Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/redhat-virtualization-host@4.3.22-20220330.1?arch=el7_9
Typerpm
Namespaceredhat
Nameredhat-virtualization-host
Version4.3.22-20220330.1
Qualifiers
arch el7_9
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-45du-dgkd-p3b8
vulnerability_id VCID-45du-dgkd-p3b8
summary kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4155.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4155.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4155
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05306
published_at 2026-04-01T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05347
published_at 2026-04-02T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05378
published_at 2026-04-04T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05387
published_at 2026-04-07T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.0542
published_at 2026-04-08T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05443
published_at 2026-04-09T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.05416
published_at 2026-04-11T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05403
published_at 2026-04-12T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05396
published_at 2026-04-13T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.05345
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4155
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0185
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375
55
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
56
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2034813
reference_id 2034813
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2034813
57
reference_url https://access.redhat.com/errata/RHSA-2022:0176
reference_id RHSA-2022:0176
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0176
58
reference_url https://access.redhat.com/errata/RHSA-2022:0186
reference_id RHSA-2022:0186
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0186
59
reference_url https://access.redhat.com/errata/RHSA-2022:0187
reference_id RHSA-2022:0187
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0187
60
reference_url https://access.redhat.com/errata/RHSA-2022:0188
reference_id RHSA-2022:0188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0188
61
reference_url https://access.redhat.com/errata/RHSA-2022:0231
reference_id RHSA-2022:0231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0231
62
reference_url https://access.redhat.com/errata/RHSA-2022:0232
reference_id RHSA-2022:0232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0232
63
reference_url https://access.redhat.com/errata/RHSA-2022:0335
reference_id RHSA-2022:0335
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0335
64
reference_url https://access.redhat.com/errata/RHSA-2022:0344
reference_id RHSA-2022:0344
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0344
65
reference_url https://access.redhat.com/errata/RHSA-2022:0529
reference_id RHSA-2022:0529
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0529
66
reference_url https://access.redhat.com/errata/RHSA-2022:0530
reference_id RHSA-2022:0530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0530
67
reference_url https://access.redhat.com/errata/RHSA-2022:0531
reference_id RHSA-2022:0531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0531
68
reference_url https://access.redhat.com/errata/RHSA-2022:0533
reference_id RHSA-2022:0533
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0533
69
reference_url https://access.redhat.com/errata/RHSA-2022:0540
reference_id RHSA-2022:0540
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0540
70
reference_url https://access.redhat.com/errata/RHSA-2022:0590
reference_id RHSA-2022:0590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0590
71
reference_url https://access.redhat.com/errata/RHSA-2022:0592
reference_id RHSA-2022:0592
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0592
72
reference_url https://access.redhat.com/errata/RHSA-2022:0620
reference_id RHSA-2022:0620
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0620
73
reference_url https://access.redhat.com/errata/RHSA-2022:0622
reference_id RHSA-2022:0622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0622
74
reference_url https://access.redhat.com/errata/RHSA-2022:0629
reference_id RHSA-2022:0629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0629
75
reference_url https://access.redhat.com/errata/RHSA-2022:0636
reference_id RHSA-2022:0636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0636
76
reference_url https://access.redhat.com/errata/RHSA-2022:0712
reference_id RHSA-2022:0712
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0712
77
reference_url https://access.redhat.com/errata/RHSA-2022:0718
reference_id RHSA-2022:0718
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0718
78
reference_url https://access.redhat.com/errata/RHSA-2022:0958
reference_id RHSA-2022:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0958
79
reference_url https://access.redhat.com/errata/RHSA-2022:1263
reference_id RHSA-2022:1263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1263
80
reference_url https://access.redhat.com/errata/RHSA-2022:1417
reference_id RHSA-2022:1417
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1417
81
reference_url https://usn.ubuntu.com/5278-1/
reference_id USN-5278-1
reference_type
scores
url https://usn.ubuntu.com/5278-1/
82
reference_url https://usn.ubuntu.com/5294-1/
reference_id USN-5294-1
reference_type
scores
url https://usn.ubuntu.com/5294-1/
83
reference_url https://usn.ubuntu.com/5294-2/
reference_id USN-5294-2
reference_type
scores
url https://usn.ubuntu.com/5294-2/
84
reference_url https://usn.ubuntu.com/5295-1/
reference_id USN-5295-1
reference_type
scores
url https://usn.ubuntu.com/5295-1/
85
reference_url https://usn.ubuntu.com/5295-2/
reference_id USN-5295-2
reference_type
scores
url https://usn.ubuntu.com/5295-2/
86
reference_url https://usn.ubuntu.com/5297-1/
reference_id USN-5297-1
reference_type
scores
url https://usn.ubuntu.com/5297-1/
87
reference_url https://usn.ubuntu.com/5298-1/
reference_id USN-5298-1
reference_type
scores
url https://usn.ubuntu.com/5298-1/
88
reference_url https://usn.ubuntu.com/5362-1/
reference_id USN-5362-1
reference_type
scores
url https://usn.ubuntu.com/5362-1/
89
reference_url https://usn.ubuntu.com/5884-1/
reference_id USN-5884-1
reference_type
scores
url https://usn.ubuntu.com/5884-1/
90
reference_url https://usn.ubuntu.com/5926-1/
reference_id USN-5926-1
reference_type
scores
url https://usn.ubuntu.com/5926-1/
fixed_packages
