vulnerability_id VCID-7e2m-a86y-c3bd
summary kernel: media: em28xx: initialize refcount before kref_get
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3239.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3239.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3239
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07549
published_at 2026-04-24T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07568
published_at 2026-04-11T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07554
published_at 2026-04-12T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07542
published_at 2026-04-13T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07455
published_at 2026-04-18T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07588
published_at 2026-04-21T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07466
published_at 2026-04-16T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07505
published_at 2026-04-04T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07487
published_at 2026-04-07T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07546
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3239
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3239
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3239
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2127985
reference_id 2127985
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2127985
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
10
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
11
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
12
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
13
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
14
reference_url https://usn.ubuntu.com/5757-1/
reference_id USN-5757-1
reference_type
scores
url https://usn.ubuntu.com/5757-1/
15
reference_url https://usn.ubuntu.com/5757-2/
reference_id USN-5757-2
reference_type
scores
url https://usn.ubuntu.com/5757-2/
16
reference_url https://usn.ubuntu.com/5758-1/
reference_id USN-5758-1
reference_type
scores
url https://usn.ubuntu.com/5758-1/
17
reference_url https://usn.ubuntu.com/5774-1/
reference_id USN-5774-1
reference_type
scores
url https://usn.ubuntu.com/5774-1/
fixed_packages
aliases CVE-2022-3239
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7e2m-a86y-c3bd
7
url VCID-86j6-rxsj-jucj
vulnerability_id VCID-86j6-rxsj-jucj
summary kernel: sctp: fail if no bound addresses can be used for a given scope
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1074.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1074.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1074
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01603
published_at 2026-04-11T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01609
published_at 2026-04-07T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01594
published_at 2026-04-12T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01618
published_at 2026-04-09T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01611
published_at 2026-04-08T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01592
published_at 2026-04-13T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02004
published_at 2026-04-24T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02018
published_at 2026-04-21T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02428
published_at 2026-04-18T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02421
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1074
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1074
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.openwall.com/lists/oss-security/2023/01/23/1
reference_id 1
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:31Z/
url https://www.openwall.com/lists/oss-security/2023/01/23/1
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2173430
reference_id 2173430
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:31Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2173430
6
reference_url http://www.openwall.com/lists/oss-security/2023/11/05/4
reference_id 4
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:31Z/
url http://www.openwall.com/lists/oss-security/2023/11/05/4
7
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=458e279f861d3f61796894cd158b780765a1569f
reference_id ?id=458e279f861d3f61796894cd158b780765a1569f
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:31Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=458e279f861d3f61796894cd158b780765a1569f
8
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:31Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
9
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:31Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
10
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
11
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
12
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
13
reference_url https://access.redhat.com/errata/RHSA-2024:0723
reference_id RHSA-2024:0723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0723
14
reference_url https://access.redhat.com/errata/RHSA-2024:0725
reference_id RHSA-2024:0725
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0725
15
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
16
reference_url https://usn.ubuntu.com/5978-1/
reference_id USN-5978-1
reference_type
scores
url https://usn.ubuntu.com/5978-1/
17
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
18
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
19
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
20
reference_url https://usn.ubuntu.com/6025-1/
reference_id USN-6025-1
reference_type
scores
url https://usn.ubuntu.com/6025-1/
21
reference_url https://usn.ubuntu.com/6027-1/
reference_id USN-6027-1
reference_type
scores
url https://usn.ubuntu.com/6027-1/
22
reference_url https://usn.ubuntu.com/6029-1/
reference_id USN-6029-1
reference_type
scores
url https://usn.ubuntu.com/6029-1/
23
reference_url https://usn.ubuntu.com/6030-1/
reference_id USN-6030-1
reference_type
scores
url https://usn.ubuntu.com/6030-1/
24
reference_url https://usn.ubuntu.com/6031-1/
reference_id USN-6031-1
reference_type
scores
