Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/98024?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/98024?format=api", "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.80.1?arch=el7", "type": "rpm", "namespace": "redhat", "name": "kernel", "version": "3.10.0-1160.80.1", "qualifiers": { "arch": "el7" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4325?format=api", "vulnerability_id": "VCID-2uap-2vm1-efcr", "summary": "Retbleed - arbitrary speculative code execution with return instructions", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29900.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29900.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29900", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01411", "scoring_system": "epss", "scoring_elements": "0.80477", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01411", "scoring_system": "epss", "scoring_elements": "0.80587", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01411", "scoring_system": "epss", "scoring_elements": "0.80545", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01411", "scoring_system": "epss", "scoring_elements": "0.80531", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01411", "scoring_system": "epss", "scoring_elements": "0.80523", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01411", "scoring_system": "epss", "scoring_elements": "0.80553", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01411", "scoring_system": "epss", "scoring_elements": "0.80554", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01411", "scoring_system": "epss", "scoring_elements": "0.80558", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01411", "scoring_system": "epss", "scoring_elements": "0.80584", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01411", "scoring_system": "epss", "scoring_elements": "0.80498", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01411", "scoring_system": "epss", "scoring_elements": "0.80488", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01411", "scoring_system": "epss", "scoring_elements": "0.80517", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01411", "scoring_system": "epss", "scoring_elements": "0.80527", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29900" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090226", "reference_id": "2090226", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090226" }, { "reference_url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037", "reference_id": "amd-sb-1037", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/" } ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5207", "reference_id": "dsa-5207", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5207" }, { "reference_url": "https://security.gentoo.org/glsa/202402-07", "reference_id": "GLSA-202402-07", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/" } ], "url": "https://security.gentoo.org/glsa/202402-07" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html", "reference_id": "msg00011.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM/", "reference_id": "MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM/" }, { "reference_url": "https://www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability/", "reference_id": "retbleed-intel-and-amd-processor-information-disclosure-vulnerability", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/" } ], "url": "https://www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7110", "reference_id": "RHSA-2022:7110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7134", "reference_id": "RHSA-2022:7134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7337", "reference_id": "RHSA-2022:7337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7337" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7338", "reference_id": "RHSA-2022:7338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7338" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7933", "reference_id": "RHSA-2022:7933", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7933" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8267", "reference_id": "RHSA-2022:8267", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8267" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8973", "reference_id": "RHSA-2022:8973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8974", "reference_id": "RHSA-2022:8974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8974" }, { "reference_url": "https://usn.ubuntu.com/5564-1/", "reference_id": "USN-5564-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5564-1/" }, { "reference_url": "https://usn.ubuntu.com/5565-1/", "reference_id": "USN-5565-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5565-1/" }, { "reference_url": "https://usn.ubuntu.com/5566-1/", "reference_id": "USN-5566-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5566-1/" }, { "reference_url": "https://usn.ubuntu.com/5854-1/", "reference_id": "USN-5854-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5854-1/" }, { "reference_url": "https://usn.ubuntu.com/5861-1/", "reference_id": "USN-5861-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5861-1/" }, { "reference_url": "https://usn.ubuntu.com/5862-1/", "reference_id": "USN-5862-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5862-1/" }, { "reference_url": "https://usn.ubuntu.com/5865-1/", "reference_id": "USN-5865-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5865-1/" }, { "reference_url": "https://usn.ubuntu.com/5883-1/", "reference_id": "USN-5883-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5883-1/" }, { "reference_url": "https://usn.ubuntu.com/5924-1/", "reference_id": "USN-5924-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5924-1/" }, { "reference_url": "https://usn.ubuntu.com/5975-1/", "reference_id": "USN-5975-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5975-1/" }, { "reference_url": "https://usn.ubuntu.com/6007-1/", "reference_id": "USN-6007-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6007-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-407.html", "reference_id": "XSA-407", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-407.html" } ], "fixed_packages": [], "aliases": [ "CVE-2022-29900" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2uap-2vm1-efcr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79151?format=api", "vulnerability_id": "VCID-5zzw-du1s-gyf2", "summary": "hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26373.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26373.