aliases CVE-2021-4155
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-45du-dgkd-p3b8
1
url VCID-cy2n-zexk-jyda
vulnerability_id VCID-cy2n-zexk-jyda
summary Multiple vulnerabilities have been discovered in Expat, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-25315.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-25315.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-25315
reference_id
reference_type
scores
0
value 0.07704
scoring_system epss
scoring_elements 0.91921
published_at 2026-04-09T12:55:00Z
1
value 0.07704
scoring_system epss
scoring_elements 0.91888
published_at 2026-04-02T12:55:00Z
2
value 0.07704
scoring_system epss
scoring_elements 0.91939
published_at 2026-04-16T12:55:00Z
3
value 0.07704
scoring_system epss
scoring_elements 0.9192
published_at 2026-04-13T12:55:00Z
4
value 0.07704
scoring_system epss
scoring_elements 0.91923
published_at 2026-04-12T12:55:00Z
5
value 0.07704
scoring_system epss
scoring_elements 0.91924
published_at 2026-04-11T12:55:00Z
6
value 0.07704
scoring_system epss
scoring_elements 0.91896
published_at 2026-04-04T12:55:00Z
7
value 0.07704
scoring_system epss
scoring_elements 0.91903
published_at 2026-04-07T12:55:00Z
8
value 0.07704
scoring_system epss
scoring_elements 0.91915
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-25315
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25314
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url http://www.openwall.com/lists/oss-security/2022/02/19/1
reference_id 1
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:38Z/
url http://www.openwall.com/lists/oss-security/2022/02/19/1
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2056363
reference_id 2056363
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2056363
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
reference_id 3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
11
reference_url https://github.com/libexpat/libexpat/pull/559
reference_id 559
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:38Z/
url https://github.com/libexpat/libexpat/pull/559
12
reference_url https://www.debian.org/security/2022/dsa-5085
reference_id dsa-5085
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:38Z/
url https://www.debian.org/security/2022/dsa-5085
13
reference_url https://security.gentoo.org/glsa/202209-24
reference_id GLSA-202209-24
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:38Z/
url https://security.gentoo.org/glsa/202209-24
14
reference_url https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
reference_id msg00007.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:38Z/
url https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
15
reference_url https://security.netapp.com/advisory/ntap-20220303-0008/
reference_id ntap-20220303-0008
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:38Z/
url https://security.netapp.com/advisory/ntap-20220303-0008/
16
reference_url https://access.redhat.com/errata/RHSA-2022:0815
reference_id RHSA-2022:0815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0815
17
reference_url https://access.redhat.com/errata/RHSA-2022:0816
reference_id RHSA-2022:0816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0816
18
reference_url https://access.redhat.com/errata/RHSA-2022:0817
reference_id RHSA-2022:0817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0817
19
reference_url https://access.redhat.com/errata/RHSA-2022:0818
reference_id RHSA-2022:0818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0818
20
reference_url https://access.redhat.com/errata/RHSA-2022:0824
reference_id RHSA-2022:0824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0824
21
reference_url https://access.redhat.com/errata/RHSA-2022:0843
reference_id RHSA-2022:0843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0843
22
reference_url https://access.redhat.com/errata/RHSA-2022:0845
reference_id RHSA-2022:0845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0845
23
reference_url https://access.redhat.com/errata/RHSA-2022:0847
reference_id RHSA-2022:0847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0847
24
reference_url https://access.redhat.com/errata/RHSA-2022:0850
reference_id RHSA-2022:0850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0850
25
reference_url https://access.redhat.com/errata/RHSA-2022:0853
reference_id RHSA-2022:0853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0853
26
reference_url https://access.redhat.com/errata/RHSA-2022:0951
reference_id RHSA-2022:0951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0951
27
reference_url https://access.redhat.com/errata/RHSA-2022:1012
reference_id RHSA-2022:1012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1012
28
reference_url https://access.redhat.com/errata/RHSA-2022:1053
reference_id RHSA-2022:1053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1053
29
reference_url https://access.redhat.com/errata/RHSA-2022:1068
reference_id RHSA-2022:1068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1068
30
reference_url https://access.redhat.com/errata/RHSA-2022:1069
reference_id RHSA-2022:1069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1069
31
reference_url https://access.redhat.com/errata/RHSA-2022:1070
reference_id RHSA-2022:1070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1070
32
reference_url https://access.redhat.com/errata/RHSA-2022:1263
reference_id RHSA-2022:1263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1263
33
reference_url https://access.redhat.com/errata/RHSA-2022:1309
reference_id RHSA-2022:1309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1309
34
reference_url https://access.redhat.com/errata/RHSA-2022:7144
reference_id RHSA-2022:7144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7144
35
reference_url https://access.redhat.com/errata/RHSA-2022:7811
reference_id RHSA-2022:7811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7811
36
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
reference_id ssa-484086.pdf
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:38Z/
url https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
37
reference_url https://usn.ubuntu.com/5320-1/
reference_id USN-5320-1
reference_type
scores
url https://usn.ubuntu.com/5320-1/
38
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
reference_id Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
fixed_packages
aliases CVE-2022-25315
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cy2n-zexk-jyda
2
url VCID-gsbn-6t86-7kf9
vulnerability_id VCID-gsbn-6t86-7kf9
summary
Loop with Unreachable Exit Condition ('Infinite Loop')
