Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/redhat-virtualization-host@4.3.23-20220622.0?arch=el7_9
Typerpm
Namespaceredhat
Nameredhat-virtualization-host
Version4.3.23-20220622.0
Qualifiers
arch el7_9
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-3adf-qttu-3kfd
vulnerability_id VCID-3adf-qttu-3kfd
summary A vulnerability has been discovered in GNU Gzip and XZ Utils' grep helpers which could result in writes to arbitrary files.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1271.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1271.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1271
reference_id
reference_type
scores
0
value 0.00813
scoring_system epss
scoring_elements 0.74333
published_at 2026-04-29T12:55:00Z
1
value 0.00813
scoring_system epss
scoring_elements 0.74213
published_at 2026-04-02T12:55:00Z
2
value 0.00813
scoring_system epss
scoring_elements 0.74207
published_at 2026-04-01T12:55:00Z
3
value 0.00813
scoring_system epss
scoring_elements 0.7424
published_at 2026-04-04T12:55:00Z
4
value 0.00813
scoring_system epss
scoring_elements 0.74212
published_at 2026-04-07T12:55:00Z
5
value 0.00813
scoring_system epss
scoring_elements 0.74245
published_at 2026-04-08T12:55:00Z
6
value 0.00813
scoring_system epss
scoring_elements 0.74259
published_at 2026-04-09T12:55:00Z
7
value 0.00813
scoring_system epss
scoring_elements 0.74281
published_at 2026-04-11T12:55:00Z
8
value 0.00813
scoring_system epss
scoring_elements 0.74261
published_at 2026-04-12T12:55:00Z
9
value 0.00813
scoring_system epss
scoring_elements 0.74254
published_at 2026-04-13T12:55:00Z
10
value 0.00813
scoring_system epss
scoring_elements 0.74292
published_at 2026-04-16T12:55:00Z
11
value 0.00813
scoring_system epss
scoring_elements 0.74302
published_at 2026-04-18T12:55:00Z
12
value 0.00813
scoring_system epss
scoring_elements 0.74293
published_at 2026-04-21T12:55:00Z
13
value 0.00813
scoring_system epss
scoring_elements 0.74326
published_at 2026-04-24T12:55:00Z
14
value 0.00813
scoring_system epss
scoring_elements 0.74335
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1271
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009167
reference_id 1009167
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009167
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009168
reference_id 1009168
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009168
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2073310
reference_id 2073310
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2073310
7
reference_url https://www.openwall.com/lists/oss-security/2022/04/07/8
reference_id 8
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/
url https://www.openwall.com/lists/oss-security/2022/04/07/8
8
reference_url https://security.archlinux.org/ASA-202204-7
reference_id ASA-202204-7
reference_type
scores
url https://security.archlinux.org/ASA-202204-7
9
reference_url https://security.archlinux.org/ASA-202204-8
reference_id ASA-202204-8
reference_type
scores
url https://security.archlinux.org/ASA-202204-8
10
reference_url https://security.archlinux.org/AVG-2665
reference_id AVG-2665
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2665
11
reference_url https://security.archlinux.org/AVG-2666
reference_id AVG-2666
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2666
12
reference_url https://access.redhat.com/security/cve/CVE-2022-1271
reference_id CVE-2022-1271
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/
url https://access.redhat.com/security/cve/CVE-2022-1271
13
reference_url https://security-tracker.debian.org/tracker/CVE-2022-1271
reference_id CVE-2022-1271
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/
url https://security-tracker.debian.org/tracker/CVE-2022-1271
14
reference_url https://security.gentoo.org/glsa/202209-01
reference_id GLSA-202209-01
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/
url https://security.gentoo.org/glsa/202209-01
15
reference_url https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html
reference_id msg00011.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/
url https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html
16
reference_url https://security.netapp.com/advisory/ntap-20220930-0006/
reference_id ntap-20220930-0006
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/
url https://security.netapp.com/advisory/ntap-20220930-0006/
17
reference_url https://git.tukaani.org/?p=xz.git%3Ba=commit%3Bh=69d1b3fc29677af8ade8dc15dba83f0589cb63d6
reference_id ?p=xz.git%3Ba=commit%3Bh=69d1b3fc29677af8ade8dc15dba83f0589cb63d6
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/
url https://git.tukaani.org/?p=xz.git%3Ba=commit%3Bh=69d1b3fc29677af8ade8dc15dba83f0589cb63d6
18
reference_url https://access.redhat.com/errata/RHSA-2022:1537