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26373", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28903", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28498", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28826", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28867", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28872", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28827", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28778", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28797", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28774", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28725", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28611", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28953", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28759", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26373" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115065", "reference_id": "2115065", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115065" }, { "reference_url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00706.html", "reference_id": "intel-sa-00706.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:22Z/" } ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00706.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html", "reference_id": "msg00000.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:22Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html", "reference_id": "msg00011.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:22Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20221007-0005/", "reference_id": "ntap-20221007-0005", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:22Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20221007-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7337", "reference_id": "RHSA-2022:7337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7337" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7338", "reference_id": "RHSA-2022:7338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7338" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7444", "reference_id": "RHSA-2022:7444", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7444" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7683", "reference_id": "RHSA-2022:7683", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7683" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7933", "reference_id": "RHSA-2022:7933", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7933" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8267", "reference_id": "RHSA-2022:8267", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8267" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8973", "reference_id": "RHSA-2022:8973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8974", "reference_id": "RHSA-2022:8974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8974" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0440", "reference_id": "RHSA-2023:0440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0440" }, { "reference_url": "https://usn.ubuntu.com/5667-1/", "reference_id": "USN-5667-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5667-1/" }, { "reference_url": "https://usn.ubuntu.com/5668-1/", "reference_id": "USN-5668-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5668-1/" }, { "reference_url": "https://usn.ubuntu.com/5677-1/", "reference_id": "USN-5677-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5677-1/" }, { "reference_url": "https://usn.ubuntu.com/5682-1/", "reference_id": "USN-5682-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5682-1/" }, { "reference_url": "https://usn.ubuntu.com/5683-1/", "reference_id": "USN-5683-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5683-1/" }, { "reference_url": "https://usn.ubuntu.com/5703-1/", "reference_id": "USN-5703-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5703-1/" }, { "reference_url": "https://usn.ubuntu.com/5706-1/", "reference_id": "USN-5706-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5706-1/" }, { "reference_url": "https://usn.ubuntu.com/5854-1/", "reference_id": "USN-5854-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5854-1/" }, { "reference_url": "https://usn.ubuntu.com/5861-1/", "reference_id": "USN-5861-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5861-1/" }, { "reference_url": "https://usn.ubuntu.com/5862-1/", "reference_id": "USN-5862-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5862-1/" }, { "reference_url": "https://usn.ubuntu.com/5865-1/", "reference_id": "USN-5865-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5865-1/" }, { "reference_url": "https://usn.ubuntu.com/5883-1/", "reference_id": "USN-5883-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5883-1/" }, { "reference_url": "https://usn.ubuntu.com/5924-1/", "reference_id": "USN-5924-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5924-1/" }, { "reference_url": "https://usn.ubuntu.com/5975-1/", "reference_id": "USN-5975-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5975-1/" }, { "reference_url": "https://usn.ubuntu.com/6007-1/", "reference_id": "USN-6007-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6007-1/" }, { "reference_url": "https://usn.ubuntu.com/6221-1/", "reference_id": "USN-6221-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6221-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-26373" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5zzw-du1s-gyf2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51621?format=api", "vulnerability_id": "VCID-kw9v-ery2-sffr", "summary": "Multiple vulnerabilities have been found in Xen, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29901.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29901.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29901", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22224", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22272", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22055", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22136", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.2219", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22211", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22171", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22111", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.2211", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22104", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22058", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.21918", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.21906", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29901" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103148", "reference_id": "2103148", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103148" }, { "reference_url": "https://security.gentoo.org/glsa/202402-07", "reference_id": "GLSA-202402-