Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel-rt@3.10.0-1160.80.1.rt56.1225?arch=el7
Typerpm
Namespaceredhat
Namekernel-rt
Version3.10.0-1160.80.1.rt56.1225
Qualifiers
arch el7
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-2uap-2vm1-efcr
vulnerability_id VCID-2uap-2vm1-efcr
summary Retbleed - arbitrary speculative code execution with return instructions
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29900.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29900.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-29900
reference_id
reference_type
scores
0
value 0.01411
scoring_system epss
scoring_elements 0.80477
published_at 2026-04-02T12:55:00Z
1
value 0.01411
scoring_system epss
scoring_elements 0.80584
published_at 2026-04-24T12:55:00Z
2
value 0.01411
scoring_system epss
scoring_elements 0.80527
published_at 2026-04-09T12:55:00Z
3
value 0.01411
scoring_system epss
scoring_elements 0.80545
published_at 2026-04-11T12:55:00Z
4
value 0.01411
scoring_system epss
scoring_elements 0.80531
published_at 2026-04-12T12:55:00Z
5
value 0.01411
scoring_system epss
scoring_elements 0.80523
published_at 2026-04-13T12:55:00Z
6
value 0.01411
scoring_system epss
scoring_elements 0.80553
published_at 2026-04-16T12:55:00Z
7
value 0.01411
scoring_system epss
scoring_elements 0.80554
published_at 2026-04-18T12:55:00Z
8
value 0.01411
scoring_system epss
scoring_elements 0.80558
published_at 2026-04-21T12:55:00Z
9
value 0.01411
scoring_system epss
scoring_elements 0.80498
published_at 2026-04-04T12:55:00Z
10
value 0.01411
scoring_system epss
scoring_elements 0.80488
published_at 2026-04-07T12:55:00Z
11
value 0.01411
scoring_system epss
scoring_elements 0.80517
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-29900
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2090226
reference_id 2090226
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2090226
19
reference_url https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037
reference_id amd-sb-1037
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/
url https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037
20
reference_url https://www.debian.org/security/2022/dsa-5207
reference_id dsa-5207
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/
url https://www.debian.org/security/2022/dsa-5207
21
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/
url https://security.gentoo.org/glsa/202402-07
22
reference_url https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html
reference_id msg00011.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/
url https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM/
reference_id MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM/
24
reference_url https://www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability/
reference_id retbleed-intel-and-amd-processor-information-disclosure-vulnerability
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/
url https://www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability/
25
reference_url https://access.redhat.com/errata/RHSA-2022:7110
reference_id RHSA-2022:7110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7110
26
reference_url https://access.redhat.com/errata/RHSA-2022:7134
reference_id RHSA-2022:7134
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7134
27
reference_url https://access.redhat.com/errata/RHSA-2022:7337
reference_id RHSA-2022:7337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7337
28
reference_url https://access.redhat.com/errata/RHSA-2022:7338
reference_id RHSA-2022:7338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7338
29
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
30
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
31
reference_url https://access.redhat.com/errata/RHSA-2022:8973
reference_id RHSA-2022:8973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8973
32
reference_url https://access.redhat.com/errata/RHSA-2022:8974
reference_id RHSA-2022:8974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8974
33
reference_url https://usn.ubuntu.com/5564-1/
reference_id USN-5564-1
reference_type
scores
url https://usn.ubuntu.com/5564-1/
34
reference_url https://usn.ubuntu.com/5565-1/
reference_id USN-5565-1
reference_type
scores
url https://usn.ubuntu.com/5565-1/
35
reference_url https://usn.ubuntu.com/5566-1/
reference_id USN-5566-1
reference_type
scores
url https://usn.ubuntu.com/5566-1/
36
reference_url https://usn.ubuntu.com/5854-1/
reference_id USN-5854-1
reference_type
scores
url https://usn.ubuntu.com/5854-1/
37