url https://usn.ubuntu.com/6031-1/
25
reference_url https://usn.ubuntu.com/6032-1/
reference_id USN-6032-1
reference_type
scores
url https://usn.ubuntu.com/6032-1/
26
reference_url https://usn.ubuntu.com/6040-1/
reference_id USN-6040-1
reference_type
scores
url https://usn.ubuntu.com/6040-1/
27
reference_url https://usn.ubuntu.com/6057-1/
reference_id USN-6057-1
reference_type
scores
url https://usn.ubuntu.com/6057-1/
28
reference_url https://usn.ubuntu.com/6079-1/
reference_id USN-6079-1
reference_type
scores
url https://usn.ubuntu.com/6079-1/
29
reference_url https://usn.ubuntu.com/6091-1/
reference_id USN-6091-1
reference_type
scores
url https://usn.ubuntu.com/6091-1/
30
reference_url https://usn.ubuntu.com/6093-1/
reference_id USN-6093-1
reference_type
scores
url https://usn.ubuntu.com/6093-1/
31
reference_url https://usn.ubuntu.com/6096-1/
reference_id USN-6096-1
reference_type
scores
url https://usn.ubuntu.com/6096-1/
32
reference_url https://usn.ubuntu.com/6134-1/
reference_id USN-6134-1
reference_type
scores
url https://usn.ubuntu.com/6134-1/
33
reference_url https://usn.ubuntu.com/6222-1/
reference_id USN-6222-1
reference_type
scores
url https://usn.ubuntu.com/6222-1/
34
reference_url https://usn.ubuntu.com/6256-1/
reference_id USN-6256-1
reference_type
scores
url https://usn.ubuntu.com/6256-1/
fixed_packages
aliases CVE-2023-1074
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-86j6-rxsj-jucj
8
url VCID-8uzn-q3h8-8qfs
vulnerability_id VCID-8uzn-q3h8-8qfs
summary kernel: KVM: nVMX: missing consistency checks for CR0 and CR4
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-30456.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-30456.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-30456
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.0134
published_at 2026-04-21T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01347
published_at 2026-04-24T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03291
published_at 2026-04-07T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03282
published_at 2026-04-04T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03297
published_at 2026-04-08T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03233
published_at 2026-04-18T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.03223
published_at 2026-04-16T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03246
published_at 2026-04-13T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.03267
published_at 2026-04-12T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03295
published_at 2026-04-11T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03272
published_at 2026-04-02T12:55:00Z
11
value 0.00015
scoring_system epss
scoring_elements 0.03318
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-30456
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30456
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/torvalds/linux/commit/112e66017bff7f2837030f34c2bc19501e9212d5
reference_id 112e66017bff7f2837030f34c2bc19501e9212d5
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/
url https://github.com/torvalds/linux/commit/112e66017bff7f2837030f34c2bc19501e9212d5
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188468
reference_id 2188468
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188468
6
reference_url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.8
reference_id ChangeLog-6.2.8
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/
url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.8
7
reference_url http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html
reference_id Kernel-Live-Patch-Security-Notice-LSN-0096-1.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/
url http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html
8
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
9
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
10
reference_url https://security.netapp.com/advisory/ntap-20230511-0007/
reference_id ntap-20230511-0007
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/
url https://security.netapp.com/advisory/ntap-20230511-0007/
11
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
12
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
13
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
14
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
15
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
16
reference_url https://usn.ubuntu.com/6033-1/
reference_id USN-6033-1
reference_type
scores
url https://usn.ubuntu.com/6033-1/
17
reference_url https://usn.ubuntu.com/6123-1/
reference_id USN-6123-1
reference_type
scores
url https://usn.ubuntu.com/6123-1/
18
reference_url https://usn.ubuntu.com/6124-1/
reference_id USN-6124-1
reference_type
scores
url https://usn.ubuntu.com/6124-1/
19
reference_url https://usn.ubuntu.com/6127-1/
reference_id USN-6127-1
reference_type
scores
url https://usn.ubuntu.com/6127-1/
20
reference_url https://usn.ubuntu.com/6130-1/
reference_id USN-6130-1
reference_type
scores
url https://usn.ubuntu.com/6130-1/
21
reference_url https://usn.ubuntu.com/6131-1/
reference_id USN-6131-1
reference_type
scores
url https://usn.ubuntu.com/6131-1/
22
reference_url https://usn.ubuntu.com/6132-1/
reference_id USN-6132-1
reference_type
scores
url https://usn.ubuntu.com/6132-1/
23
reference_url https://usn.ubuntu.com/6135-1/
reference_id USN-6135-1
reference_type
scores
url https://usn.ubuntu.com/6135-1/
24
reference_url https://usn.ubuntu.com/6149-1/
reference_id USN-6149-1
reference_type
scores
url https://usn.ubuntu.com/6149-1/
25
reference_url https://usn.ubuntu.com/6150-1/
reference_id USN-6150-1
reference_type
scores
url https://usn.ubuntu.com/6150-1/
26
reference_url https://usn.ubuntu.com/6162-1/
reference_id USN-6162-1
reference_type
scores
url https://usn.ubuntu.com/6162-1/
27
reference_url https://usn.ubuntu.com/6175-1/
reference_id USN-6175-1
reference_type
scores
url https://usn.ubuntu.com/6175-1/
28
reference_url https://usn.ubuntu.com/6186-1/
reference_id USN-6186-1
reference_type
scores
url https://usn.ubuntu.com/6186-1/
29
reference_url https://usn.ubuntu.com/6222-1/
reference_id USN-6222-1
reference_type
scores
url https://usn.ubuntu.com/6222-1/