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7110", "reference_id": "RHSA-2022:7110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7134", "reference_id": "RHSA-2022:7134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7337", "reference_id": "RHSA-2022:7337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7337" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7338", "reference_id": "RHSA-2022:7338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7338" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7933", "reference_id": "RHSA-2022:7933", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7933" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8267", "reference_id": "RHSA-2022:8267", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8267" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8973", "reference_id": "RHSA-2022:8973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8974", "reference_id": "RHSA-2022:8974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8974" }, { "reference_url": "https://usn.ubuntu.com/5564-1/", "reference_id": "USN-5564-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5564-1/" }, { "reference_url": "https://usn.ubuntu.com/5565-1/", "reference_id": "USN-5565-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5565-1/" }, { "reference_url": "https://usn.ubuntu.com/5566-1/", "reference_id": "USN-5566-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5566-1/" }, { "reference_url": "https://usn.ubuntu.com/5728-1/", "reference_id": "USN-5728-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5728-1/" }, { "reference_url": "https://usn.ubuntu.com/5728-2/", "reference_id": "USN-5728-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5728-2/" }, { "reference_url": "https://usn.ubuntu.com/5728-3/", "reference_id": "USN-5728-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5728-3/" }, { "reference_url": "https://usn.ubuntu.com/5854-1/", "reference_id": "USN-5854-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5854-1/" }, { "reference_url": "https://usn.ubuntu.com/5861-1/", "reference_id": "USN-5861-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5861-1/" }, { "reference_url": "https://usn.ubuntu.com/5862-1/", "reference_id": "USN-5862-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5862-1/" }, { "reference_url": "https://usn.ubuntu.com/5865-1/", "reference_id": "USN-5865-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5865-1/" }, { "reference_url": "https://usn.ubuntu.com/5883-1/", "reference_id": "USN-5883-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5883-1/" }, { "reference_url": "https://usn.ubuntu.com/5924-1/", "reference_id": "USN-5924-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5924-1/" }, { "reference_url": "https://usn.ubuntu.com/5975-1/", "reference_id": "USN-5975-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5975-1/" }, { "reference_url": "https://usn.ubuntu.com/6007-1/", "reference_id": "USN-6007-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6007-1/" }, { "reference_url": "https://usn.ubuntu.com/6221-1/", "reference_id": "USN-6221-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6221-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-29901" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kw9v-ery2-sffr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79146?format=api", "vulnerability_id": "VCID-pmbu-dsmk-jkaw", "summary": "kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2588.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2588.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2588", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.54307", "scoring_system": "epss", "scoring_elements": "0.98009", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.54307", "scoring_system": "epss", "scoring_elements": "0.98011", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.54307", "scoring_system": "epss", "scoring_elements": "0.98022", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.54307", "scoring_system": "epss", "scoring_elements": "0.98012", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.54307", "scoring_system": "epss", "scoring_elements": "0.98028", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.54307", "scoring_system": "epss", "scoring_elements": "0.98027", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.54307", "scoring_system": "epss", "scoring_elements": "0.98029", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.54307", "scoring_system": "epss", "scoring_elements": "0.98017", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.54307", "scoring_system": "epss", "scoring_elements": "0.98018", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.54426", "scoring_system": "epss", "scoring_elements": "0.98027", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.54426", "scoring_system": "epss", "scoring_elements": "0.98034", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2588" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/" } ], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114849", "reference_id": "2114849", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114849" }, { "reference_url": "https://www.openwall.com/lists/oss-security/2022/08/09/6", "reference_id": "6", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/" } ], "url": "https://www.openwall.com/lists/oss-security/2022/08/09/6" }, { "reference_url": "https://github.com/Markakd/CVE-2022-2588", "reference_id": "CVE-2022-2588", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/" } ], "url": "https://github.com/Markakd/CVE-2022-2588" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6551", "reference_id": "RHSA-2022:6551", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6551" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6872", "reference_id": "RHSA-2022:6872", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6872" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6875", "reference_id": "RHSA-2022:6875", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6875" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6978", "reference_id": "RHSA-2022:6978", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6978" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6983", "reference_id": "RHSA-2022:6983", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6983" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6991", "reference_id": "RHSA-2022:6991", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6991" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7110", "reference_id": "RHSA-2022:7110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7134", "reference_id": "RHSA-2022:7134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7137", "reference