Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/redhat-virtualization-host@4.5.2-202209140405_8?arch=6
Typerpm
Namespaceredhat
Nameredhat-virtualization-host
Version4.5.2-202209140405_8
Qualifiers
arch 6
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-4g3g-qmrg-tbf6
vulnerability_id VCID-4g3g-qmrg-tbf6
summary Multiple vulnerabilities have been discovered in rsync, the worst of which can lead to denial of service or information disclosure.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29154.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29154.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-29154
reference_id
reference_type
scores
0
value 0.00502
scoring_system epss
scoring_elements 0.66059
published_at 2026-04-21T12:55:00Z
1
value 0.00674
scoring_system epss
scoring_elements 0.71362
published_at 2026-04-02T12:55:00Z
2
value 0.00674
scoring_system epss
scoring_elements 0.71379
published_at 2026-04-04T12:55:00Z
3
value 0.00674
scoring_system epss
scoring_elements 0.71354
published_at 2026-04-07T12:55:00Z
4
value 0.00674
scoring_system epss
scoring_elements 0.71395
published_at 2026-04-08T12:55:00Z
5
value 0.00674
scoring_system epss
scoring_elements 0.71408
published_at 2026-04-09T12:55:00Z
6
value 0.00674
scoring_system epss
scoring_elements 0.7143
published_at 2026-04-11T12:55:00Z
7
value 0.00674
scoring_system epss
scoring_elements 0.71415
published_at 2026-04-12T12:55:00Z
8
value 0.00674
scoring_system epss
scoring_elements 0.71397
published_at 2026-04-13T12:55:00Z
9
value 0.00674
scoring_system epss
scoring_elements 0.71443
published_at 2026-04-16T12:55:00Z
10
value 0.00674
scoring_system epss
scoring_elements 0.71449
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-29154
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29154
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29154
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016543
reference_id 1016543
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016543
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2110928
reference_id 2110928
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2110928
6
reference_url https://security.gentoo.org/glsa/202405-22
reference_id GLSA-202405-22
reference_type
scores
url https://security.gentoo.org/glsa/202405-22
7
reference_url https://access.redhat.com/errata/RHSA-2022:6170
reference_id RHSA-2022:6170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6170
8
reference_url https://access.redhat.com/errata/RHSA-2022:6171
reference_id RHSA-2022:6171
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6171
9
reference_url https://access.redhat.com/errata/RHSA-2022:6172
reference_id RHSA-2022:6172
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6172
10
reference_url https://access.redhat.com/errata/RHSA-2022:6173
reference_id RHSA-2022:6173
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6173
11
reference_url https://access.redhat.com/errata/RHSA-2022:6180
reference_id RHSA-2022:6180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6180
12
reference_url https://access.redhat.com/errata/RHSA-2022:6181
reference_id RHSA-2022:6181
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6181
13
reference_url https://access.redhat.com/errata/RHSA-2022:6551
reference_id RHSA-2022:6551
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6551
14
reference_url https://usn.ubuntu.com/5921-1/
reference_id USN-5921-1
reference_type
scores
url https://usn.ubuntu.com/5921-1/
fixed_packages
aliases CVE-2022-29154
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4g3g-qmrg-tbf6
1
url VCID-4swn-75b9-wfa2
vulnerability_id VCID-4swn-75b9-wfa2
summary dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2132.json
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2132.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2132
reference_id
reference_type
scores
0
value 0.00538
scoring_system epss
scoring_elements 0.67578
published_at 2026-04-21T12:55:00Z
1
value 0.00598
scoring_system epss
scoring_elements 0.69425
published_at 2026-04-16T12:55:00Z
2
value 0.00598
scoring_system epss
scoring_elements 0.69436
published_at 2026-04-18T12:55:00Z
3
value 0.0078
scoring_system epss
scoring_elements 0.73635
published_at 2026-04-07T12:55:00Z
4
value 0.0078
scoring_system epss
scoring_elements 0.7367
published_at 2026-04-08T12:55:00Z
5
value 0.0078
scoring_system epss
scoring_elements 0.73683