The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters
references
0
reference_url http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0778
reference_id
reference_type
scores
0
value 0.06432
scoring_system epss
scoring_elements 0.91023
published_at 2026-04-04T12:55:00Z
1
value 0.07109
scoring_system epss
scoring_elements 0.91532
published_at 2026-04-09T12:55:00Z
2
value 0.07109
scoring_system epss
scoring_elements 0.91526
published_at 2026-04-08T12:55:00Z
3
value 0.07109
scoring_system epss
scoring_elements 0.91513
published_at 2026-04-07T12:55:00Z
4
value 0.07128
scoring_system epss
scoring_elements 0.91567
published_at 2026-04-16T12:55:00Z
5
value 0.07394
scoring_system epss
scoring_elements 0.91693
published_at 2026-04-01T12:55:00Z
6
value 0.07394
scoring_system epss
scoring_elements 0.91701
published_at 2026-04-02T12:55:00Z
7
value 0.07807
scoring_system epss
scoring_elements 0.91978
published_at 2026-04-13T12:55:00Z
8
value 0.08117
scoring_system epss
scoring_elements 0.92165
published_at 2026-04-11T12:55:00Z
9
value 0.08117
scoring_system epss
scoring_elements 0.92166
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0778
3
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4160
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4160
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
6
reference_url http://seclists.org/fulldisclosure/2022/May/33
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://seclists.org/fulldisclosure/2022/May/33
7
reference_url http://seclists.org/fulldisclosure/2022/May/35
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://seclists.org/fulldisclosure/2022/May/35
8
reference_url http://seclists.org/fulldisclosure/2022/May/38
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://seclists.org/fulldisclosure/2022/May/38
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65
11
reference_url https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83
12
reference_url https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246
13
reference_url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
14
reference_url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
15
reference_url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
16
reference_url https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
17
reference_url https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG
24
reference_url https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
25
reference_url https://rustsec.org/advisories/RUSTSEC-2022-0014.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://rustsec.org/advisories/RUSTSEC-2022-0014.html
26
reference_url https://security.netapp.com/advisory/ntap-20220321-0002
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20220321-0002
27
reference_url https://security.netapp.com/advisory/ntap-20220321-0002/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20220321-0002/
28
reference_url https://security.netapp.com/advisory/ntap-20220429-0005
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20220429-0005
29
reference_url https://security.netapp.com/advisory/ntap-20240621-0006
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20240621-0006
30
reference_url https://support.apple.com/kb/HT213255
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://support.apple.com/kb/HT213255
31
reference_url https://support.apple.com/kb/HT213256
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://support.apple.com/kb/HT213256
32
reference_url https://support.apple.com/kb/HT213257
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://support.apple.com/kb/HT213257
33
reference_url https://www.debian.org/security/2022/dsa-5103
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2022/dsa-5103
34
reference_url https://www.openssl.org/news/secadv/20220315.txt
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.openssl.org/news/secadv/20220315.txt
35
reference_url https://www.oracle.com/security-alerts/cpuapr2022.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuapr2022.html
36
reference_url https://www.oracle.com/security-alerts/cpujul2022.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpujul2022.html
37
reference_url https://www.tenable.com/security/tns-2022-06
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.tenable.com/security/tns-2022-06
38
reference_url https://www.tenable.com/security/tns-2022-07
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.tenable.com/security/tns-2022-07
39
reference_url https://www.tenable.com/security/tns-2022-08
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.tenable.com/security/tns-2022-08
40
reference_url https://www.tenable.com/security/tns-2022-09
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.tenable.com/security/tns-2022-09
41
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2062202
reference_id 2062202
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2062202
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-0778
reference_id CVE-2022-0778
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-0778
43
reference_url https://github.com/advisories/GHSA-x3mh-jvjw-3xwx
reference_id GHSA-x3mh-jvjw-3xwx
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-x3mh-jvjw-3xwx
44
reference_url https://security.gentoo.org/glsa/202210-02
reference_id GLSA-202210-02
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/202210-02
45
reference_url https://security.gentoo.org/glsa/202405-29
reference_id GLSA-202405-29
reference_type
scores
url https://security.gentoo.org/glsa/202405-29
46
reference_url https://access.redhat.com/errata/RHSA-2022:1065
reference_id RHSA-2022:1065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1065
47
reference_url https://access.redhat.com/errata/RHSA-2022:1066
reference_id RHSA-2022:1066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1066
48
reference_url https://access.redhat.com/errata/RHSA-2022:1071
reference_id RHSA-2022:1071
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1071
49
reference_url https://access.redhat.com/errata/RHSA-2022:1073
reference_id RHSA-2022:1073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1073
50
reference_url https://access.redhat.com/errata/RHSA-2022:1076
reference_id RHSA-2022:1076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1076
51
reference_url https://access.redhat.com/errata/RHSA-2022:1077
reference_id RHSA-2022:1077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1077
52
reference_url https://access.redhat.com/errata/RHSA-2022:1078
reference_id RHSA-2022:1078
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1078
53
reference_url https://access.redhat.com/errata/RHSA-2022:1082