reference_url https://usn.ubuntu.com/5861-1/
reference_id USN-5861-1
reference_type
scores
url https://usn.ubuntu.com/5861-1/
38
reference_url https://usn.ubuntu.com/5862-1/
reference_id USN-5862-1
reference_type
scores
url https://usn.ubuntu.com/5862-1/
39
reference_url https://usn.ubuntu.com/5865-1/
reference_id USN-5865-1
reference_type
scores
url https://usn.ubuntu.com/5865-1/
40
reference_url https://usn.ubuntu.com/5883-1/
reference_id USN-5883-1
reference_type
scores
url https://usn.ubuntu.com/5883-1/
41
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
42
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
43
reference_url https://usn.ubuntu.com/6007-1/
reference_id USN-6007-1
reference_type
scores
url https://usn.ubuntu.com/6007-1/
44
reference_url https://xenbits.xen.org/xsa/advisory-407.html
reference_id XSA-407
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-407.html
fixed_packages
aliases CVE-2022-29900
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2uap-2vm1-efcr
1
url VCID-5zzw-du1s-gyf2
vulnerability_id VCID-5zzw-du1s-gyf2
summary hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26373.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26373.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-26373
reference_id
reference_type
scores
0
value 0.00106
scoring_system epss
scoring_elements 0.28903
published_at 2026-04-02T12:55:00Z
1
value 0.00106
scoring_system epss
scoring_elements 0.28611
published_at 2026-04-24T12:55:00Z
2
value 0.00106
scoring_system epss
scoring_elements 0.28759
published_at 2026-04-07T12:55:00Z
3
value 0.00106
scoring_system epss
scoring_elements 0.28826
published_at 2026-04-08T12:55:00Z
4
value 0.00106
scoring_system epss
scoring_elements 0.28867
published_at 2026-04-09T12:55:00Z
5
value 0.00106
scoring_system epss
scoring_elements 0.28872
published_at 2026-04-11T12:55:00Z
6
value 0.00106
scoring_system epss
scoring_elements 0.28827
published_at 2026-04-12T12:55:00Z
7
value 0.00106
scoring_system epss
scoring_elements 0.28778
published_at 2026-04-13T12:55:00Z
8
value 0.00106
scoring_system epss
scoring_elements 0.28797
published_at 2026-04-16T12:55:00Z
9
value 0.00106
scoring_system epss
scoring_elements 0.28774
published_at 2026-04-18T12:55:00Z
10
value 0.00106
scoring_system epss
scoring_elements 0.28725
published_at 2026-04-21T12:55:00Z
11
value 0.00106
scoring_system epss
scoring_elements 0.28953
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-26373
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2115065
reference_id 2115065
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2115065
12
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00706.html
reference_id intel-sa-00706.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:22Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00706.html
13
reference_url https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html
reference_id msg00000.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:22Z/
url https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html
14
reference_url https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html
reference_id msg00011.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:22Z/
url https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html
15
reference_url https://security.netapp.com/advisory/ntap-20221007-0005/
reference_id ntap-20221007-0005
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:22Z/
url https://security.netapp.com/advisory/ntap-20221007-0005/
16
reference_url https://access.redhat.com/errata/RHSA-2022:7337
reference_id RHSA-2022:7337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7337
17
reference_url https://access.redhat.com/errata/RHSA-2022:7338
reference_id RHSA-2022:7338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7338
18
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
19
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
20
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
21
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
22
reference_url https://access.redhat.com/errata/RHSA-2022:8973
reference_id RHSA-2022:8973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8973
23
reference_url https://access.redhat.com/errata/RHSA-2022:8974
reference_id RHSA-2022:8974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8974
24
reference_url https://access.redhat.com/errata/RHSA-2023:0440
reference_id RHSA-2023:0440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0440
25
reference_url https://usn.ubuntu.com/5667-1/
reference_id USN-5667-1
reference_type