published_at 2026-04-09T12:55:00Z
6
value 0.0078
scoring_system epss
scoring_elements 0.73705
published_at 2026-04-11T12:55:00Z
7
value 0.0078
scoring_system epss
scoring_elements 0.73688
published_at 2026-04-12T12:55:00Z
8
value 0.0078
scoring_system epss
scoring_elements 0.73679
published_at 2026-04-13T12:55:00Z
9
value 0.0078
scoring_system epss
scoring_elements 0.73638
published_at 2026-04-02T12:55:00Z
10
value 0.0078
scoring_system epss
scoring_elements 0.73662
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2132
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2132
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28199
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1019589
reference_id 1019589
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1019589
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2099475
reference_id 2099475
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2099475
7
reference_url https://access.redhat.com/errata/RHSA-2022:6382
reference_id RHSA-2022:6382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6382
8
reference_url https://access.redhat.com/errata/RHSA-2022:6383
reference_id RHSA-2022:6383
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6383
9
reference_url https://access.redhat.com/errata/RHSA-2022:6384
reference_id RHSA-2022:6384
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6384
10
reference_url https://access.redhat.com/errata/RHSA-2022:6385
reference_id RHSA-2022:6385
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6385
11
reference_url https://access.redhat.com/errata/RHSA-2022:6386
reference_id RHSA-2022:6386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6386
12
reference_url https://access.redhat.com/errata/RHSA-2022:6551
reference_id RHSA-2022:6551
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6551
13
reference_url https://access.redhat.com/errata/RHSA-2022:6850
reference_id RHSA-2022:6850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6850
14
reference_url https://access.redhat.com/errata/RHSA-2022:7268
reference_id RHSA-2022:7268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7268
15
reference_url https://access.redhat.com/errata/RHSA-2022:8263
reference_id RHSA-2022:8263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8263
16
reference_url https://access.redhat.com/errata/RHSA-2023:0166
reference_id RHSA-2023:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0166
17
reference_url https://access.redhat.com/errata/RHSA-2023:0167
reference_id RHSA-2023:0167
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0167
18
reference_url https://access.redhat.com/errata/RHSA-2023:0168
reference_id RHSA-2023:0168
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0168
19
reference_url https://access.redhat.com/errata/RHSA-2023:0169
reference_id RHSA-2023:0169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0169
20
reference_url https://access.redhat.com/errata/RHSA-2023:0170
reference_id RHSA-2023:0170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0170
21
reference_url https://access.redhat.com/errata/RHSA-2023:0171
reference_id RHSA-2023:0171
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0171
22
reference_url https://access.redhat.com/errata/RHSA-2023:0172
reference_id RHSA-2023:0172
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0172
23
reference_url https://usn.ubuntu.com/5608-1/
reference_id USN-5608-1
reference_type
scores
url https://usn.ubuntu.com/5608-1/
fixed_packages
aliases CVE-2022-2132
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4swn-75b9-wfa2
2
url VCID-5c6z-1ebs-wfev
vulnerability_id VCID-5c6z-1ebs-wfev
summary kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1012.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1012.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1012
reference_id
reference_type
scores
0
value 0.00305
scoring_system epss
scoring_elements 0.53709
published_at 2026-04-01T12:55:00Z
1
value 0.00305
scoring_system epss
scoring_elements 0.53757
published_at 2026-04-04T12:55:00Z
2
value 0.00305
scoring_system epss
scoring_elements 0.53779
published_at 2026-04-09T12:55:00Z
3
value 0.00305
scoring_system epss
scoring_elements 0.53828
published_at 2026-04-11T12:55:00Z
4
value 0.00305
scoring_system epss
scoring_elements 0.53811
published_at 2026-04-12T12:55:00Z
5
value 0.00305
scoring_system epss
scoring_elements 0.53796
published_at 2026-04-13T12:55:00Z