reference_id RHSA-2022:1082
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1082
54
reference_url https://access.redhat.com/errata/RHSA-2022:1091
reference_id RHSA-2022:1091
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1091
55
reference_url https://access.redhat.com/errata/RHSA-2022:1112
reference_id RHSA-2022:1112
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1112
56
reference_url https://access.redhat.com/errata/RHSA-2022:1263
reference_id RHSA-2022:1263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1263
57
reference_url https://access.redhat.com/errata/RHSA-2022:1389
reference_id RHSA-2022:1389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1389
58
reference_url https://access.redhat.com/errata/RHSA-2022:1390
reference_id RHSA-2022:1390
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1390
59
reference_url https://access.redhat.com/errata/RHSA-2022:1519
reference_id RHSA-2022:1519
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1519
60
reference_url https://access.redhat.com/errata/RHSA-2022:1520
reference_id RHSA-2022:1520
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1520
61
reference_url https://access.redhat.com/errata/RHSA-2022:4896
reference_id RHSA-2022:4896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4896
62
reference_url https://access.redhat.com/errata/RHSA-2022:4899
reference_id RHSA-2022:4899
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4899
63
reference_url https://access.redhat.com/errata/RHSA-2022:5326
reference_id RHSA-2022:5326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5326
64
reference_url https://usn.ubuntu.com/5328-1/
reference_id USN-5328-1
reference_type
scores
url https://usn.ubuntu.com/5328-1/
65
reference_url https://usn.ubuntu.com/5328-2/
reference_id USN-5328-2
reference_type
scores
url https://usn.ubuntu.com/5328-2/
66
reference_url https://usn.ubuntu.com/6457-1/
reference_id USN-6457-1
reference_type
scores
url https://usn.ubuntu.com/6457-1/
67
reference_url https://usn.ubuntu.com/7894-1/
reference_id USN-7894-1
reference_type
scores
url https://usn.ubuntu.com/7894-1/
fixed_packages
aliases CVE-2022-0778, GHSA-x3mh-jvjw-3xwx
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gsbn-6t86-7kf9
3
url VCID-m1fw-z29h-ubdn
vulnerability_id VCID-m1fw-z29h-ubdn
summary kernel: use-after-free in RDMA listen()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4028.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4028.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4028
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09528
published_at 2026-04-01T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09482
published_at 2026-04-16T12:55:00Z
2
value 0.00033
scoring_system epss
scoring_elements 0.0958
published_at 2026-04-08T12:55:00Z
3
value 0.00033
scoring_system epss
scoring_elements 0.09629
published_at 2026-04-09T12:55:00Z
4
value 0.00033
scoring_system epss
scoring_elements 0.09638
published_at 2026-04-11T12:55:00Z
5
value 0.00033
scoring_system epss
scoring_elements 0.09607
published_at 2026-04-12T12:55:00Z
6
value 0.00033
scoring_system epss
scoring_elements 0.09591
published_at 2026-04-13T12:55:00Z
7
value 0.00033
scoring_system epss
scoring_elements 0.09542
published_at 2026-04-02T12:55:00Z
8
value 0.00033
scoring_system epss
scoring_elements 0.09592
published_at 2026-04-04T12:55:00Z
9
value 0.00033
scoring_system epss
scoring_elements 0.09505
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4028
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4028
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2027201
reference_id 2027201
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2027201
5
reference_url https://security.archlinux.org/AVG-1741
reference_id AVG-1741
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1741
6
reference_url https://security.archlinux.org/AVG-1879
reference_id AVG-1879
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1879
7
reference_url https://security.archlinux.org/AVG-1880
reference_id AVG-1880
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1880
8
reference_url https://security.archlinux.org/AVG-1881
reference_id AVG-1881
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1881
9
reference_url https://access.redhat.com/errata/RHSA-2022:0590
reference_id RHSA-2022:0590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0590
10
reference_url https://access.redhat.com/errata/RHSA-2022:0629
reference_id RHSA-2022:0629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0629
11
reference_url https://access.redhat.com/errata/RHSA-2022:0636
reference_id RHSA-2022:0636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0636
12
reference_url https://access.redhat.com/errata/RHSA-2022:0771
reference_id RHSA-2022:0771
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0771
13
reference_url https://access.redhat.com/errata/RHSA-2022:0772
reference_id RHSA-2022:0772
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0772
14
reference_url https://access.redhat.com/errata/RHSA-2022:0777
reference_id RHSA-2022:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0777
15
reference_url https://access.redhat.com/errata/RHSA-2022:0823
reference_id RHSA-2022:0823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0823
16
reference_url https://access.redhat.com/errata/RHSA-2022:0851
reference_id RHSA-2022:0851
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0851
17
reference_url https://access.redhat.com/errata/RHSA-2022:0958
reference_id RHSA-2022:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0958
18
reference_url https://access.redhat.com/errata/RHSA-2022:1185
reference_id RHSA-2022:1185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1185
19
reference_url https://access.redhat.com/errata/RHSA-2022:1198
reference_id RHSA-2022:1198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1198
20
reference_url https://access.redhat.com/errata/RHSA-2022:1199
reference_id RHSA-2022:1199
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1199
21
reference_url https://access.redhat.com/errata/RHSA-2022:1263
reference_id RHSA-2022:1263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1263
22
reference_url https://access.redhat.com/errata/RHSA-2022:1324
reference_id RHSA-2022:1324
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1324
23
reference_url https://access.redhat.com/errata/RHSA-2022:1373
reference_id RHSA-2022:1373
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1373
24
reference_url https://access.redhat.com/errata/RHSA-2022:1535
reference_id RHSA-2022:1535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1535