scores
url https://usn.ubuntu.com/5667-1/
26
reference_url https://usn.ubuntu.com/5668-1/
reference_id USN-5668-1
reference_type
scores
url https://usn.ubuntu.com/5668-1/
27
reference_url https://usn.ubuntu.com/5677-1/
reference_id USN-5677-1
reference_type
scores
url https://usn.ubuntu.com/5677-1/
28
reference_url https://usn.ubuntu.com/5682-1/
reference_id USN-5682-1
reference_type
scores
url https://usn.ubuntu.com/5682-1/
29
reference_url https://usn.ubuntu.com/5683-1/
reference_id USN-5683-1
reference_type
scores
url https://usn.ubuntu.com/5683-1/
30
reference_url https://usn.ubuntu.com/5703-1/
reference_id USN-5703-1
reference_type
scores
url https://usn.ubuntu.com/5703-1/
31
reference_url https://usn.ubuntu.com/5706-1/
reference_id USN-5706-1
reference_type
scores
url https://usn.ubuntu.com/5706-1/
32
reference_url https://usn.ubuntu.com/5854-1/
reference_id USN-5854-1
reference_type
scores
url https://usn.ubuntu.com/5854-1/
33
reference_url https://usn.ubuntu.com/5861-1/
reference_id USN-5861-1
reference_type
scores
url https://usn.ubuntu.com/5861-1/
34
reference_url https://usn.ubuntu.com/5862-1/
reference_id USN-5862-1
reference_type
scores
url https://usn.ubuntu.com/5862-1/
35
reference_url https://usn.ubuntu.com/5865-1/
reference_id USN-5865-1
reference_type
scores
url https://usn.ubuntu.com/5865-1/
36
reference_url https://usn.ubuntu.com/5883-1/
reference_id USN-5883-1
reference_type
scores
url https://usn.ubuntu.com/5883-1/
37
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
38
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
39
reference_url https://usn.ubuntu.com/6007-1/
reference_id USN-6007-1
reference_type
scores
url https://usn.ubuntu.com/6007-1/
40
reference_url https://usn.ubuntu.com/6221-1/
reference_id USN-6221-1
reference_type
scores
url https://usn.ubuntu.com/6221-1/
fixed_packages
aliases CVE-2022-26373
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5zzw-du1s-gyf2
2
url VCID-kw9v-ery2-sffr
vulnerability_id VCID-kw9v-ery2-sffr
summary Multiple vulnerabilities have been found in Xen, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29901.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29901.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-29901
reference_id
reference_type
scores
0
value 0.00073
scoring_system epss
scoring_elements 0.22224
published_at 2026-04-02T12:55:00Z
1
value 0.00073
scoring_system epss
scoring_elements 0.22272
published_at 2026-04-04T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.22055
published_at 2026-04-07T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.22136
published_at 2026-04-08T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.2219
published_at 2026-04-09T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22211
published_at 2026-04-11T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.22171
published_at 2026-04-12T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.22111
published_at 2026-04-13T12:55:00Z
8
value 0.00073
scoring_system epss
scoring_elements 0.2211
published_at 2026-04-16T12:55:00Z
9
value 0.00073
scoring_system epss
scoring_elements 0.22104
published_at 2026-04-18T12:55:00Z
10
value 0.00073
scoring_system epss
scoring_elements 0.22058
published_at 2026-04-21T12:55:00Z
11
value 0.00073
scoring_system epss
scoring_elements 0.21918
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-29901
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2103148
reference_id 2103148
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2103148
12
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
13
reference_url https://access.redhat.com/errata/RHSA-2022:7110
reference_id RHSA-2022:7110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7110
14
reference_url https://access.redhat.com/errata/RHSA-2022:7134
reference_id RHSA-2022:7134
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7134
15
reference_url https://access.redhat.com/errata/RHSA-2022:7337
reference_id RHSA-2022:7337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7337
16
reference_url https://access.redhat.com/errata/RHSA-2022:7338
reference_id RHSA-2022:7338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7338
17
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
18
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
19
reference_url https://access.redhat.com/errata/RHSA-2022:8973
reference_id RHSA-2022:8973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8973
20
reference_url https://access.redhat.com/errata/RHSA-2022:8974
reference_id RHSA-2022:8974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8974