6
value 0.00305
scoring_system epss
scoring_elements 0.53833
published_at 2026-04-16T12:55:00Z
7
value 0.00305
scoring_system epss
scoring_elements 0.53837
published_at 2026-04-18T12:55:00Z
8
value 0.00305
scoring_system epss
scoring_elements 0.5373
published_at 2026-04-07T12:55:00Z
9
value 0.00305
scoring_system epss
scoring_elements 0.53782
published_at 2026-04-08T12:55:00Z
10
value 0.00388
scoring_system epss
scoring_elements 0.59936
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1012
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
45
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
46
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2064604
reference_id 2064604
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2064604
47
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
48
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
49
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
50
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
51
reference_url https://access.redhat.com/errata/RHSA-2022:5214
reference_id RHSA-2022:5214
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5214
52
reference_url https://access.redhat.com/errata/RHSA-2022:5220
reference_id RHSA-2022:5220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5220
53
reference_url https://access.redhat.com/errata/RHSA-2022:5224
reference_id RHSA-2022:5224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5224
54
reference_url https://access.redhat.com/errata/RHSA-2022:5249
reference_id RHSA-2022:5249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5249
55
reference_url https://access.redhat.com/errata/RHSA-2022:5267
reference_id RHSA-2022:5267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5267
56
reference_url https://access.redhat.com/errata/RHSA-2022:5626
reference_id RHSA-2022:5626
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5626
57
reference_url https://access.redhat.com/errata/RHSA-2022:5633
reference_id RHSA-2022:5633
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5633
58
reference_url https://access.redhat.com/errata/RHSA-2022:5636
reference_id RHSA-2022:5636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5636
59
reference_url https://access.redhat.com/errata/RHSA-2022:5819
reference_id RHSA-2022:5819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5819
60
reference_url https://access.redhat.com/errata/RHSA-2022:5834
reference_id RHSA-2022:5834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5834
61
reference_url https://access.redhat.com/errata/RHSA-2022:6551
reference_id RHSA-2022:6551
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6551
62
reference_url https://usn.ubuntu.com/5471-1/
reference_id USN-5471-1
reference_type
scores
url https://usn.ubuntu.com/5471-1/
63
reference_url https://usn.ubuntu.com/5594-1/
reference_id USN-5594-1
reference_type
scores
url https://usn.ubuntu.com/5594-1/
64
reference_url https://usn.ubuntu.com/5599-1/
reference_id USN-5599-1
reference_type
scores
url https://usn.ubuntu.com/5599-1/
65
reference_url https://usn.ubuntu.com/5602-1/
reference_id USN-5602-1
reference_type
scores
url https://usn.ubuntu.com/5602-1/
66
reference_url https://usn.ubuntu.com/5616-1/
reference_id USN-5616-1
reference_type
scores
url https://usn.ubuntu.com/5616-1/
67
reference_url https://usn.ubuntu.com/5622-1/
reference_id USN-5622-1
reference_type
scores
url https://usn.ubuntu.com/5622-1/
68
reference_url https://usn.ubuntu.com/5623-1/
reference_id USN-5623-1
reference_type
scores
url https://usn.ubuntu.com/5623-1/
69
reference_url https://usn.ubuntu.com/5630-1/
reference_id USN-5630-1
reference_type
scores
url https://usn.ubuntu.com/5630-1/
70
reference_url https://usn.ubuntu.com/5639-1/
reference_id USN-5639-1
reference_type
scores
url https://usn.ubuntu.com/5639-1/
71
reference_url https://usn.ubuntu.com/5647-1/
reference_id USN-5647-1
reference_type
scores
url https://usn.ubuntu.com/5647-1/
72
reference_url https://usn.ubuntu.com/5654-1/
reference_id USN-5654-1
reference_type
scores
url https://usn.ubuntu.com/5654-1/
73
reference_url https://usn.ubuntu.com/5660-1/
reference_id USN-5660-1
reference_type
scores
url https://usn.ubuntu.com/5660-1/
74
reference_url https://usn.ubuntu.com/5669-1/
reference_id USN-5669-1
reference_type
scores
url https://usn.ubuntu.com/5669-1/
75
reference_url https://usn.ubuntu.com/5669-2/
reference_id USN-5669-2
reference_type