25
reference_url https://access.redhat.com/errata/RHSA-2022:1550
reference_id RHSA-2022:1550
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1550
26
reference_url https://access.redhat.com/errata/RHSA-2022:1555
reference_id RHSA-2022:1555
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1555
27
reference_url https://access.redhat.com/errata/RHSA-2022:2186
reference_id RHSA-2022:2186
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2186
28
reference_url https://access.redhat.com/errata/RHSA-2022:2188
reference_id RHSA-2022:2188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2188
29
reference_url https://access.redhat.com/errata/RHSA-2022:2189
reference_id RHSA-2022:2189
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2189
30
reference_url https://access.redhat.com/errata/RHSA-2022:2211
reference_id RHSA-2022:2211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2211
31
reference_url https://access.redhat.com/errata/RHSA-2022:4896
reference_id RHSA-2022:4896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4896
fixed_packages
aliases CVE-2021-4028
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m1fw-z29h-ubdn
4
url VCID-mddr-7zar-6kfn
vulnerability_id VCID-mddr-7zar-6kfn
summary Multiple vulnerabilities have been discovered in Expat, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-25236.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-25236.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-25236
reference_id
reference_type
scores
0
value 0.07383
scoring_system epss
scoring_elements 0.91749
published_at 2026-04-16T12:55:00Z
1
value 0.07383
scoring_system epss
scoring_elements 0.91729
published_at 2026-04-13T12:55:00Z
2
value 0.07383
scoring_system epss
scoring_elements 0.91728
published_at 2026-04-09T12:55:00Z
3
value 0.07383
scoring_system epss
scoring_elements 0.91733
published_at 2026-04-12T12:55:00Z
4
value 0.07383
scoring_system epss
scoring_elements 0.91731
published_at 2026-04-11T12:55:00Z
5
value 0.07383
scoring_system epss
scoring_elements 0.91721
published_at 2026-04-08T12:55:00Z
6
value 0.07383
scoring_system epss
scoring_elements 0.91708
published_at 2026-04-07T12:55:00Z
7
value 0.09358
scoring_system epss
scoring_elements 0.92751
published_at 2026-04-02T12:55:00Z
8
value 0.09358
scoring_system epss
scoring_elements 0.92757
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-25236
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25314
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url http://www.openwall.com/lists/oss-security/2022/02/19/1
reference_id 1
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:40Z/
url http://www.openwall.com/lists/oss-security/2022/02/19/1
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1005895
reference_id 1005895
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1005895
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2056370
reference_id 2056370
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2056370
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
reference_id 3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
12
reference_url https://github.com/libexpat/libexpat/pull/561
reference_id 561
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:40Z/
url https://github.com/libexpat/libexpat/pull/561
13
reference_url https://www.debian.org/security/2022/dsa-5085
reference_id dsa-5085
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:40Z/
url https://www.debian.org/security/2022/dsa-5085
14
reference_url https://security.gentoo.org/glsa/202209-24
reference_id GLSA-202209-24
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:40Z/
url https://security.gentoo.org/glsa/202209-24
15
reference_url https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
reference_id msg00007.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:40Z/
url https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
16
reference_url https://security.netapp.com/advisory/ntap-20220303-0008/
reference_id ntap-20220303-0008
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:40Z/
url https://security.netapp.com/advisory/ntap-20220303-0008/
17
reference_url https://access.redhat.com/errata/RHSA-2022:0815
reference_id RHSA-2022:0815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0815
18
reference_url https://access.redhat.com/errata/RHSA-2022:0816
reference_id RHSA-2022:0816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0816
19
reference_url https://access.redhat.com/errata/RHSA-2022:0817
reference_id RHSA-2022:0817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0817
20
reference_url https://access.redhat.com/errata/RHSA-2022:0818
reference_id RHSA-2022:0818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0818
21
reference_url https://access.redhat.com/errata/RHSA-2022:0824
reference_id RHSA-2022:0824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0824
22
reference_url https://access.redhat.com/errata/RHSA-2022:0843
reference_id RHSA-2022:0843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0843
23
reference_url https://access.redhat.com/errata/RHSA-2022:0845
reference_id RHSA-2022:0845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0845
24
reference_url https://access.redhat.com/errata/RHSA-2022:0847
reference_id RHSA-2022:0847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0847
25
reference_url https://access.redhat.com/errata/RHSA-2022:0850
reference_id RHSA-2022:0850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0850
26
reference_url https://access.redhat.com/errata/RHSA-2022:0853
reference_id RHSA-2022:0853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0853
27
reference_url https://access.redhat.com/errata/RHSA-2022:0951
reference_id RHSA-2022:0951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0951
28
reference_url https://access.redhat.com/errata/RHSA-2022:1012
reference_id RHSA-2022:1012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1012
29
reference_url https://access.redhat.com/errata/RHSA-2022:1053
reference_id RHSA-2022:1053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1053
30
reference_url https://access.redhat.com/errata/RHSA-2022:1068
reference_id RHSA-2022:1068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1068
31
reference_url https://access.redhat.com/errata/RHSA-2022:1069
reference_id RHSA-2022:1069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1069
32
reference_url https://access.redhat.com/errata/RHSA-2022:1070
reference_id RHSA-2022:1070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1070
33
reference_url https://access.redhat.com/errata/RHSA-2022:1263