reference_id RHSA-2022:1537
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1537
19
reference_url https://access.redhat.com/errata/RHSA-2022:1592
reference_id RHSA-2022:1592
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1592
20
reference_url https://access.redhat.com/errata/RHSA-2022:1665
reference_id RHSA-2022:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1665
21
reference_url https://access.redhat.com/errata/RHSA-2022:1676
reference_id RHSA-2022:1676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1676
22
reference_url https://access.redhat.com/errata/RHSA-2022:2191
reference_id RHSA-2022:2191
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2191
23
reference_url https://access.redhat.com/errata/RHSA-2022:4582
reference_id RHSA-2022:4582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4582
24
reference_url https://access.redhat.com/errata/RHSA-2022:4896
reference_id RHSA-2022:4896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4896
25
reference_url https://access.redhat.com/errata/RHSA-2022:4940
reference_id RHSA-2022:4940
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4940
26
reference_url https://access.redhat.com/errata/RHSA-2022:4991
reference_id RHSA-2022:4991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4991
27
reference_url https://access.redhat.com/errata/RHSA-2022:4992
reference_id RHSA-2022:4992
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4992
28
reference_url https://access.redhat.com/errata/RHSA-2022:4993
reference_id RHSA-2022:4993
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4993
29
reference_url https://access.redhat.com/errata/RHSA-2022:4994
reference_id RHSA-2022:4994
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4994
30
reference_url https://access.redhat.com/errata/RHSA-2022:5052
reference_id RHSA-2022:5052
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5052
31
reference_url https://access.redhat.com/errata/RHSA-2022:5439
reference_id RHSA-2022:5439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5439
32
reference_url https://usn.ubuntu.com/5378-1/
reference_id USN-5378-1
reference_type
scores
url https://usn.ubuntu.com/5378-1/
33
reference_url https://usn.ubuntu.com/5378-2/
reference_id USN-5378-2
reference_type
scores
url https://usn.ubuntu.com/5378-2/
34
reference_url https://usn.ubuntu.com/5378-3/
reference_id USN-5378-3
reference_type
scores
url https://usn.ubuntu.com/5378-3/
35
reference_url https://usn.ubuntu.com/5378-4/
reference_id USN-5378-4
reference_type
scores
url https://usn.ubuntu.com/5378-4/
36
reference_url https://tukaani.org/xz/xzgrep-ZDI-CAN-16587.patch
reference_id xzgrep-ZDI-CAN-16587.patch
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/
url https://tukaani.org/xz/xzgrep-ZDI-CAN-16587.patch
fixed_packages
aliases CVE-2022-1271
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3adf-qttu-3kfd
1
url VCID-5xtu-e6dr-97hb
vulnerability_id VCID-5xtu-e6dr-97hb
summary kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1966.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1966.json
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2093146
reference_id 2093146
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2093146
3
reference_url https://security.archlinux.org/AVG-2751
reference_id AVG-2751
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2751
4
reference_url https://security.archlinux.org/AVG-2752
reference_id AVG-2752
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2752
5
reference_url https://security.archlinux.org/AVG-2753
reference_id AVG-2753
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2753
6
reference_url https://security.archlinux.org/AVG-2754
reference_id AVG-2754
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2754
7
reference_url https://access.redhat.com/errata/RHSA-2022:5214
reference_id RHSA-2022:5214
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5214
8
reference_url https://access.redhat.com/errata/RHSA-2022:5216
reference_id RHSA-2022:5216
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5216
9
reference_url https://access.redhat.com/errata/RHSA-2022:5220
reference_id RHSA-2022:5220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5220
10
reference_url https://access.redhat.com/errata/RHSA-2022:5224
reference_id RHSA-2022:5224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5224
11
reference_url https://access.redhat.com/errata/RHSA-2022:5232
reference_id RHSA-2022:5232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5232
12
reference_url https://access.redhat.com/errata/RHSA-2022:5236
reference_id RHSA-2022:5236
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5236
13
reference_url https://access.redhat.com/errata/RHSA-2022:5249
reference_id RHSA-2022:5249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5249