30
reference_url https://usn.ubuntu.com/6256-1/
reference_id USN-6256-1
reference_type
scores
url https://usn.ubuntu.com/6256-1/
31
reference_url https://usn.ubuntu.com/6699-1/
reference_id USN-6699-1
reference_type
scores
url https://usn.ubuntu.com/6699-1/
fixed_packages
aliases CVE-2023-30456
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8uzn-q3h8-8qfs
9
url VCID-bdpj-gk16-a3dz
vulnerability_id VCID-bdpj-gk16-a3dz
summary kernel: net/packet: slab-out-of-bounds access in packet_recvmsg()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-20368.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-20368.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-20368
reference_id
reference_type
scores
0
value 0.00052
scoring_system epss
scoring_elements 0.16153
published_at 2026-04-24T12:55:00Z
1
value 0.00052
scoring_system epss
scoring_elements 0.16204
published_at 2026-04-16T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.16223
published_at 2026-04-18T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.16261
published_at 2026-04-21T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.21147
published_at 2026-04-04T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.20941
published_at 2026-04-08T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.21003
published_at 2026-04-09T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.21019
published_at 2026-04-11T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.20974
published_at 2026-04-12T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.2092
published_at 2026-04-13T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.20942
published_at 2026-04-01T12:55:00Z
11
value 0.00068
scoring_system epss
scoring_elements 0.20861
published_at 2026-04-07T12:55:00Z
12
value 0.00068
scoring_system epss
scoring_elements 0.21093
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-20368
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20368
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2123695
reference_id 2123695
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2123695
5
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
6
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
7
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
8
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
9
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
10
reference_url https://usn.ubuntu.com/5580-1/
reference_id USN-5580-1
reference_type
scores
url https://usn.ubuntu.com/5580-1/
11
reference_url https://usn.ubuntu.com/5650-1/
reference_id USN-5650-1
reference_type
scores
url https://usn.ubuntu.com/5650-1/
fixed_packages
aliases CVE-2022-20368
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bdpj-gk16-a3dz
10
url VCID-cavt-1v84-uqgt
vulnerability_id VCID-cavt-1v84-uqgt
summary kernel: GSM multiplexing race condition leads to privilege escalation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6546.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6546.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6546
reference_id
reference_type
scores
0
value 0.00328
scoring_system epss
scoring_elements 0.55796
published_at 2026-04-02T12:55:00Z
1
value 0.00328
scoring_system epss
scoring_elements 0.55818
published_at 2026-04-04T12:55:00Z
2
value 0.00328
scoring_system epss
scoring_elements 0.55798
published_at 2026-04-07T12:55:00Z
3
value 0.00328
scoring_system epss
scoring_elements 0.55849
published_at 2026-04-08T12:55:00Z
4
value 0.00328
scoring_system epss
scoring_elements 0.55852
published_at 2026-04-09T12:55:00Z
5
value 0.00328
scoring_system epss
scoring_elements 0.55861
published_at 2026-04-11T12:55:00Z
6
value 0.00328
scoring_system epss
scoring_elements 0.55822
published_at 2026-04-13T12:55:00Z
7
value 0.00328
scoring_system epss
scoring_elements 0.55859
published_at 2026-04-16T12:55:00Z
8
value 0.00328
scoring_system epss
scoring_elements 0.55862
published_at 2026-04-18T12:55:00Z
9
value 0.00328
scoring_system epss
scoring_elements 0.55841
published_at 2026-04-12T12:55:00Z
10
value 0.00337
scoring_system epss
scoring_elements 0.56589
published_at 2026-04-21T12:55:00Z
11
value 0.00337
scoring_system epss
scoring_elements 0.56524
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6546
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6546
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255498
reference_id 2255498
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255498
5
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
6
reference_url https://access.redhat.com/errata/RHSA-2024:0937
reference_id RHSA-2024:0937
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0937
7
reference_url https://access.redhat.com/errata/RHSA-2024:1018
reference_id RHSA-2024:1018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1018
8
reference_url https://access.redhat.com/errata/RHSA-2024:1019
reference_id RHSA-2024:1019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1019
9
reference_url https://access.redhat.com/errata/RHSA-2024:1055
reference_id RHSA-2024:1055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1055
10
reference_url https://access.redhat.com/errata/RHSA-2024:1250
reference_id RHSA-2024:1250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1250
11
reference_url https://access.redhat.com/errata/RHSA-2024:1253
reference_id RHSA-2024:1253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1253
12
reference_url https://access.redhat.com/errata/RHSA-2024:1306
reference_id RHSA-2024:1306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1306
13
reference_url https://access.redhat.com/errata/RHSA-2024:1607
reference_id RHSA-2024:1607
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1607
14
reference_url https://access.redhat.com/errata/RHSA-2024:1612
reference_id RHSA-2024:1612
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1612
15
reference_url https://access.redhat.com/errata/RHSA-2024:1614
reference_id RHSA-2024:1614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1614
16
reference_url https://access.redhat.com/errata/RHSA-2024:2093
reference_id RHSA-2024:2093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2093
17