21
reference_url https://usn.ubuntu.com/5564-1/
reference_id USN-5564-1
reference_type
scores
url https://usn.ubuntu.com/5564-1/
22
reference_url https://usn.ubuntu.com/5565-1/
reference_id USN-5565-1
reference_type
scores
url https://usn.ubuntu.com/5565-1/
23
reference_url https://usn.ubuntu.com/5566-1/
reference_id USN-5566-1
reference_type
scores
url https://usn.ubuntu.com/5566-1/
24
reference_url https://usn.ubuntu.com/5728-1/
reference_id USN-5728-1
reference_type
scores
url https://usn.ubuntu.com/5728-1/
25
reference_url https://usn.ubuntu.com/5728-2/
reference_id USN-5728-2
reference_type
scores
url https://usn.ubuntu.com/5728-2/
26
reference_url https://usn.ubuntu.com/5728-3/
reference_id USN-5728-3
reference_type
scores
url https://usn.ubuntu.com/5728-3/
27
reference_url https://usn.ubuntu.com/5854-1/
reference_id USN-5854-1
reference_type
scores
url https://usn.ubuntu.com/5854-1/
28
reference_url https://usn.ubuntu.com/5861-1/
reference_id USN-5861-1
reference_type
scores
url https://usn.ubuntu.com/5861-1/
29
reference_url https://usn.ubuntu.com/5862-1/
reference_id USN-5862-1
reference_type
scores
url https://usn.ubuntu.com/5862-1/
30
reference_url https://usn.ubuntu.com/5865-1/
reference_id USN-5865-1
reference_type
scores
url https://usn.ubuntu.com/5865-1/
31
reference_url https://usn.ubuntu.com/5883-1/
reference_id USN-5883-1
reference_type
scores
url https://usn.ubuntu.com/5883-1/
32
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
33
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
34
reference_url https://usn.ubuntu.com/6007-1/
reference_id USN-6007-1
reference_type
scores
url https://usn.ubuntu.com/6007-1/
35
reference_url https://usn.ubuntu.com/6221-1/
reference_id USN-6221-1
reference_type
scores
url https://usn.ubuntu.com/6221-1/
fixed_packages
aliases CVE-2022-29901
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kw9v-ery2-sffr
3
url VCID-pmbu-dsmk-jkaw
vulnerability_id VCID-pmbu-dsmk-jkaw
summary kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2588.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2588.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2588
reference_id
reference_type
scores
0
value 0.54307
scoring_system epss
scoring_elements 0.98009
published_at 2026-04-02T12:55:00Z
1
value 0.54307
scoring_system epss
scoring_elements 0.98018
published_at 2026-04-09T12:55:00Z
2
value 0.54307
scoring_system epss
scoring_elements 0.98011
published_at 2026-04-04T12:55:00Z
3
value 0.54307
scoring_system epss
scoring_elements 0.98027
published_at 2026-04-24T12:55:00Z
4
value 0.54307
scoring_system epss
scoring_elements 0.98029
published_at 2026-04-21T12:55:00Z
5
value 0.54307
scoring_system epss
scoring_elements 0.98012
published_at 2026-04-07T12:55:00Z
6
value 0.54307
scoring_system epss
scoring_elements 0.98017
published_at 2026-04-08T12:55:00Z
7
value 0.54307
scoring_system epss
scoring_elements 0.98022
published_at 2026-04-12T12:55:00Z
8
value 0.54426
scoring_system epss
scoring_elements 0.98034
published_at 2026-04-18T12:55:00Z
9
value 0.54426
scoring_system epss
scoring_elements 0.98027
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2588
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2114849
reference_id 2114849
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2114849
12
reference_url https://www.openwall.com/lists/oss-security/2022/08/09/6
reference_id 6
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/
url https://www.openwall.com/lists/oss-security/2022/08/09/6
13
reference_url https://github.com/Markakd/CVE-2022-2588
reference_id CVE-2022-2588
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/
url https://github.com/Markakd/CVE-2022-2588
14
reference_url https://access.redhat.com/errata/RHSA-2022:6551
reference_id RHSA-2022:6551
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6551
15
reference_url https://access.redhat.com/errata/RHSA-2022:6872
reference_id RHSA-2022:6872
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6872
16
reference_url https://access.redhat.com/errata/RHSA-2022:6875
reference_id RHSA-2022:6875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6875
17
reference_url https://access.redhat.com/errata/RHSA-2022:6978
reference_id RHSA-2022:6978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6978
18
reference_url https://access.redhat.com/errata/RHSA-2022:6983
reference_id RHSA-2022:6983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6983
19
reference_url https://access.redhat.com/errata/RHSA-2022:6991