14
reference_url https://access.redhat.com/errata/RHSA-2022:5267
reference_id RHSA-2022:5267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5267
15
reference_url https://access.redhat.com/errata/RHSA-2022:5439
reference_id RHSA-2022:5439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5439
16
reference_url https://access.redhat.com/errata/RHSA-2022:5476
reference_id RHSA-2022:5476
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5476
17
reference_url https://usn.ubuntu.com/5465-1/
reference_id USN-5465-1
reference_type
scores
url https://usn.ubuntu.com/5465-1/
18
reference_url https://usn.ubuntu.com/5466-1/
reference_id USN-5466-1
reference_type
scores
url https://usn.ubuntu.com/5466-1/
19
reference_url https://usn.ubuntu.com/5467-1/
reference_id USN-5467-1
reference_type
scores
url https://usn.ubuntu.com/5467-1/
20
reference_url https://usn.ubuntu.com/5468-1/
reference_id USN-5468-1
reference_type
scores
url https://usn.ubuntu.com/5468-1/
21
reference_url https://usn.ubuntu.com/5469-1/
reference_id USN-5469-1
reference_type
scores
url https://usn.ubuntu.com/5469-1/
22
reference_url https://usn.ubuntu.com/5470-1/
reference_id USN-5470-1
reference_type
scores
url https://usn.ubuntu.com/5470-1/
23
reference_url https://usn.ubuntu.com/5471-1/
reference_id USN-5471-1
reference_type
scores
url https://usn.ubuntu.com/5471-1/
fixed_packages
aliases CVE-2022-1966
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5xtu-e6dr-97hb
2
url VCID-gkac-yybb-pqdv
vulnerability_id VCID-gkac-yybb-pqdv
summary kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32250.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32250.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32250
reference_id
reference_type
scores
0
value 0.01206
scoring_system epss
scoring_elements 0.79036
published_at 2026-04-29T12:55:00Z
1
value 0.0124
scoring_system epss
scoring_elements 0.79195
published_at 2026-04-02T12:55:00Z
2
value 0.0124
scoring_system epss
scoring_elements 0.79219
published_at 2026-04-04T12:55:00Z
3
value 0.01876
scoring_system epss
scoring_elements 0.83088
published_at 2026-04-07T12:55:00Z
4
value 0.01876
scoring_system epss
scoring_elements 0.83112
published_at 2026-04-08T12:55:00Z
5
value 0.01876
scoring_system epss
scoring_elements 0.8312
published_at 2026-04-09T12:55:00Z
6
value 0.01876
scoring_system epss
scoring_elements 0.83137
published_at 2026-04-11T12:55:00Z
7
value 0.01876
scoring_system epss
scoring_elements 0.8313
published_at 2026-04-12T12:55:00Z
8
value 0.01876
scoring_system epss
scoring_elements 0.83126
published_at 2026-04-13T12:55:00Z
9
value 0.01876
scoring_system epss
scoring_elements 0.83164
published_at 2026-04-18T12:55:00Z
10
value 0.01876
scoring_system epss
scoring_elements 0.83167
published_at 2026-04-21T12:55:00Z
11
value 0.01876
scoring_system epss
scoring_elements 0.8319
published_at 2026-04-24T12:55:00Z
12
value 0.01876
scoring_system epss
scoring_elements 0.83197
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32250
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
45
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
46
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2092427
reference_id 2092427
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2092427
47
reference_url https://access.redhat.com/errata/RHSA-2022:5214
reference_id RHSA-2022:5214
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5214
48
reference_url https://access.redhat.com/errata/RHSA-2022:5216
reference_id RHSA-2022:5216
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5216
49
reference_url https://access.redhat.com/errata/RHSA-2022:5220
reference_id RHSA-2022:5220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5220
50
reference_url https://access.redhat.com/errata/RHSA-2022:5224
reference_id RHSA-2022:5224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5224
51
reference_url https://access.redhat.com/errata/RHSA-2022:5232
reference_id RHSA-2022:5232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5232
52
reference_url https://access.redhat.com/errata/RHSA-2022:5236
reference_id RHSA-2022:5236
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5236
53
reference_url https://access.redhat.com/errata/RHSA-2022:5249
reference_id RHSA-2022:5249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5249
54
reference_url https://access.redhat.com/errata/RHSA-2022:5267
reference_id RHSA-2022:5267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5267
55
reference_url https://access.redhat.com/errata/RHSA-2022:5439
reference_id RHSA-2022:5439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5439
56
reference_url https://access.redhat.com/errata/RHSA-2022:5476
reference_id RHSA-2022:5476
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5476
57
reference_url https://access.redhat.com/errata/RHSA-2022:5626