scores
url https://usn.ubuntu.com/5669-2/
76
reference_url https://usn.ubuntu.com/5678-1/
reference_id USN-5678-1
reference_type
scores
url https://usn.ubuntu.com/5678-1/
77
reference_url https://usn.ubuntu.com/5679-1/
reference_id USN-5679-1
reference_type
scores
url https://usn.ubuntu.com/5679-1/
78
reference_url https://usn.ubuntu.com/5684-1/
reference_id USN-5684-1
reference_type
scores
url https://usn.ubuntu.com/5684-1/
79
reference_url https://usn.ubuntu.com/5687-1/
reference_id USN-5687-1
reference_type
scores
url https://usn.ubuntu.com/5687-1/
80
reference_url https://usn.ubuntu.com/5695-1/
reference_id USN-5695-1
reference_type
scores
url https://usn.ubuntu.com/5695-1/
fixed_packages
aliases CVE-2022-1012
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5c6z-1ebs-wfev
3
url VCID-7p2k-q6vr-3kf5
vulnerability_id VCID-7p2k-q6vr-3kf5
summary systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2526.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2526.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2526
reference_id
reference_type
scores
0
value 0.00295
scoring_system epss
scoring_elements 0.52788
published_at 2026-04-02T12:55:00Z
1
value 0.00295
scoring_system epss
scoring_elements 0.52814
published_at 2026-04-04T12:55:00Z
2
value 0.00295
scoring_system epss
scoring_elements 0.52782
published_at 2026-04-07T12:55:00Z
3
value 0.00295
scoring_system epss
scoring_elements 0.52833
published_at 2026-04-08T12:55:00Z
4
value 0.00295
scoring_system epss
scoring_elements 0.52827
published_at 2026-04-09T12:55:00Z
5
value 0.00295
scoring_system epss
scoring_elements 0.52877
published_at 2026-04-11T12:55:00Z
6
value 0.00295
scoring_system epss
scoring_elements 0.52861
published_at 2026-04-12T12:55:00Z
7
value 0.00295
scoring_system epss
scoring_elements 0.52846
published_at 2026-04-13T12:55:00Z
8
value 0.00295
scoring_system epss
scoring_elements 0.52883
published_at 2026-04-16T12:55:00Z
9
value 0.00295
scoring_system epss
scoring_elements 0.5289
published_at 2026-04-18T12:55:00Z
10
value 0.00295
scoring_system epss
scoring_elements 0.52873
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2526
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2526
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2109926
reference_id 2109926
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2109926
5
reference_url https://access.redhat.com/errata/RHSA-2022:6160
reference_id RHSA-2022:6160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6160
6
reference_url https://access.redhat.com/errata/RHSA-2022:6161
reference_id RHSA-2022:6161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6161
7
reference_url https://access.redhat.com/errata/RHSA-2022:6162
reference_id RHSA-2022:6162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6162
8
reference_url https://access.redhat.com/errata/RHSA-2022:6163
reference_id RHSA-2022:6163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6163
9
reference_url https://access.redhat.com/errata/RHSA-2022:6206
reference_id RHSA-2022:6206
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6206
10
reference_url https://access.redhat.com/errata/RHSA-2022:6551
reference_id RHSA-2022:6551
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6551
11
reference_url https://usn.ubuntu.com/5583-1/
reference_id USN-5583-1
reference_type
scores
url https://usn.ubuntu.com/5583-1/
12
reference_url https://usn.ubuntu.com/5583-2/
reference_id USN-5583-2
reference_type
scores
url https://usn.ubuntu.com/5583-2/
fixed_packages
aliases CVE-2022-2526
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7p2k-q6vr-3kf5
4
url VCID-gkac-yybb-pqdv
vulnerability_id VCID-gkac-yybb-pqdv
summary kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32250.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32250.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32250
reference_id
reference_type
scores
0
value 0.0124
scoring_system epss
scoring_elements 0.79195
published_at 2026-04-02T12:55:00Z
1
value 0.0124
scoring_system epss
scoring_elements 0.79219
published_at 2026-04-04T12:55:00Z
2
value 0.01876
scoring_system epss
scoring_elements 0.8312
published_at 2026-04-09T12:55:00Z
3
value 0.01876
scoring_system epss
scoring_elements 0.83137
published_at 2026-04-11T12:55:00Z
4
value 0.01876
scoring_system epss
scoring_elements 0.8313
published_at 2026-04-12T12:55:00Z
5
value 0.01876
scoring_system epss