reference_id RHSA-2022:6991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6991
20
reference_url https://access.redhat.com/errata/RHSA-2022:7110
reference_id RHSA-2022:7110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7110
21
reference_url https://access.redhat.com/errata/RHSA-2022:7134
reference_id RHSA-2022:7134
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7134
22
reference_url https://access.redhat.com/errata/RHSA-2022:7137
reference_id RHSA-2022:7137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7137
23
reference_url https://access.redhat.com/errata/RHSA-2022:7146
reference_id RHSA-2022:7146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7146
24
reference_url https://access.redhat.com/errata/RHSA-2022:7171
reference_id RHSA-2022:7171
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7171
25
reference_url https://access.redhat.com/errata/RHSA-2022:7173
reference_id RHSA-2022:7173
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7173
26
reference_url https://access.redhat.com/errata/RHSA-2022:7279
reference_id RHSA-2022:7279
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7279
27
reference_url https://access.redhat.com/errata/RHSA-2022:7280
reference_id RHSA-2022:7280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7280
28
reference_url https://access.redhat.com/errata/RHSA-2022:7337
reference_id RHSA-2022:7337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7337
29
reference_url https://access.redhat.com/errata/RHSA-2022:7338
reference_id RHSA-2022:7338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7338
30
reference_url https://access.redhat.com/errata/RHSA-2022:7344
reference_id RHSA-2022:7344
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7344
31
reference_url https://access.redhat.com/errata/RHSA-2022:7885
reference_id RHSA-2022:7885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7885
32
reference_url https://access.redhat.com/errata/RHSA-2023:4022
reference_id RHSA-2023:4022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4022
33
reference_url https://access.redhat.com/errata/RHSA-2023:4023
reference_id RHSA-2023:4023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4023
34
reference_url https://lore.kernel.org/netdev/20220809170518.164662-1-cascardo@canonical.com/T/#u
reference_id #u
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/
url https://lore.kernel.org/netdev/20220809170518.164662-1-cascardo@canonical.com/T/#u
35
reference_url https://ubuntu.com/security/notices/USN-5557-1
reference_id USN-5557-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/
url https://ubuntu.com/security/notices/USN-5557-1
36
reference_url https://usn.ubuntu.com/5557-1/
reference_id USN-5557-1
reference_type
scores
url https://usn.ubuntu.com/5557-1/
37
reference_url https://ubuntu.com/security/notices/USN-5560-1
reference_id USN-5560-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/
url https://ubuntu.com/security/notices/USN-5560-1
38
reference_url https://usn.ubuntu.com/5560-1/
reference_id USN-5560-1
reference_type
scores
url https://usn.ubuntu.com/5560-1/
39
reference_url https://ubuntu.com/security/notices/USN-5560-2
reference_id USN-5560-2
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/
url https://ubuntu.com/security/notices/USN-5560-2
40
reference_url https://usn.ubuntu.com/5560-2/
reference_id USN-5560-2
reference_type
scores
url https://usn.ubuntu.com/5560-2/
41
reference_url https://ubuntu.com/security/notices/USN-5562-1
reference_id USN-5562-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/
url https://ubuntu.com/security/notices/USN-5562-1
42
reference_url https://usn.ubuntu.com/5562-1/
reference_id USN-5562-1
reference_type
scores
url https://usn.ubuntu.com/5562-1/
43
reference_url https://ubuntu.com/security/notices/USN-5564-1
reference_id USN-5564-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/
url https://ubuntu.com/security/notices/USN-5564-1
44
reference_url https://usn.ubuntu.com/5564-1/
reference_id USN-5564-1
reference_type
scores
url https://usn.ubuntu.com/5564-1/
45
reference_url https://ubuntu.com/security/notices/USN-5565-1
reference_id USN-5565-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/
url https://ubuntu.com/security/notices/USN-5565-1
46
reference_url https://usn.ubuntu.com/5565-1/
reference_id USN-5565-1
reference_type
scores
url https://usn.ubuntu.com/5565-1/
47
reference_url https://ubuntu.com/security/notices/USN-5566-1
reference_id USN-5566-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/
url https://ubuntu.com/security/notices/USN-5566-1
48