reference_id RHSA-2022:5626
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5626
58
reference_url https://access.redhat.com/errata/RHSA-2022:5633
reference_id RHSA-2022:5633
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5633
59
reference_url https://access.redhat.com/errata/RHSA-2022:5636
reference_id RHSA-2022:5636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5636
60
reference_url https://access.redhat.com/errata/RHSA-2022:5641
reference_id RHSA-2022:5641
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5641
61
reference_url https://access.redhat.com/errata/RHSA-2022:5648
reference_id RHSA-2022:5648
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5648
62
reference_url https://access.redhat.com/errata/RHSA-2022:5802
reference_id RHSA-2022:5802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5802
63
reference_url https://access.redhat.com/errata/RHSA-2022:5804
reference_id RHSA-2022:5804
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5804
64
reference_url https://access.redhat.com/errata/RHSA-2022:5805
reference_id RHSA-2022:5805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5805
65
reference_url https://access.redhat.com/errata/RHSA-2022:5806
reference_id RHSA-2022:5806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5806
66
reference_url https://access.redhat.com/errata/RHSA-2022:5819
reference_id RHSA-2022:5819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5819
67
reference_url https://access.redhat.com/errata/RHSA-2022:5834
reference_id RHSA-2022:5834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5834
68
reference_url https://access.redhat.com/errata/RHSA-2022:5839
reference_id RHSA-2022:5839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5839
69
reference_url https://access.redhat.com/errata/RHSA-2022:6073
reference_id RHSA-2022:6073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6073
70
reference_url https://access.redhat.com/errata/RHSA-2022:6075
reference_id RHSA-2022:6075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6075
71
reference_url https://access.redhat.com/errata/RHSA-2022:6551
reference_id RHSA-2022:6551
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6551
fixed_packages
aliases CVE-2022-32250
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gkac-yybb-pqdv
3
url VCID-xd6j-x83x-r3gn
vulnerability_id VCID-xd6j-x83x-r3gn
summary
Out-of-bounds Write
zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-25032.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-25032.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-25032
reference_id
reference_type
scores
0
value 0.00081
scoring_system epss
scoring_elements 0.23937
published_at 2026-04-01T12:55:00Z
1
value 0.00081
scoring_system epss
scoring_elements 0.24102
published_at 2026-04-04T12:55:00Z
2
value 0.00081
scoring_system epss
scoring_elements 0.24064
published_at 2026-04-02T12:55:00Z
3
value 0.00089
scoring_system epss
scoring_elements 0.2528
published_at 2026-04-21T12:55:00Z
4
value 0.00089
scoring_system epss
scoring_elements 0.25309
published_at 2026-04-18T12:55:00Z
5
value 0.00089
scoring_system epss
scoring_elements 0.25318
published_at 2026-04-16T12:55:00Z
6
value 0.00089
scoring_system epss
scoring_elements 0.25311
published_at 2026-04-13T12:55:00Z
7
value 0.00089
scoring_system epss
scoring_elements 0.25364
published_at 2026-04-12T12:55:00Z
8
value 0.00089
scoring_system epss
scoring_elements 0.25406
published_at 2026-04-11T12:55:00Z
9
value 0.00089
scoring_system epss
scoring_elements 0.25282
published_at 2026-04-07T12:55:00Z
10
value 0.00089
scoring_system epss
scoring_elements 0.25188
published_at 2026-04-29T12:55:00Z
11
value 0.00089
scoring_system epss
scoring_elements 0.25232
published_at 2026-04-26T12:55:00Z
12
value 0.00089
scoring_system epss
scoring_elements 0.25241
published_at 2026-04-24T12:55:00Z
13
value 0.00089
scoring_system epss
scoring_elements 0.25394
published_at 2026-04-09T12:55:00Z
14
value 0.00089
scoring_system epss
scoring_elements 0.2535
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-25032
2
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
4
reference_url http://seclists.org/fulldisclosure/2022/May/33
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url http://seclists.org/fulldisclosure/2022/May/33
5
reference_url http://seclists.org/fulldisclosure/2022/May/35
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url http://seclists.org/fulldisclosure/2022/May/35
6
reference_url http://seclists.org/fulldisclosure/2022/May/38
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url http://seclists.org/fulldisclosure/2022/May/38
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
9
reference_url https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
10