scoring_elements 0.83126
published_at 2026-04-13T12:55:00Z
6
value 0.01876
scoring_system epss
scoring_elements 0.83164
published_at 2026-04-18T12:55:00Z
7
value 0.01876
scoring_system epss
scoring_elements 0.83167
published_at 2026-04-21T12:55:00Z
8
value 0.01876
scoring_system epss
scoring_elements 0.83088
published_at 2026-04-07T12:55:00Z
9
value 0.01876
scoring_system epss
scoring_elements 0.83112
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32250
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
45
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
46
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2092427
reference_id 2092427
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2092427
47
reference_url https://access.redhat.com/errata/RHSA-2022:5214
reference_id RHSA-2022:5214
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5214
48
reference_url https://access.redhat.com/errata/RHSA-2022:5216
reference_id RHSA-2022:5216
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5216
49
reference_url https://access.redhat.com/errata/RHSA-2022:5220
reference_id RHSA-2022:5220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5220
50
reference_url https://access.redhat.com/errata/RHSA-2022:5224
reference_id RHSA-2022:5224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5224
51
reference_url https://access.redhat.com/errata/RHSA-2022:5232
reference_id RHSA-2022:5232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5232
52
reference_url https://access.redhat.com/errata/RHSA-2022:5236
reference_id RHSA-2022:5236
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5236
53
reference_url https://access.redhat.com/errata/RHSA-2022:5249
reference_id RHSA-2022:5249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5249
54
reference_url https://access.redhat.com/errata/RHSA-2022:5267
reference_id RHSA-2022:5267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5267
55
reference_url https://access.redhat.com/errata/RHSA-2022:5439
reference_id RHSA-2022:5439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5439
56
reference_url https://access.redhat.com/errata/RHSA-2022:5476
reference_id RHSA-2022:5476
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5476
57
reference_url https://access.redhat.com/errata/RHSA-2022:5626
reference_id RHSA-2022:5626
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5626
58
reference_url https://access.redhat.com/errata/RHSA-2022:5633
reference_id RHSA-2022:5633
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5633
59
reference_url https://access.redhat.com/errata/RHSA-2022:5636
reference_id RHSA-2022:5636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5636
60
reference_url https://access.redhat.com/errata/RHSA-2022:5641
reference_id RHSA-2022:5641
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5641
61
reference_url https://access.redhat.com/errata/RHSA-2022:5648
reference_id RHSA-2022:5648
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5648
62
reference_url https://access.redhat.com/errata/RHSA-2022:5802
reference_id RHSA-2022:5802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5802
63
reference_url https://access.redhat.com/errata/RHSA-2022:5804
reference_id RHSA-2022:5804
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5804
64
reference_url https://access.redhat.com/errata/RHSA-2022:5805
reference_id RHSA-2022:5805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5805
65
reference_url https://access.redhat.com/errata/RHSA-2022:5806
reference_id RHSA-2022:5806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5806
66
reference_url https://access.redhat.com/errata/RHSA-2022:5819
reference_id RHSA-2022:5819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5819
67
reference_url https://access.redhat.com/errata/RHSA-2022:5834
reference_id RHSA-2022:5834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5834
68
reference_url https://access.redhat.com/errata/RHSA-2022:5839
reference_id RHSA-2022:5839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5839
69
reference_url https://access.redhat.com/errata/RHSA-2022:6073
reference_id RHSA-2022:6073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6073
70
reference_url https://access.redhat.com/errata/RHSA-2022:6075
reference_id RHSA-2022:6075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6075
71
reference_url https://access.redhat.com/errata/RHSA-2022:6551