reference_id RHSA-2022:1263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1263
34
reference_url https://access.redhat.com/errata/RHSA-2022:1309
reference_id RHSA-2022:1309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1309
35
reference_url https://access.redhat.com/errata/RHSA-2022:7144
reference_id RHSA-2022:7144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7144
36
reference_url https://access.redhat.com/errata/RHSA-2022:7811
reference_id RHSA-2022:7811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7811
37
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
reference_id ssa-484086.pdf
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:40Z/
url https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
38
reference_url https://usn.ubuntu.com/5288-1/
reference_id USN-5288-1
reference_type
scores
url https://usn.ubuntu.com/5288-1/
39
reference_url https://usn.ubuntu.com/USN-5455-1/
reference_id USN-USN-5455-1
reference_type
scores
url https://usn.ubuntu.com/USN-5455-1/
40
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
reference_id Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
41
reference_url http://packetstormsecurity.com/files/167238/Zoom-XMPP-Stanza-Smuggling-Remote-Code-Execution.html
reference_id Zoom-XMPP-Stanza-Smuggling-Remote-Code-Execution.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:40Z/
url http://packetstormsecurity.com/files/167238/Zoom-XMPP-Stanza-Smuggling-Remote-Code-Execution.html
fixed_packages
aliases CVE-2022-25236
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mddr-7zar-6kfn
5
url VCID-ms42-54h5-2kfa
vulnerability_id VCID-ms42-54h5-2kfa
summary kernel: possible privileges escalation due to missing TLB flush
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0330.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0330.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0330
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.11564
published_at 2026-04-01T12:55:00Z
1
value 0.00039
scoring_system epss
scoring_elements 0.1169
published_at 2026-04-02T12:55:00Z
2
value 0.00039
scoring_system epss
scoring_elements 0.11733
published_at 2026-04-04T12:55:00Z
3
value 0.00039
scoring_system epss
scoring_elements 0.11518
published_at 2026-04-07T12:55:00Z
4
value 0.00039
scoring_system epss
scoring_elements 0.11605
published_at 2026-04-08T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.11665
published_at 2026-04-09T12:55:00Z
6
value 0.00039
scoring_system epss
scoring_elements 0.11678
published_at 2026-04-11T12:55:00Z
7
value 0.00039
scoring_system epss
scoring_elements 0.11642
published_at 2026-04-12T12:55:00Z
8
value 0.00039
scoring_system epss
scoring_elements 0.11616
published_at 2026-04-13T12:55:00Z
9
value 0.00039
scoring_system epss
scoring_elements 0.11477
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0330
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0516
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0847
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0847
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375
55
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
56
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2042404
reference_id 2042404
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2042404
57
reference_url https://access.redhat.com/errata/RHSA-2022:0592
reference_id RHSA-2022:0592
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0592
58
reference_url https://access.redhat.com/errata/RHSA-2022:0620
reference_id RHSA-2022:0620
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0620
59
reference_url https://access.redhat.com/errata/RHSA-2022:0622
reference_id RHSA-2022:0622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0622
60
reference_url https://access.redhat.com/errata/RHSA-2022:0712
reference_id RHSA-2022:0712
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0712
61
reference_url https://access.redhat.com/errata/RHSA-2022:0718
reference_id RHSA-2022:0718
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0718
62
reference_url https://access.redhat.com/errata/RHSA-2022:0771
reference_id RHSA-2022:0771
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0771
63
reference_url https://access.redhat.com/errata/RHSA-2022:0772
reference_id RHSA-2022:0772
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0772
64
reference_url https://access.redhat.com/errata/RHSA-2022:0777
reference_id RHSA-2022:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0777
65
reference_url https://access.redhat.com/errata/RHSA-2022:0819
reference_id RHSA-2022:0819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0819
66
reference_url https://access.redhat.com/errata/RHSA-2022:0820
reference_id RHSA-2022:0820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0820
67
reference_url https://access.redhat.com/errata/RHSA-2022:0821
reference_id RHSA-2022:0821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0821
68
reference_url https://access.redhat.com/errata/RHSA-2022:0823
reference_id RHSA-2022:0823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0823
69
reference_url https://access.redhat.com/errata/RHSA-2022:0825
reference_id RHSA-2022:0825
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0825
70
reference_url https://access.redhat.com/errata/RHSA-2022:0841
reference_id RHSA-2022:0841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0841
71
reference_url https://access.redhat.com/errata/RHSA-2022:0849
reference_id RHSA-2022:0849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0849
72
reference_url https://access.redhat.com/errata/RHSA-2022:0851
reference_id RHSA-2022:0851
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0851
73
reference_url https://access.redhat.com/errata/RHSA-2022:0925
reference_id RHSA-2022:0925
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0925
74
reference_url https://access.redhat.com/errata/RHSA-2022:0958
reference_id RHSA-2022:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0958
75
reference_url https://access.redhat.com/errata/RHSA-2022:1103
reference_id RHSA-2022:1103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1103
76
reference_url https://access.redhat.com/errata/RHSA-2022:1104
reference_id RHSA-2022:1104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1104
77
reference_url https://access.redhat.com/errata/RHSA-2022:1106
reference_id RHSA-2022:1106
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1106
78
reference_url https://access.redhat.com/errata/RHSA-2022:1107
reference_id RHSA-2022:1107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1107
79