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
18
reference_url https://access.redhat.com/errata/RHSA-2024:2621
reference_id RHSA-2024:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2621
19
reference_url https://access.redhat.com/errata/RHSA-2024:2697
reference_id RHSA-2024:2697
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2697
20
reference_url https://access.redhat.com/errata/RHSA-2024:4577
reference_id RHSA-2024:4577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4577
21
reference_url https://access.redhat.com/errata/RHSA-2024:4729
reference_id RHSA-2024:4729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4729
22
reference_url https://access.redhat.com/errata/RHSA-2024:4731
reference_id RHSA-2024:4731
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4731
23
reference_url https://access.redhat.com/errata/RHSA-2024:4970
reference_id RHSA-2024:4970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4970
fixed_packages
aliases CVE-2023-6546
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cavt-1v84-uqgt
11
url VCID-gpdn-rup2-7fey
vulnerability_id VCID-gpdn-rup2-7fey
summary kernel: vmwgfx: use-after-free in vmw_execbuf_tie_context
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40133.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40133.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-40133
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.1298
published_at 2026-04-11T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.1302
published_at 2026-04-09T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.12944
published_at 2026-04-12T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.129
published_at 2026-04-13T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.128
published_at 2026-04-16T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.12803
published_at 2026-04-18T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.1289
published_at 2026-04-07T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.12969
published_at 2026-04-08T12:55:00Z
8
value 0.00044
scoring_system epss
scoring_elements 0.13448
published_at 2026-04-02T12:55:00Z
9
value 0.00044
scoring_system epss
scoring_elements 0.13513
published_at 2026-04-04T12:55:00Z
10
value 0.00044
scoring_system epss
scoring_elements 0.13315
published_at 2026-04-21T12:55:00Z
11
value 0.00044
scoring_system epss
scoring_elements 0.13322
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-40133
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40133
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2133453
reference_id 2133453
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2133453
5
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
6
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
7
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
8
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
9
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
10
reference_url https://access.redhat.com/errata/RHSA-2024:4823
reference_id RHSA-2024:4823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4823
11
reference_url https://access.redhat.com/errata/RHSA-2024:4831
reference_id RHSA-2024:4831
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4831
fixed_packages
aliases CVE-2022-40133
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gpdn-rup2-7fey
12
url VCID-k4hm-xb4b-cbaw
vulnerability_id VCID-k4hm-xb4b-cbaw
summary hw: cpu: arm64: Spectre-BHB
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23960.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23960.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23960
reference_id
reference_type
scores
0
value 0.00195
scoring_system epss
scoring_elements 0.41419
published_at 2026-04-02T12:55:00Z
1
value 0.00195
scoring_system epss
scoring_elements 0.41447
published_at 2026-04-04T12:55:00Z
2
value 0.00195
scoring_system epss
scoring_elements 0.41375
published_at 2026-04-07T12:55:00Z
3
value 0.00195
scoring_system epss
scoring_elements 0.41425
published_at 2026-04-08T12:55:00Z
4
value 0.00195
scoring_system epss
scoring_elements 0.41433
published_at 2026-04-09T12:55:00Z
5
value 0.00195
scoring_system epss
scoring_elements 0.41453
published_at 2026-04-11T12:55:00Z
6
value 0.00195
scoring_system epss
scoring_elements 0.41421
published_at 2026-04-18T12:55:00Z
7
value 0.00195
scoring_system epss
scoring_elements 0.41406
published_at 2026-04-13T12:55:00Z
8
value 0.00195
scoring_system epss
scoring_elements 0.41449
published_at 2026-04-16T12:55:00Z
9
value 0.00195
scoring_system epss
scoring_elements 0.41348
published_at 2026-04-21T12:55:00Z
10
value 0.00195
scoring_system epss
scoring_elements 0.41239
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23960
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
39
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
40
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2062284
reference_id 2062284
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2062284
41
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
42
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
43
reference_url https://usn.ubuntu.com/5317-1/
reference_id USN-5317-1
reference_type
scores
url https://usn.ubuntu.com/5317-1/
44
reference_url https://usn.ubuntu.com/5318-1/
reference_id USN-5318-1
reference_type
scores
url https://usn.ubuntu.com/5318-1/
45
reference_url https://usn.ubuntu.com/5362-1/
reference_id USN-5362-1
reference_type
scores
url https://usn.ubuntu.com/5362-1/
fixed_packages
aliases CVE-2022-23960
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k4hm-xb4b-cbaw
13
url VCID-kkm1-jzbg-97d3
vulnerability_id VCID-kkm1-jzbg-97d3
summary kernel: vmwgfx: integer overflow in vmwgfx_execbuf.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36402.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36402.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-36402
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.15574
published_at 2026-04-02T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.15642
published_at 2026-04-04T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15442
published_at 2026-04-07T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15529