reference_id RHSA-2022:6551
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6551
fixed_packages
aliases CVE-2022-32250
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gkac-yybb-pqdv
5
url VCID-pmbu-dsmk-jkaw
vulnerability_id VCID-pmbu-dsmk-jkaw
summary kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2588.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2588.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2588
reference_id
reference_type
scores
0
value 0.54307
scoring_system epss
scoring_elements 0.98009
published_at 2026-04-02T12:55:00Z
1
value 0.54307
scoring_system epss
scoring_elements 0.98029
published_at 2026-04-21T12:55:00Z
2
value 0.54307
scoring_system epss
scoring_elements 0.98011
published_at 2026-04-04T12:55:00Z
3
value 0.54307
scoring_system epss
scoring_elements 0.98017
published_at 2026-04-08T12:55:00Z
4
value 0.54307
scoring_system epss
scoring_elements 0.98012
published_at 2026-04-07T12:55:00Z
5
value 0.54307
scoring_system epss
scoring_elements 0.98022
published_at 2026-04-12T12:55:00Z
6
value 0.54307
scoring_system epss
scoring_elements 0.98018
published_at 2026-04-09T12:55:00Z
7
value 0.54426
scoring_system epss
scoring_elements 0.98034
published_at 2026-04-18T12:55:00Z
8
value 0.54426
scoring_system epss
scoring_elements 0.98027
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2588
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2114849
reference_id 2114849
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2114849
12
reference_url https://www.openwall.com/lists/oss-security/2022/08/09/6
reference_id 6
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/
url https://www.openwall.com/lists/oss-security/2022/08/09/6
13
reference_url https://github.com/Markakd/CVE-2022-2588
reference_id CVE-2022-2588
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/
url https://github.com/Markakd/CVE-2022-2588
14
reference_url https://access.redhat.com/errata/RHSA-2022:6551
reference_id RHSA-2022:6551
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6551
15
reference_url https://access.redhat.com/errata/RHSA-2022:6872
reference_id RHSA-2022:6872
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6872
16
reference_url https://access.redhat.com/errata/RHSA-2022:6875
reference_id RHSA-2022:6875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6875
17
reference_url https://access.redhat.com/errata/RHSA-2022:6978
reference_id RHSA-2022:6978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6978
18
reference_url https://access.redhat.com/errata/RHSA-2022:6983
reference_id RHSA-2022:6983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6983
19
reference_url https://access.redhat.com/errata/RHSA-2022:6991
reference_id RHSA-2022:6991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6991
20
reference_url https://access.redhat.com/errata/RHSA-2022:7110
reference_id RHSA-2022:7110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7110
21
reference_url https://access.redhat.com/errata/RHSA-2022:7134
reference_id RHSA-2022:7134
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7134
22
reference_url https://access.redhat.com/errata/RHSA-2022:7137
reference_id RHSA-2022:7137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7137
23
reference_url https://access.redhat.com/errata/RHSA-2022:7146
reference_id RHSA-2022:7146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7146
24
reference_url https://access.redhat.com/errata/RHSA-2022:7171
reference_id RHSA-2022:7171
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7171
25
reference_url https://access.redhat.com/errata/RHSA-2022:7173
reference_id RHSA-2022:7173
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7173
26
reference_url https://access.redhat.com/errata/RHSA-2022:7279
reference_id RHSA-2022:7279
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7279
27
reference_url https://access.redhat.com/errata/RHSA-2022:7280
reference_id RHSA-2022:7280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7280
28
reference_url https://access.redhat.com/errata/RHSA-2022:7337
reference_id RHSA-2022:7337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7337
29
reference_url https://access.redhat.com/errata/RHSA-2022:7338
reference_id RHSA-2022:7338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7338
30
reference_url https://access.redhat.com/errata/RHSA-2022:7344
reference_id RHSA-2022:7344
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7344