reference_url https://github.com/madler/zlib/issues/605
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://github.com/madler/zlib/issues/605
11
reference_url https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
12
reference_url https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
13
reference_url https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/
16
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
26
reference_url https://security.gentoo.org/glsa/202210-42
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://security.gentoo.org/glsa/202210-42
27
reference_url https://security.netapp.com/advisory/ntap-20220526-0009
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20220526-0009
28
reference_url https://security.netapp.com/advisory/ntap-20220526-0009/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://security.netapp.com/advisory/ntap-20220526-0009/
29
reference_url https://security.netapp.com/advisory/ntap-20220729-0004
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20220729-0004
30
reference_url https://security.netapp.com/advisory/ntap-20220729-0004/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://security.netapp.com/advisory/ntap-20220729-0004/
31
reference_url https://support.apple.com/kb/HT213255
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://support.apple.com/kb/HT213255
32
reference_url https://support.apple.com/kb/HT213256
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://support.apple.com/kb/HT213256
33
reference_url https://support.apple.com/kb/HT213257
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://support.apple.com/kb/HT213257
34
reference_url https://www.debian.org/security/2022/dsa-5111
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://www.debian.org/security/2022/dsa-5111
35
reference_url https://www.openwall.com/lists/oss-security/2022/03/24/1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://www.openwall.com/lists/oss-security/2022/03/24/1
36
reference_url https://www.openwall.com/lists/oss-security/2022/03/28/1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://www.openwall.com/lists/oss-security/2022/03/28/1
37
reference_url https://www.openwall.com/lists/oss-security/2022/03/28/3
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://www.openwall.com/lists/oss-security/2022/03/28/3
38
reference_url https://www.oracle.com/security-alerts/cpujul2022.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://www.oracle.com/security-alerts/cpujul2022.html
39
reference_url http://www.openwall.com/lists/oss-security/2022/03/25/2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url http://www.openwall.com/lists/oss-security/2022/03/25/2
40
reference_url http://www.openwall.com/lists/oss-security/2022/03/26/1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url http://www.openwall.com/lists/oss-security/2022/03/26/1
41
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1008265
reference_id 1008265
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1008265
42
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2067945
reference_id 2067945
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2067945
43
reference_url https://security.archlinux.org/ASA-202204-3
reference_id ASA-202204-3
reference_type
scores
url https://security.archlinux.org/ASA-202204-3
44
reference_url https://security.archlinux.org/AVG-2657
reference_id AVG-2657
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2657
45
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-25032
reference_id CVE-2018-25032
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2018-25032
46
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2018-25032.yml
reference_id CVE-2018-25032.YML
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2018-25032.yml
47
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/
reference_id DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/
48
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/
reference_id DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/
49
reference_url https://github.com/advisories/GHSA-jc36-42cf-vqwj
reference_id GHSA-jc36-42cf-vqwj
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-jc36-42cf-vqwj
50
reference_url https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
reference_id GHSA-v6gp-9mmm-c6p5
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
51
reference_url https://security.gentoo.org/glsa/202405-22
reference_id GLSA-202405-22
reference_type
scores
url https://security.gentoo.org/glsa/202405-22
52
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/
reference_id JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/
53
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
reference_id NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
54
reference_url https://access.redhat.com/errata/RHSA-2022:1591