published_at 2026-04-08T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.15584
published_at 2026-04-09T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15548
published_at 2026-04-11T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15511
published_at 2026-04-12T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15445
published_at 2026-04-13T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15367
published_at 2026-04-16T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.1537
published_at 2026-04-18T12:55:00Z
10
value 0.0005
scoring_system epss
scoring_elements 0.15423
published_at 2026-04-21T12:55:00Z
11
value 0.0005
scoring_system epss
scoring_elements 0.15467
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-36402
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36402
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2133451
reference_id 2133451
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2133451
5
reference_url https://access.redhat.com/errata/RHSA-2024:0113
reference_id RHSA-2024:0113
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0113
6
reference_url https://access.redhat.com/errata/RHSA-2024:0134
reference_id RHSA-2024:0134
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0134
7
reference_url https://access.redhat.com/errata/RHSA-2024:0461
reference_id RHSA-2024:0461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0461
8
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
9
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
10
reference_url https://access.redhat.com/errata/RHSA-2024:4823
reference_id RHSA-2024:4823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4823
11
reference_url https://access.redhat.com/errata/RHSA-2024:4831
reference_id RHSA-2024:4831
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4831
12
reference_url https://usn.ubuntu.com/7088-1/
reference_id USN-7088-1
reference_type
scores
url https://usn.ubuntu.com/7088-1/
13
reference_url https://usn.ubuntu.com/7088-2/
reference_id USN-7088-2
reference_type
scores
url https://usn.ubuntu.com/7088-2/
14
reference_url https://usn.ubuntu.com/7088-3/
reference_id USN-7088-3
reference_type
scores
url https://usn.ubuntu.com/7088-3/
15
reference_url https://usn.ubuntu.com/7088-4/
reference_id USN-7088-4
reference_type
scores
url https://usn.ubuntu.com/7088-4/
16
reference_url https://usn.ubuntu.com/7088-5/
reference_id USN-7088-5
reference_type
scores
url https://usn.ubuntu.com/7088-5/
17
reference_url https://usn.ubuntu.com/7119-1/
reference_id USN-7119-1
reference_type
scores
url https://usn.ubuntu.com/7119-1/
18
reference_url https://usn.ubuntu.com/7183-1/
reference_id USN-7183-1
reference_type
scores
url https://usn.ubuntu.com/7183-1/
19
reference_url https://usn.ubuntu.com/7184-1/
reference_id USN-7184-1
reference_type
scores
url https://usn.ubuntu.com/7184-1/
20
reference_url https://usn.ubuntu.com/7185-1/
reference_id USN-7185-1
reference_type
scores
url https://usn.ubuntu.com/7185-1/
21
reference_url https://usn.ubuntu.com/7185-2/
reference_id USN-7185-2
reference_type
scores
url https://usn.ubuntu.com/7185-2/
fixed_packages
aliases CVE-2022-36402
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kkm1-jzbg-97d3
14
url VCID-m26e-r8mc-jbbq
vulnerability_id VCID-m26e-r8mc-jbbq
summary kernel: KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2196.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2196.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2196
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09677
published_at 2026-04-24T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09629
published_at 2026-04-21T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12452
published_at 2026-04-02T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.1238
published_at 2026-04-08T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.1243
published_at 2026-04-09T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.12437
published_at 2026-04-11T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12398
published_at 2026-04-12T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.12358
published_at 2026-04-13T12:55:00Z
8
value 0.00041
scoring_system epss
scoring_elements 0.12259
published_at 2026-04-16T12:55:00Z
9
value 0.00041
scoring_system epss
scoring_elements 0.12258
published_at 2026-04-18T12:55:00Z
10
value 0.00041
scoring_system epss
scoring_elements 0.12496
published_at 2026-04-04T12:55:00Z
11
value 0.00041
scoring_system epss
scoring_elements 0.12301
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2196
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2196
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2160023
reference_id 2160023
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2160023
5
reference_url https://kernel.dance/#2e7eab81425a
reference_id #2e7eab81425a
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-01T15:07:47Z/
url https://kernel.dance/#2e7eab81425a
6
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2e7eab81425ad6c875f2ed47c0ce01e78afc38a5
reference_id ?id=2e7eab81425ad6c875f2ed47c0ce01e78afc38a5
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-01T15:07:47Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2e7eab81425ad6c875f2ed47c0ce01e78afc38a5
7
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-01T15:07:47Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
8
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
9
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
10
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
11
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
12
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
13
reference_url https://usn.ubuntu.com/5970-1/
reference_id USN-5970-1
reference_type
scores
url https://usn.ubuntu.com/5970-1/
14
reference_url https://usn.ubuntu.com/5976-1/
reference_id USN-5976-1
reference_type
scores
url https://usn.ubuntu.com/5976-1/
15
reference_url https://usn.ubuntu.com/5977-1/
reference_id USN-5977-1
reference_type
scores
url https://usn.ubuntu.com/5977-1/
16
reference_url https://usn.ubuntu.com/5978-1/
reference_id USN-5978-1
reference_type
scores