reference_url https://access.redhat.com/errata/RHSA-2022:1263
reference_id RHSA-2022:1263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1263
80
reference_url https://usn.ubuntu.com/5278-1/
reference_id USN-5278-1
reference_type
scores
url https://usn.ubuntu.com/5278-1/
81
reference_url https://usn.ubuntu.com/5294-1/
reference_id USN-5294-1
reference_type
scores
url https://usn.ubuntu.com/5294-1/
82
reference_url https://usn.ubuntu.com/5294-2/
reference_id USN-5294-2
reference_type
scores
url https://usn.ubuntu.com/5294-2/
83
reference_url https://usn.ubuntu.com/5295-1/
reference_id USN-5295-1
reference_type
scores
url https://usn.ubuntu.com/5295-1/
84
reference_url https://usn.ubuntu.com/5295-2/
reference_id USN-5295-2
reference_type
scores
url https://usn.ubuntu.com/5295-2/
85
reference_url https://usn.ubuntu.com/5297-1/
reference_id USN-5297-1
reference_type
scores
url https://usn.ubuntu.com/5297-1/
86
reference_url https://usn.ubuntu.com/5298-1/
reference_id USN-5298-1
reference_type
scores
url https://usn.ubuntu.com/5298-1/
87
reference_url https://usn.ubuntu.com/5362-1/
reference_id USN-5362-1
reference_type
scores
url https://usn.ubuntu.com/5362-1/
88
reference_url https://usn.ubuntu.com/5505-1/
reference_id USN-5505-1
reference_type
scores
url https://usn.ubuntu.com/5505-1/
89
reference_url https://usn.ubuntu.com/5513-1/
reference_id USN-5513-1
reference_type
scores
url https://usn.ubuntu.com/5513-1/
fixed_packages
aliases CVE-2022-0330
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ms42-54h5-2kfa
6
url VCID-nw7y-2xct-8fa5
vulnerability_id VCID-nw7y-2xct-8fa5
summary Multiple vulnerabilities have been discovered in Expat, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-25235.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-25235.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-25235
reference_id
reference_type
scores
0
value 0.13322
scoring_system epss
scoring_elements 0.94153
published_at 2026-04-04T12:55:00Z
1
value 0.13322
scoring_system epss
scoring_elements 0.94142
published_at 2026-04-02T12:55:00Z
2
value 0.13322
scoring_system epss
scoring_elements 0.94156
published_at 2026-04-07T12:55:00Z
3
value 0.13322
scoring_system epss
scoring_elements 0.94166
published_at 2026-04-08T12:55:00Z
4
value 0.13322
scoring_system epss
scoring_elements 0.94191
published_at 2026-04-16T12:55:00Z
5
value 0.13322
scoring_system epss
scoring_elements 0.9417
published_at 2026-04-09T12:55:00Z
6
value 0.13322
scoring_system epss
scoring_elements 0.94175
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-25235
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25314
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url http://www.openwall.com/lists/oss-security/2022/02/19/1
reference_id 1
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:39Z/
url http://www.openwall.com/lists/oss-security/2022/02/19/1
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1005894
reference_id 1005894
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1005894
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2056366
reference_id 2056366
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2056366
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
reference_id 3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
12
reference_url https://github.com/libexpat/libexpat/pull/562
reference_id 562
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:39Z/
url https://github.com/libexpat/libexpat/pull/562
13
reference_url https://www.debian.org/security/2022/dsa-5085
reference_id dsa-5085
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:39Z/
url https://www.debian.org/security/2022/dsa-5085
14
reference_url https://security.gentoo.org/glsa/202209-24
reference_id GLSA-202209-24
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:39Z/
url https://security.gentoo.org/glsa/202209-24
15
reference_url https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
reference_id msg00007.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:39Z/
url https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
16
reference_url https://security.netapp.com/advisory/ntap-20220303-0008/
reference_id ntap-20220303-0008
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:39Z/
url https://security.netapp.com/advisory/ntap-20220303-0008/
17
reference_url https://access.redhat.com/errata/RHSA-2022:0815
reference_id RHSA-2022:0815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0815
18
reference_url https://access.redhat.com/errata/RHSA-2022:0816
reference_id RHSA-2022:0816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0816
19
reference_url https://access.redhat.com/errata/RHSA-2022:0817
reference_id RHSA-2022:0817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0817
20
reference_url https://access.redhat.com/errata/RHSA-2022:0818
reference_id RHSA-2022:0818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0818
21
reference_url https://access.redhat.com/errata/RHSA-2022:0824
reference_id RHSA-2022:0824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0824
22
reference_url https://access.redhat.com/errata/RHSA-2022:0843
reference_id RHSA-2022:0843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0843
23
reference_url https://access.redhat.com/errata/RHSA-2022:0845
reference_id RHSA-2022:0845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0845
24
reference_url https://access.redhat.com/errata/RHSA-2022:0847
reference_id RHSA-2022:0847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0847
25
reference_url https://access.redhat.com/errata/RHSA-2022:0850
reference_id RHSA-2022:0850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0850
26
reference_url https://access.redhat.com/errata/RHSA-2022:0853
reference_id RHSA-2022:0853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0853
27
reference_url https://access.redhat.com/errata/RHSA-2022:0951
reference_id RHSA-2022:0951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0951
28
reference_url https://access.redhat.com/errata/RHSA-2022:1012
reference_id RHSA-2022:1012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1012
29
reference_url https://access.redhat.com/errata/RHSA-2022:1053
reference_id RHSA-2022:1053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1053
30
reference_url https://access.redhat.com/errata/RHSA-2022:1068
reference_id RHSA-2022:1068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1068
31
reference_url https://access.redhat.com/errata/RHSA-2022:1069
reference_id RHSA-2022:1069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1069
32
reference_url https://access.redhat.com/errata/RHSA-2022:1070