reference_url https://usn.ubuntu.com/5566-1/
reference_id USN-5566-1
reference_type
scores
url https://usn.ubuntu.com/5566-1/
49
reference_url https://ubuntu.com/security/notices/USN-5567-1
reference_id USN-5567-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/
url https://ubuntu.com/security/notices/USN-5567-1
50
reference_url https://usn.ubuntu.com/5567-1/
reference_id USN-5567-1
reference_type
scores
url https://usn.ubuntu.com/5567-1/
51
reference_url https://ubuntu.com/security/notices/USN-5582-1
reference_id USN-5582-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/
url https://ubuntu.com/security/notices/USN-5582-1
52
reference_url https://usn.ubuntu.com/5582-1/
reference_id USN-5582-1
reference_type
scores
url https://usn.ubuntu.com/5582-1/
53
reference_url https://ubuntu.com/security/notices/USN-5588-1
reference_id USN-5588-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/
url https://ubuntu.com/security/notices/USN-5588-1
54
reference_url https://usn.ubuntu.com/5588-1/
reference_id USN-5588-1
reference_type
scores
url https://usn.ubuntu.com/5588-1/
55
reference_url https://www.zerodayinitiative.com/advisories/ZDI-22-1117/
reference_id ZDI-22-1117
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/
url https://www.zerodayinitiative.com/advisories/ZDI-22-1117/
fixed_packages
aliases CVE-2022-2588
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pmbu-dsmk-jkaw
4
url VCID-r48g-c56n-sqdz
vulnerability_id VCID-r48g-c56n-sqdz
summary hw: cpu: Intel: information disclosure via local access
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28693.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28693.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-28693
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.13913
published_at 2026-04-02T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.13777
published_at 2026-04-24T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.13688
published_at 2026-04-16T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13683
published_at 2026-04-18T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13755
published_at 2026-04-21T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.1397
published_at 2026-04-04T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13773
published_at 2026-04-07T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13856
published_at 2026-04-08T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.13907
published_at 2026-04-09T12:55:00Z
9
value 0.00045
scoring_system epss
scoring_elements 0.13864
published_at 2026-04-11T12:55:00Z
10
value 0.00045
scoring_system epss
scoring_elements 0.13828
published_at 2026-04-12T12:55:00Z
11
value 0.00045
scoring_system epss
scoring_elements 0.1378
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-28693
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2107465
reference_id 2107465
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2107465
4
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00707.html
reference_id intel-sa-00707.html
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-14T20:54:47Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00707.html
5
reference_url https://access.redhat.com/errata/RHSA-2022:7110
reference_id RHSA-2022:7110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7110
6
reference_url https://access.redhat.com/errata/RHSA-2022:7134
reference_id RHSA-2022:7134
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7134
7
reference_url https://access.redhat.com/errata/RHSA-2022:7337
reference_id RHSA-2022:7337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7337
8
reference_url https://access.redhat.com/errata/RHSA-2022:7338
reference_id RHSA-2022:7338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7338
9
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
10
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
11
reference_url https://access.redhat.com/errata/RHSA-2022:8973
reference_id RHSA-2022:8973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8973
12
reference_url https://access.redhat.com/errata/RHSA-2022:8974
reference_id RHSA-2022:8974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8974
fixed_packages
aliases CVE-2022-28693
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r48g-c56n-sqdz
5
url VCID-t84j-7tyr-fkfy
vulnerability_id VCID-t84j-7tyr-fkfy
summary Retbleed - arbitrary speculative code execution with return instructions
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23816.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23816.json