url https://usn.ubuntu.com/5978-1/
17
reference_url https://usn.ubuntu.com/5979-1/
reference_id USN-5979-1
reference_type
scores
url https://usn.ubuntu.com/5979-1/
18
reference_url https://usn.ubuntu.com/5980-1/
reference_id USN-5980-1
reference_type
scores
url https://usn.ubuntu.com/5980-1/
19
reference_url https://usn.ubuntu.com/5982-1/
reference_id USN-5982-1
reference_type
scores
url https://usn.ubuntu.com/5982-1/
20
reference_url https://usn.ubuntu.com/5985-1/
reference_id USN-5985-1
reference_type
scores
url https://usn.ubuntu.com/5985-1/
21
reference_url https://usn.ubuntu.com/5987-1/
reference_id USN-5987-1
reference_type
scores
url https://usn.ubuntu.com/5987-1/
22
reference_url https://usn.ubuntu.com/6004-1/
reference_id USN-6004-1
reference_type
scores
url https://usn.ubuntu.com/6004-1/
23
reference_url https://usn.ubuntu.com/6020-1/
reference_id USN-6020-1
reference_type
scores
url https://usn.ubuntu.com/6020-1/
24
reference_url https://usn.ubuntu.com/6151-1/
reference_id USN-6151-1
reference_type
scores
url https://usn.ubuntu.com/6151-1/
fixed_packages
aliases CVE-2022-2196
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m26e-r8mc-jbbq
15
url VCID-nck8-brgn-hkdx
vulnerability_id VCID-nck8-brgn-hkdx
summary kernel: use-after-free after failed devlink reload in devlink_param_get
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3625.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3625.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3625
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05869
published_at 2026-04-24T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05836
published_at 2026-04-21T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06078
published_at 2026-04-02T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06089
published_at 2026-04-07T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.0613
published_at 2026-04-08T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06169
published_at 2026-04-09T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06159
published_at 2026-04-11T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06154
published_at 2026-04-12T12:55:00Z
8
value 0.00023
scoring_system epss
scoring_elements 0.06147
published_at 2026-04-13T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06107
published_at 2026-04-16T12:55:00Z
10
value 0.00023
scoring_system epss
scoring_elements 0.06118
published_at 2026-04-18T12:55:00Z
11
value 0.00023
scoring_system epss
scoring_elements 0.06106
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3625
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3625
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3625
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2144720
reference_id 2144720
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2144720
5
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
6
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
7
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
8
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
9
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
10
reference_url https://usn.ubuntu.com/5728-1/
reference_id USN-5728-1
reference_type
scores
url https://usn.ubuntu.com/5728-1/
11
reference_url https://usn.ubuntu.com/5728-2/
reference_id USN-5728-2
reference_type
scores
url https://usn.ubuntu.com/5728-2/
12
reference_url https://usn.ubuntu.com/5728-3/
reference_id USN-5728-3
reference_type
scores
url https://usn.ubuntu.com/5728-3/
13
reference_url https://usn.ubuntu.com/5729-1/
reference_id USN-5729-1
reference_type
scores
url https://usn.ubuntu.com/5729-1/
14
reference_url https://usn.ubuntu.com/5729-2/
reference_id USN-5729-2
reference_type
scores
url https://usn.ubuntu.com/5729-2/
fixed_packages
aliases CVE-2022-3625
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nck8-brgn-hkdx
16
url VCID-qkq7-ws9x-43f7
vulnerability_id VCID-qkq7-ws9x-43f7
summary kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1086.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1086.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-1086
reference_id
reference_type
scores
0
value 0.85405
scoring_system epss
scoring_elements 0.99364
published_at 2026-04-07T12:55:00Z
1
value 0.85405
scoring_system epss
scoring_elements 0.99369
published_at 2026-04-18T12:55:00Z
2
value 0.85405
scoring_system epss
scoring_elements 0.99367
published_at 2026-04-13T12:55:00Z
3
value 0.85405
scoring_system epss
scoring_elements 0.99366
published_at 2026-04-11T12:55:00Z
4
value 0.85405
scoring_system epss
scoring_elements 0.99365
published_at 2026-04-09T12:55:00Z
5
value 0.85911
scoring_system epss
scoring_elements 0.99383
published_at 2026-04-04T12:55:00Z
6
value 0.86056
scoring_system epss
scoring_elements 0.99389
published_at 2026-04-02T12:55:00Z
7
value 0.86753
scoring_system epss
scoring_elements 0.99429
published_at 2026-04-24T12:55:00Z
8
value 0.86753
scoring_system epss
scoring_elements 0.99427
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-1086
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1086
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1086
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://www.openwall.com/lists/oss-security/2024/04/14/1
reference_id 1
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url http://www.openwall.com/lists/oss-security/2024/04/14/1
5
reference_url http://www.openwall.com/lists/oss-security/2024/04/15/2
reference_id 2
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url http://www.openwall.com/lists/oss-security/2024/04/15/2
6
reference_url http://www.openwall.com/lists/oss-security/2024/04/10/22
reference_id 22
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url http://www.openwall.com/lists/oss-security/2024/04/10/22
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2262126
reference_id 2262126
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2262126
8
reference_url http://www.openwall.com/lists/oss-security/2024/04/10/23
reference_id 23
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url http://www.openwall.com/lists/oss-security/2024/04/10/23
9
reference_url http://www.openwall.com/lists/oss-security/2024/04/17/5