reference_id RHSA-2022:1591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1591
55
reference_url https://access.redhat.com/errata/RHSA-2022:1642
reference_id RHSA-2022:1642
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1642
56
reference_url https://access.redhat.com/errata/RHSA-2022:1661
reference_id RHSA-2022:1661
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1661
57
reference_url https://access.redhat.com/errata/RHSA-2022:2192
reference_id RHSA-2022:2192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2192
58
reference_url https://access.redhat.com/errata/RHSA-2022:2197
reference_id RHSA-2022:2197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2197
59
reference_url https://access.redhat.com/errata/RHSA-2022:2198
reference_id RHSA-2022:2198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2198
60
reference_url https://access.redhat.com/errata/RHSA-2022:2201
reference_id RHSA-2022:2201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2201
61
reference_url https://access.redhat.com/errata/RHSA-2022:2213
reference_id RHSA-2022:2213
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2213
62
reference_url https://access.redhat.com/errata/RHSA-2022:2214
reference_id RHSA-2022:2214
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2214
63
reference_url https://access.redhat.com/errata/RHSA-2022:4584
reference_id RHSA-2022:4584
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4584
64
reference_url https://access.redhat.com/errata/RHSA-2022:4592
reference_id RHSA-2022:4592
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4592
65
reference_url https://access.redhat.com/errata/RHSA-2022:4845
reference_id RHSA-2022:4845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4845
66
reference_url https://access.redhat.com/errata/RHSA-2022:4896
reference_id RHSA-2022:4896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4896
67
reference_url https://access.redhat.com/errata/RHSA-2022:5439
reference_id RHSA-2022:5439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5439
68
reference_url https://access.redhat.com/errata/RHSA-2022:7144
reference_id RHSA-2022:7144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7144
69
reference_url https://access.redhat.com/errata/RHSA-2022:7813
reference_id RHSA-2022:7813
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7813
70
reference_url https://access.redhat.com/errata/RHSA-2022:8420
reference_id RHSA-2022:8420
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8420
71
reference_url https://access.redhat.com/errata/RHSA-2023:0943
reference_id RHSA-2023:0943
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0943
72
reference_url https://access.redhat.com/errata/RHSA-2023:0975
reference_id RHSA-2023:0975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0975
73
reference_url https://access.redhat.com/errata/RHSA-2023:0976
reference_id RHSA-2023:0976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0976
74
reference_url https://usn.ubuntu.com/5355-1/
reference_id USN-5355-1
reference_type
scores
url https://usn.ubuntu.com/5355-1/
75
reference_url https://usn.ubuntu.com/5355-2/
reference_id USN-5355-2
reference_type
scores
url https://usn.ubuntu.com/5355-2/
76
reference_url https://usn.ubuntu.com/5359-1/
reference_id USN-5359-1
reference_type
scores
url https://usn.ubuntu.com/5359-1/
77
reference_url https://usn.ubuntu.com/5359-2/
reference_id USN-5359-2
reference_type
scores
url https://usn.ubuntu.com/5359-2/
78
reference_url https://usn.ubuntu.com/5739-1/
reference_id USN-5739-1
reference_type
scores
url https://usn.ubuntu.com/5739-1/
79
reference_url https://usn.ubuntu.com/6736-1/
reference_id USN-6736-1
reference_type
scores
url https://usn.ubuntu.com/6736-1/
80
reference_url https://usn.ubuntu.com/6736-2/
reference_id USN-6736-2
reference_type
scores
url https://usn.ubuntu.com/6736-2/
81
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
reference_id VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
82
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
reference_id XOKFMSNQ5D5WGMALBNBXU3GE442V74WU
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
fixed_packages
aliases CVE-2018-25032, GHSA-jc36-42cf-vqwj
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xd6j-x83x-r3gn
4
url VCID-ybfq-unp3-dbav
vulnerability_id VCID-ybfq-unp3-dbav
summary A vulnerability has been discovered in rsyslog, which could possibly lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24903.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24903.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-24903
reference_id
reference_type
scores
0
value 0.00501
scoring_system epss
scoring_elements 0.6607
published_at 2026-04-29T12:55:00Z
1
value 0.00501
scoring_system epss
scoring_elements 0.66034