31
reference_url https://access.redhat.com/errata/RHSA-2022:7885
reference_id RHSA-2022:7885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7885
32
reference_url https://access.redhat.com/errata/RHSA-2023:4022
reference_id RHSA-2023:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4022
33
reference_url https://access.redhat.com/errata/RHSA-2023:4023
reference_id RHSA-2023:4023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4023
34
reference_url https://lore.kernel.org/netdev/20220809170518.164662-1-cascardo@canonical.com/T/#u
reference_id #u
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/
url https://lore.kernel.org/netdev/20220809170518.164662-1-cascardo@canonical.com/T/#u
35
reference_url https://ubuntu.com/security/notices/USN-5557-1
reference_id USN-5557-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/
url https://ubuntu.com/security/notices/USN-5557-1
36
reference_url https://usn.ubuntu.com/5557-1/
reference_id USN-5557-1
reference_type
scores
url https://usn.ubuntu.com/5557-1/
37
reference_url https://ubuntu.com/security/notices/USN-5560-1
reference_id USN-5560-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/
url https://ubuntu.com/security/notices/USN-5560-1
38
reference_url https://usn.ubuntu.com/5560-1/
reference_id USN-5560-1
reference_type
scores
url https://usn.ubuntu.com/5560-1/
39
reference_url https://ubuntu.com/security/notices/USN-5560-2
reference_id USN-5560-2
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/
url https://ubuntu.com/security/notices/USN-5560-2
40
reference_url https://usn.ubuntu.com/5560-2/
reference_id USN-5560-2
reference_type
scores
url https://usn.ubuntu.com/5560-2/
41
reference_url https://ubuntu.com/security/notices/USN-5562-1
reference_id USN-5562-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/
url https://ubuntu.com/security/notices/USN-5562-1
42
reference_url https://usn.ubuntu.com/5562-1/
reference_id USN-5562-1
reference_type
scores
url https://usn.ubuntu.com/5562-1/
43
reference_url https://ubuntu.com/security/notices/USN-5564-1
reference_id USN-5564-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/
url https://ubuntu.com/security/notices/USN-5564-1
44
reference_url https://usn.ubuntu.com/5564-1/
reference_id USN-5564-1
reference_type
scores
url https://usn.ubuntu.com/5564-1/
45
reference_url https://ubuntu.com/security/notices/USN-5565-1
reference_id USN-5565-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/
url https://ubuntu.com/security/notices/USN-5565-1
46
reference_url https://usn.ubuntu.com/5565-1/
reference_id USN-5565-1
reference_type
scores
url https://usn.ubuntu.com/5565-1/
47
reference_url https://ubuntu.com/security/notices/USN-5566-1
reference_id USN-5566-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/
url https://ubuntu.com/security/notices/USN-5566-1
48
reference_url https://usn.ubuntu.com/5566-1/
reference_id USN-5566-1
reference_type
scores
url https://usn.ubuntu.com/5566-1/
49
reference_url https://ubuntu.com/security/notices/USN-5567-1
reference_id USN-5567-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/
url https://ubuntu.com/security/notices/USN-5567-1
50
reference_url https://usn.ubuntu.com/5567-1/
reference_id USN-5567-1
reference_type
scores
url https://usn.ubuntu.com/5567-1/
51
reference_url https://ubuntu.com/security/notices/USN-5582-1
reference_id USN-5582-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/
url https://ubuntu.com/security/notices/USN-5582-1
52
reference_url https://usn.ubuntu.com/5582-1/
reference_id USN-5582-1
reference_type
scores
url https://usn.ubuntu.com/5582-1/
53
reference_url https://ubuntu.com/security/notices/USN-5588-1
reference_id USN-5588-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/
url https://ubuntu.com/security/notices/USN-5588-1
54
reference_url https://usn.ubuntu.com/5588-1/
reference_id USN-5588-1
reference_type
scores
url https://usn.ubuntu.com/5588-1/
55
reference_url https://www.zerodayinitiative.com/advisories/ZDI-22-1117/
reference_id ZDI-22-1117
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/
url https://www.zerodayinitiative.com/advisories/ZDI-22-1117/
fixed_packages
aliases CVE-2022-2588
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pmbu-dsmk-jkaw
Fixing_vulnerabilities
Risk_score4.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/redhat-virtualization-host@4.5.2-202209140405_8%3Farch=6