reference_id 5
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url http://www.openwall.com/lists/oss-security/2024/04/17/5
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/
reference_id 7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/
11
reference_url https://github.com/Notselwyn/CVE-2024-1086
reference_id CVE-2024-1086
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url https://github.com/Notselwyn/CVE-2024-1086
12
reference_url https://kernel.dance/f342de4e2f33e0e39165d8639387aa6c19dff660
reference_id f342de4e2f33e0e39165d8639387aa6c19dff660
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url https://kernel.dance/f342de4e2f33e0e39165d8639387aa6c19dff660
13
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660
reference_id ?id=f342de4e2f33e0e39165d8639387aa6c19dff660
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660
14
reference_url https://news.ycombinator.com/item?id=39828424
reference_id item?id=39828424
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url https://news.ycombinator.com/item?id=39828424
15
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
reference_id msg00016.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
16
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
reference_id msg00020.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
17
reference_url https://pwning.tech/nftables/
reference_id nftables
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url https://pwning.tech/nftables/
18
reference_url https://security.netapp.com/advisory/ntap-20240614-0009/
reference_id ntap-20240614-0009
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url https://security.netapp.com/advisory/ntap-20240614-0009/
19
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
20
reference_url https://access.redhat.com/errata/RHSA-2024:1018
reference_id RHSA-2024:1018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1018
21
reference_url https://access.redhat.com/errata/RHSA-2024:1019
reference_id RHSA-2024:1019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1019
22
reference_url https://access.redhat.com/errata/RHSA-2024:1249
reference_id RHSA-2024:1249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1249
23
reference_url https://access.redhat.com/errata/RHSA-2024:1332
reference_id RHSA-2024:1332
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1332
24
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
25
reference_url https://access.redhat.com/errata/RHSA-2024:1607
reference_id RHSA-2024:1607
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1607
26
reference_url https://access.redhat.com/errata/RHSA-2024:1614
reference_id RHSA-2024:1614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1614
27
reference_url https://access.redhat.com/errata/RHSA-2024:2093
reference_id RHSA-2024:2093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2093
28
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
29
reference_url https://access.redhat.com/errata/RHSA-2024:2697
reference_id RHSA-2024:2697
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2697
30
reference_url https://access.redhat.com/errata/RHSA-2024:3318
reference_id RHSA-2024:3318
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3318
31
reference_url https://access.redhat.com/errata/RHSA-2024:3319
reference_id RHSA-2024:3319
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3319
32
reference_url https://access.redhat.com/errata/RHSA-2024:3414
reference_id RHSA-2024:3414
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3414
33
reference_url https://access.redhat.com/errata/RHSA-2024:3421
reference_id RHSA-2024:3421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3421
34
reference_url https://access.redhat.com/errata/RHSA-2024:3427
reference_id RHSA-2024:3427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3427
35
reference_url https://access.redhat.com/errata/RHSA-2024:3528
reference_id RHSA-2024:3528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3528
36
reference_url https://access.redhat.com/errata/RHSA-2024:3529
reference_id RHSA-2024:3529
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3529
37
reference_url https://access.redhat.com/errata/RHSA-2024:3530
reference_id RHSA-2024:3530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3530
38
reference_url https://access.redhat.com/errata/RHSA-2024:3805
reference_id RHSA-2024:3805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3805
39
reference_url https://access.redhat.com/errata/RHSA-2024:4073
reference_id RHSA-2024:4073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4073
40
reference_url https://access.redhat.com/errata/RHSA-2024:4074
reference_id RHSA-2024:4074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4074
41
reference_url https://access.redhat.com/errata/RHSA-2024:4075
reference_id RHSA-2024:4075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4075
42
reference_url https://usn.ubuntu.com/6688-1/
reference_id USN-6688-1
reference_type
scores
url https://usn.ubuntu.com/6688-1/
43
reference_url https://usn.ubuntu.com/6700-1/
reference_id USN-6700-1
reference_type
scores
url https://usn.ubuntu.com/6700-1/
44
reference_url https://usn.ubuntu.com/6700-2/
reference_id USN-6700-2
reference_type
scores
url https://usn.ubuntu.com/6700-2/
45
reference_url https://usn.ubuntu.com/6701-1/
reference_id USN-6701-1
reference_type
scores
url https://usn.ubuntu.com/6701-1/
46
reference_url https://usn.ubuntu.com/6701-2/
reference_id USN-6701-2
reference_type
scores
url https://usn.ubuntu.com/6701-2/
47
reference_url https://usn.ubuntu.com/6701-3/
reference_id USN-6701-3
reference_type
scores
url https://usn.ubuntu.com/6701-3/
48
reference_url https://usn.ubuntu.com/6701-4/
reference_id USN-6701-4
reference_type
scores
url https://usn.ubuntu.com/6701-4/
49
reference_url https://usn.ubuntu.com/6702-1/
reference_id USN-6702-1
reference_type
scores
url https://usn.ubuntu.com/6702-1/
50
reference_url https://usn.ubuntu.com/6702-2/
reference_id USN-6702-2
reference_type
scores
url https://usn.ubuntu.com/6702-2/
51
reference_url https://usn.ubuntu.com/6704-1/
reference_id USN-6704-1
reference_type
scores
url https://usn.ubuntu.com/6704-1/