published_at 2026-04-12T12:55:00Z
2
value 0.00501
scoring_system epss
scoring_elements 0.66004
published_at 2026-04-13T12:55:00Z
3
value 0.00501
scoring_system epss
scoring_elements 0.6604
published_at 2026-04-16T12:55:00Z
4
value 0.00501
scoring_system epss
scoring_elements 0.66054
published_at 2026-04-18T12:55:00Z
5
value 0.00501
scoring_system epss
scoring_elements 0.66042
published_at 2026-04-21T12:55:00Z
6
value 0.00501
scoring_system epss
scoring_elements 0.66061
published_at 2026-04-24T12:55:00Z
7
value 0.00501
scoring_system epss
scoring_elements 0.66072
published_at 2026-04-26T12:55:00Z
8
value 0.00781
scoring_system epss
scoring_elements 0.73718
published_at 2026-04-11T12:55:00Z
9
value 0.00781
scoring_system epss
scoring_elements 0.73652
published_at 2026-04-02T12:55:00Z
10
value 0.00781
scoring_system epss
scoring_elements 0.73676
published_at 2026-04-04T12:55:00Z
11
value 0.00781
scoring_system epss
scoring_elements 0.73648
published_at 2026-04-07T12:55:00Z
12
value 0.00781
scoring_system epss
scoring_elements 0.73683
published_at 2026-04-08T12:55:00Z
13
value 0.00781
scoring_system epss
scoring_elements 0.73697
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-24903
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24903
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010619
reference_id 1010619
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010619
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2081353
reference_id 2081353
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2081353
6
reference_url https://www.debian.org/security/2022/dsa-5150
reference_id dsa-5150
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:53:40Z/
url https://www.debian.org/security/2022/dsa-5150
7
reference_url https://github.com/rsyslog/rsyslog/commit/f211042ecbb472f9d8beb4678a65d272b6f07705
reference_id f211042ecbb472f9d8beb4678a65d272b6f07705
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:53:40Z/
url https://github.com/rsyslog/rsyslog/commit/f211042ecbb472f9d8beb4678a65d272b6f07705
8
reference_url https://github.com/rsyslog/rsyslog/security/advisories/GHSA-ggw7-xr6h-mmr8
reference_id GHSA-ggw7-xr6h-mmr8
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:53:40Z/
url https://github.com/rsyslog/rsyslog/security/advisories/GHSA-ggw7-xr6h-mmr8
9
reference_url https://security.gentoo.org/glsa/202408-28
reference_id GLSA-202408-28
reference_type
scores
url https://security.gentoo.org/glsa/202408-28
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GMNNXLCU2UORRVSZO24HL4KMVPK5PHVW/
reference_id GMNNXLCU2UORRVSZO24HL4KMVPK5PHVW
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:53:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GMNNXLCU2UORRVSZO24HL4KMVPK5PHVW/
11
reference_url https://security.netapp.com/advisory/ntap-20221111-0002/
reference_id ntap-20221111-0002
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:53:40Z/
url https://security.netapp.com/advisory/ntap-20221111-0002/
12
reference_url https://access.redhat.com/errata/RHSA-2022:4795
reference_id RHSA-2022:4795
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4795
13
reference_url https://access.redhat.com/errata/RHSA-2022:4799
reference_id RHSA-2022:4799
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4799
14
reference_url https://access.redhat.com/errata/RHSA-2022:4800
reference_id RHSA-2022:4800
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4800
15
reference_url https://access.redhat.com/errata/RHSA-2022:4801
reference_id RHSA-2022:4801
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4801
16
reference_url https://access.redhat.com/errata/RHSA-2022:4802
reference_id RHSA-2022:4802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4802
17
reference_url https://access.redhat.com/errata/RHSA-2022:4803
reference_id RHSA-2022:4803
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4803
18
reference_url https://access.redhat.com/errata/RHSA-2022:4808
reference_id RHSA-2022:4808
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4808
19
reference_url https://access.redhat.com/errata/RHSA-2022:4896
reference_id RHSA-2022:4896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4896
20
reference_url https://access.redhat.com/errata/RHSA-2022:5439
reference_id RHSA-2022:5439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5439
21
reference_url https://usn.ubuntu.com/5404-1/
reference_id USN-5404-1
reference_type
scores
url https://usn.ubuntu.com/5404-1/
22
reference_url https://usn.ubuntu.com/5404-2/
reference_id USN-5404-2
reference_type
scores
url https://usn.ubuntu.com/5404-2/
fixed_packages
aliases CVE-2022-24903
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ybfq-unp3-dbav
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/redhat-virtualization-host@4.3.23-20220622.0%3Farch=el7_9