_id": "RHSA-2022:7137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7137" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7146", "reference_id": "RHSA-2022:7146", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7146" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7171", "reference_id": "RHSA-2022:7171", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7171" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7173", "reference_id": "RHSA-2022:7173", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7173" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7279", "reference_id": "RHSA-2022:7279", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7279" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7280", "reference_id": "RHSA-2022:7280", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7280" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7337", "reference_id": "RHSA-2022:7337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7337" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7338", "reference_id": "RHSA-2022:7338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7338" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7344", "reference_id": "RHSA-2022:7344", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7344" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7885", "reference_id": "RHSA-2022:7885", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7885" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4022", "reference_id": "RHSA-2023:4022", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4022" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4023", "reference_id": "RHSA-2023:4023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4023" }, { "reference_url": "https://lore.kernel.org/netdev/20220809170518.164662-1-cascardo@canonical.com/T/#u", "reference_id": "#u", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/" } ], "url": "https://lore.kernel.org/netdev/20220809170518.164662-1-cascardo@canonical.com/T/#u" }, { "reference_url": "https://ubuntu.com/security/notices/USN-5557-1", "reference_id": "USN-5557-1", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/" } ], "url": "https://ubuntu.com/security/notices/USN-5557-1" }, { "reference_url": "https://usn.ubuntu.com/5557-1/", "reference_id": "USN-5557-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5557-1/" }, { "reference_url": "https://ubuntu.com/security/notices/USN-5560-1", "reference_id": "USN-5560-1", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/" } ], "url": "https://ubuntu.com/security/notices/USN-5560-1" }, { "reference_url": "https://usn.ubuntu.com/5560-1/", "reference_id": "USN-5560-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5560-1/" }, { "reference_url": "https://ubuntu.com/security/notices/USN-5560-2", "reference_id": "USN-5560-2", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/" } ], "url": "https://ubuntu.com/security/notices/USN-5560-2" }, { "reference_url": "https://usn.ubuntu.com/5560-2/", "reference_id": "USN-5560-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5560-2/" }, { "reference_url": "https://ubuntu.com/security/notices/USN-5562-1", "reference_id": "USN-5562-1", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/" } ], "url": "https://ubuntu.com/security/notices/USN-5562-1" }, { "reference_url": "https://usn.ubuntu.com/5562-1/", "reference_id": "USN-5562-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5562-1/" }, { "reference_url": "https://ubuntu.com/security/notices/USN-5564-1", "reference_id": "USN-5564-1", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/" } ], "url": "https://ubuntu.com/security/notices/USN-5564-1" }, { "reference_url": "https://usn.ubuntu.com/5564-1/", "reference_id": "USN-5564-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5564-1/" }, { "reference_url": "https://ubuntu.com/security/notices/USN-5565-1", "reference_id": "USN-5565-1", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/" } ], "url": "https://ubuntu.com/security/notices/USN-5565-1" }, { "reference_url": "https://usn.ubuntu.com/5565-1/", "reference_id": "USN-5565-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5565-1/" }, { "reference_url": "https://ubuntu.com/security/notices/USN-5566-1", "reference_id": "USN-5566-1", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/" } ], "url": "https://ubuntu.com/security/notices/USN-5566-1" }, { "reference_url": "https://usn.ubuntu.com/5566-1/", "reference_id": "USN-5566-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5566-1/" }, { "reference_url": "https://ubuntu.com/security/notices/USN-5567-1", "reference_id": "USN-5567-1", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/" } ], "url": "https://ubuntu.com/security/notices/USN-5567-1" }, { "reference_url": "https://usn.ubuntu.com/5567-1/", "reference_id": "USN-5567-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5567-1/" }, { "reference_url": "https://ubuntu.com/security/notices/USN-5582-1", "reference_id": "USN-5582-1", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/" } ], "url": "https://ubuntu.com/security/notices/USN-5582-1" }, { "reference_url": "https://usn.ubuntu.com/5582-1/", "reference_id": "USN-5582-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5582-1/" }, { "reference_url": "https://ubuntu.com/security/notices/USN-5588-1", "reference_id": "USN-5588-1", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/" } ], "url": "https://ubuntu.com/security/notices/USN-5588-1" }, { "reference_url": "https://usn.ubuntu.com/5588-1/", "reference_id": "USN-5588-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5588-1/" }, { "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1117/", "reference_id": "ZDI-22-1117", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/" } ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1117/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-2588" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pmbu-dsmk-jkaw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79235?format=api", "vulnerability_id": "VCID-r48g-c56n-sqdz", "summary": "hw: cpu: Intel: information disclosure via local access", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28693.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28693.