52
reference_url https://usn.ubuntu.com/6704-2/
reference_id USN-6704-2
reference_type
scores
url https://usn.ubuntu.com/6704-2/
53
reference_url https://usn.ubuntu.com/6704-3/
reference_id USN-6704-3
reference_type
scores
url https://usn.ubuntu.com/6704-3/
54
reference_url https://usn.ubuntu.com/6704-4/
reference_id USN-6704-4
reference_type
scores
url https://usn.ubuntu.com/6704-4/
55
reference_url https://usn.ubuntu.com/6705-1/
reference_id USN-6705-1
reference_type
scores
url https://usn.ubuntu.com/6705-1/
56
reference_url https://usn.ubuntu.com/6707-1/
reference_id USN-6707-1
reference_type
scores
url https://usn.ubuntu.com/6707-1/
57
reference_url https://usn.ubuntu.com/6707-2/
reference_id USN-6707-2
reference_type
scores
url https://usn.ubuntu.com/6707-2/
58
reference_url https://usn.ubuntu.com/6707-3/
reference_id USN-6707-3
reference_type
scores
url https://usn.ubuntu.com/6707-3/
59
reference_url https://usn.ubuntu.com/6707-4/
reference_id USN-6707-4
reference_type
scores
url https://usn.ubuntu.com/6707-4/
60
reference_url https://usn.ubuntu.com/6716-1/
reference_id USN-6716-1
reference_type
scores
url https://usn.ubuntu.com/6716-1/
fixed_packages
aliases CVE-2024-1086
risk_score 10.0
exploitability 2.0
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qkq7-ws9x-43f7
17
url VCID-wmdx-p5fr-yqe4
vulnerability_id VCID-wmdx-p5fr-yqe4
summary kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6931.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6931.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6931
reference_id
reference_type
scores
0
value 0.00437
scoring_system epss
scoring_elements 0.62987
published_at 2026-04-02T12:55:00Z
1
value 0.00437
scoring_system epss
scoring_elements 0.63016
published_at 2026-04-04T12:55:00Z
2
value 0.00437
scoring_system epss
scoring_elements 0.6298
published_at 2026-04-07T12:55:00Z
3
value 0.00437
scoring_system epss
scoring_elements 0.63031
published_at 2026-04-08T12:55:00Z
4
value 0.00437
scoring_system epss
scoring_elements 0.63047
published_at 2026-04-09T12:55:00Z
5
value 0.00437
scoring_system epss
scoring_elements 0.63064
published_at 2026-04-16T12:55:00Z
6
value 0.00437
scoring_system epss
scoring_elements 0.6305
published_at 2026-04-21T12:55:00Z
7
value 0.00437
scoring_system epss
scoring_elements 0.63028
published_at 2026-04-13T12:55:00Z
8
value 0.00437
scoring_system epss
scoring_elements 0.63072
published_at 2026-04-18T12:55:00Z
9
value 0.00437
scoring_system epss
scoring_elements 0.63071
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6931
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2252731
reference_id 2252731
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2252731
22
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
23
reference_url https://access.redhat.com/errata/RHSA-2024:1018
reference_id RHSA-2024:1018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1018
24
reference_url https://access.redhat.com/errata/RHSA-2024:1019
reference_id RHSA-2024:1019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1019
25
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
26
reference_url https://access.redhat.com/errata/RHSA-2024:1607
reference_id RHSA-2024:1607
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1607
27
reference_url https://access.redhat.com/errata/RHSA-2024:1614
reference_id RHSA-2024:1614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1614
28
reference_url https://access.redhat.com/errata/RHSA-2024:1836
reference_id RHSA-2024:1836
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1836
29
reference_url https://access.redhat.com/errata/RHSA-2024:1840
reference_id RHSA-2024:1840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1840
30
reference_url https://access.redhat.com/errata/RHSA-2024:2093
reference_id RHSA-2024:2093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2093
31
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
32
reference_url https://usn.ubuntu.com/6602-1/
reference_id USN-6602-1
reference_type
scores
url https://usn.ubuntu.com/6602-1/
33
reference_url https://usn.ubuntu.com/6603-1/
reference_id USN-6603-1
reference_type
scores
url https://usn.ubuntu.com/6603-1/
34
reference_url https://usn.ubuntu.com/6604-1/
reference_id USN-6604-1
reference_type
scores
url https://usn.ubuntu.com/6604-1/
35
reference_url https://usn.ubuntu.com/6604-2/
reference_id USN-6604-2
reference_type
scores
url https://usn.ubuntu.com/6604-2/
36
reference_url https://usn.ubuntu.com/6605-1/
reference_id USN-6605-1
reference_type
scores
url https://usn.ubuntu.com/6605-1/
37
reference_url https://usn.ubuntu.com/6605-2/
reference_id USN-6605-2
reference_type
scores
url https://usn.ubuntu.com/6605-2/
38
reference_url https://usn.ubuntu.com/6606-1/
reference_id USN-6606-1
reference_type
scores
url https://usn.ubuntu.com/6606-1/
39
reference_url https://usn.ubuntu.com/6607-1/
reference_id USN-6607-1
reference_type
scores
url https://usn.ubuntu.com/6607-1/
40
reference_url https://usn.ubuntu.com/6608-1/
reference_id USN-6608-1
reference_type
scores
url https://usn.ubuntu.com/6608-1/
41
reference_url https://usn.ubuntu.com/6608-2/
reference_id USN-6608-2
reference_type
scores
url https://usn.ubuntu.com/6608-2/
42
reference_url https://usn.ubuntu.com/6609-1/
reference_id USN-6609-1
reference_type
scores
url https://usn.ubuntu.com/6609-1/
43
reference_url https://usn.ubuntu.com/6609-2/
reference_id USN-6609-2
reference_type
scores
url https://usn.ubuntu.com/6609-2/
44
reference_url https://usn.ubuntu.com/6609-3/
reference_id USN-6609-3
reference_type
scores
url https://usn.ubuntu.com/6609-3/
45
reference_url https://usn.ubuntu.com/6628-1/
reference_id USN-6628-1
reference_type
scores
url https://usn.ubuntu.com/6628-1/
46
reference_url https://usn.ubuntu.com/6628-2/
reference_id USN-6628-2
reference_type
scores
url https://usn.ubuntu.com/6628-2/
47
reference_url https://usn.ubuntu.com/6635-1/
reference_id USN-6635-1
reference_type
scores
url https://usn.ubuntu.com/6635-1/
fixed_packages
aliases CVE-2023-6931
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wmdx-p5fr-yqe4
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-372.93.1%3Farch=el8_6