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2090226
reference_id 2090226
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2090226
3
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
4
reference_url https://access.redhat.com/errata/RHSA-2022:7110
reference_id RHSA-2022:7110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7110
5
reference_url https://access.redhat.com/errata/RHSA-2022:7134
reference_id RHSA-2022:7134
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7134
6
reference_url https://access.redhat.com/errata/RHSA-2022:7337
reference_id RHSA-2022:7337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7337
7
reference_url https://access.redhat.com/errata/RHSA-2022:7338
reference_id RHSA-2022:7338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7338
8
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
9
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
10
reference_url https://access.redhat.com/errata/RHSA-2022:8973
reference_id RHSA-2022:8973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8973
11
reference_url https://access.redhat.com/errata/RHSA-2022:8974
reference_id RHSA-2022:8974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8974
12
reference_url https://xenbits.xen.org/xsa/advisory-407.html
reference_id XSA-407
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-407.html
fixed_packages
aliases CVE-2022-23816
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t84j-7tyr-fkfy
6
url VCID-zkyv-h5at-xkgq
vulnerability_id VCID-zkyv-h5at-xkgq
summary Retbleed - arbitrary speculative code execution with return instructions
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23825.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23825.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23825
reference_id
reference_type
scores
0
value 0.00138
scoring_system epss
scoring_elements 0.3369
published_at 2026-04-02T12:55:00Z
1
value 0.00138
scoring_system epss
scoring_elements 0.33723
published_at 2026-04-04T12:55:00Z
2
value 0.00138
scoring_system epss
scoring_elements 0.33561
published_at 2026-04-07T12:55:00Z
3
value 0.00138
scoring_system epss
scoring_elements 0.33605
published_at 2026-04-08T12:55:00Z
4
value 0.00138
scoring_system epss
scoring_elements 0.33638
published_at 2026-04-09T12:55:00Z
5
value 0.00138
scoring_system epss
scoring_elements 0.33633
published_at 2026-04-11T12:55:00Z
6
value 0.00138
scoring_system epss
scoring_elements 0.33591
published_at 2026-04-12T12:55:00Z
7
value 0.00138
scoring_system epss
scoring_elements 0.33569
published_at 2026-04-13T12:55:00Z
8
value 0.00138
scoring_system epss
scoring_elements 0.33602
published_at 2026-04-16T12:55:00Z
9
value 0.00138
scoring_system epss
scoring_elements 0.33578
published_at 2026-04-18T12:55:00Z
10
value 0.00138
scoring_system epss
scoring_elements 0.33546
published_at 2026-04-21T12:55:00Z
11
value 0.00138
scoring_system epss
scoring_elements 0.33387
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23825
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2103153
reference_id 2103153
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2103153
12
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
13
reference_url https://access.redhat.com/errata/RHSA-2022:7110
reference_id RHSA-2022:7110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7110
14
reference_url https://access.redhat.com/errata/RHSA-2022:7134
reference_id RHSA-2022:7134
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7134
15
reference_url https://access.redhat.com/errata/RHSA-2022:7337
reference_id RHSA-2022:7337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7337
16
reference_url https://access.redhat.com/errata/RHSA-2022:7338
reference_id RHSA-2022:7338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7338
17
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
18
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
19
reference_url https://access.redhat.com/errata/RHSA-2022:8973
reference_id RHSA-2022:8973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8973
20
reference_url https://access.redhat.com/errata/RHSA-2022:8974
reference_id RHSA-2022:8974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8974
21
reference_url https://xenbits.xen.org/xsa/advisory-407.html
reference_id XSA-407
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-407.html
fixed_packages
aliases CVE-2022-23825, XSA-407
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zkyv-h5at-xkgq
Fixing_vulnerabilities
Risk_score3.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@3.10.0-1160.80.1.rt56.1225%3Farch=el7