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-28693", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13913", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13746", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13683", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13755", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13777", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.1397", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13773", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13856", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13907", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13864", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13828", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.1378", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13688", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-28693" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107465", "reference_id": "2107465", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107465" }, { "reference_url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00707.html", "reference_id": "intel-sa-00707.html", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-14T20:54:47Z/" } ], "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00707.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7110", "reference_id": "RHSA-2022:7110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7134", "reference_id": "RHSA-2022:7134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7337", "reference_id": "RHSA-2022:7337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7337" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7338", "reference_id": "RHSA-2022:7338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7338" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7933", "reference_id": "RHSA-2022:7933", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7933" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8267", "reference_id": "RHSA-2022:8267", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8267" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8973", "reference_id": "RHSA-2022:8973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8974", "reference_id": "RHSA-2022:8974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8974" } ], "fixed_packages": [], "aliases": [ "CVE-2022-28693" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r48g-c56n-sqdz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4323?format=api", "vulnerability_id": "VCID-t84j-7tyr-fkfy", "summary": "Retbleed - arbitrary speculative code execution with return instructions", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23816.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23816.json" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090226", "reference_id": "2090226", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090226" }, { "reference_url": "https://security.gentoo.org/glsa/202402-07", "reference_id": "GLSA-202402-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7110", "reference_id": "RHSA-2022:7110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7134", "reference_id": "RHSA-2022:7134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7337", "reference_id": "RHSA-2022:7337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7337" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7338", "reference_id": "RHSA-2022:7338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7338" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7933", "reference_id": "RHSA-2022:7933", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7933" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8267", "reference_id": "RHSA-2022:8267", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8267" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8973", "reference_id": "RHSA-2022:8973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8974", "reference_id": "RHSA-2022:8974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8974" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-407.html", "reference_id": "XSA-407", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-407.html" } ], "fixed_packages": [], "aliases": [ "CVE-2022-23816" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t84j-7tyr-fkfy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4324?format=api", "vulnerability_id": "VCID-zkyv-h5at-xkgq", "summary": "Retbleed - arbitrary speculative code execution with return instructions", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23825.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23825.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23825", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.3369", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33723", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33561", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33605", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33638", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33633", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33591", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33569", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33602", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33578", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33546", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33387", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33368", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23825" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103153", "reference_id": "2103153", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103153" }, { "reference_url": "https://security.gentoo.org/glsa/202402-07", "reference_id": "GLSA-202402-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7110", "reference_id": "RHSA-2022:7110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7134", "reference_id": "RHSA-2022:7134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7337", "reference_id": "RHSA-2022:7337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7337" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7338", "reference_id": "RHSA-2022:7338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7338" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7933", "reference_id": "RHSA-2022:7933", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7933" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8267", "reference_id": "RHSA-2022:8267", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8267" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8973", "reference_id": "RHSA-2022:8973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8974", "reference_id": "RHSA-2022:8974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8974" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-407.html", "reference_id": "XSA-407", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-407.html" } ], "fixed_packages": [], "aliases": [ "CVE-2022-23825", "XSA-407" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zkyv-h5at-xkgq" } ], "fixing_vulnerabilities": [], "risk_score": "3.5", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@3.10.0-1160.80.1%3Farch=el7" }