reference_id RHSA-2022:1070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1070
33
reference_url https://access.redhat.com/errata/RHSA-2022:1263
reference_id RHSA-2022:1263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1263
34
reference_url https://access.redhat.com/errata/RHSA-2022:1309
reference_id RHSA-2022:1309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1309
35
reference_url https://access.redhat.com/errata/RHSA-2022:1539
reference_id RHSA-2022:1539
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1539
36
reference_url https://access.redhat.com/errata/RHSA-2022:1540
reference_id RHSA-2022:1540
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1540
37
reference_url https://access.redhat.com/errata/RHSA-2022:1643
reference_id RHSA-2022:1643
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1643
38
reference_url https://access.redhat.com/errata/RHSA-2022:1644
reference_id RHSA-2022:1644
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1644
39
reference_url https://access.redhat.com/errata/RHSA-2022:7144
reference_id RHSA-2022:7144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7144
40
reference_url https://access.redhat.com/errata/RHSA-2022:7811
reference_id RHSA-2022:7811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7811
41
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
reference_id ssa-484086.pdf
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:39Z/
url https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
42
reference_url https://usn.ubuntu.com/5288-1/
reference_id USN-5288-1
reference_type
scores
url https://usn.ubuntu.com/5288-1/
43
reference_url https://usn.ubuntu.com/USN-5455-1/
reference_id USN-USN-5455-1
reference_type
scores
url https://usn.ubuntu.com/USN-5455-1/
44
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
reference_id Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
fixed_packages
aliases CVE-2022-25235
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nw7y-2xct-8fa5
7
url VCID-tqsm-2e4k-aycp
vulnerability_id VCID-tqsm-2e4k-aycp
summary kernel: failing usercopy allows for use-after-free exploitation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22942.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22942.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22942
reference_id
reference_type
scores
0
value 0.13534
scoring_system epss
scoring_elements 0.94191
published_at 2026-04-02T12:55:00Z
1
value 0.13534
scoring_system epss
scoring_elements 0.94204
published_at 2026-04-04T12:55:00Z
2
value 0.13534
scoring_system epss
scoring_elements 0.94205
published_at 2026-04-07T12:55:00Z
3
value 0.13534
scoring_system epss
scoring_elements 0.94215
published_at 2026-04-08T12:55:00Z
4
value 0.13534
scoring_system epss
scoring_elements 0.94219
published_at 2026-04-09T12:55:00Z
5
value 0.13534
scoring_system epss
scoring_elements 0.94223
published_at 2026-04-12T12:55:00Z
6
value 0.13534
scoring_system epss
scoring_elements 0.94224
published_at 2026-04-13T12:55:00Z
7
value 0.13534
scoring_system epss
scoring_elements 0.94239
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22942
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0516
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0847
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0847
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375
55
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
56
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2044809
reference_id 2044809
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2044809
57
reference_url https://access.redhat.com/errata/RHSA-2022:0592
reference_id RHSA-2022:0592
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0592
58
reference_url https://access.redhat.com/errata/RHSA-2022:0620
reference_id RHSA-2022:0620
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0620
59
reference_url https://access.redhat.com/errata/RHSA-2022:0622
reference_id RHSA-2022:0622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0622
60
reference_url https://access.redhat.com/errata/RHSA-2022:0771
reference_id RHSA-2022:0771
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0771
61
reference_url https://access.redhat.com/errata/RHSA-2022:0772
reference_id RHSA-2022:0772
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0772
62
reference_url https://access.redhat.com/errata/RHSA-2022:0777
reference_id RHSA-2022:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0777
63
reference_url https://access.redhat.com/errata/RHSA-2022:0819
reference_id RHSA-2022:0819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0819
64
reference_url https://access.redhat.com/errata/RHSA-2022:0820
reference_id RHSA-2022:0820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0820
65
reference_url https://access.redhat.com/errata/RHSA-2022:0821
reference_id RHSA-2022:0821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0821
66
reference_url https://access.redhat.com/errata/RHSA-2022:0823
reference_id RHSA-2022:0823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0823
67
reference_url https://access.redhat.com/errata/RHSA-2022:0825
reference_id RHSA-2022:0825
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0825
68
reference_url https://access.redhat.com/errata/RHSA-2022:0841
reference_id RHSA-2022:0841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0841
69
reference_url https://access.redhat.com/errata/RHSA-2022:0849
reference_id RHSA-2022:0849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0849
70
reference_url https://access.redhat.com/errata/RHSA-2022:0851
reference_id RHSA-2022:0851
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0851
71
reference_url https://access.redhat.com/errata/RHSA-2022:0925
reference_id RHSA-2022:0925
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0925
72
reference_url https://access.redhat.com/errata/RHSA-2022:0958
reference_id RHSA-2022:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0958
73
reference_url https://access.redhat.com/errata/RHSA-2022:1103
reference_id RHSA-2022:1103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1103
74
reference_url https://access.redhat.com/errata/RHSA-2022:1107
reference_id RHSA-2022:1107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1107
75
reference_url https://access.redhat.com/errata/RHSA-2022:1263
reference_id RHSA-2022:1263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1263
76
reference_url https://access.redhat.com/errata/RHSA-2022:1324
reference_id RHSA-2022:1324
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1324
77
reference_url https://access.redhat.com/errata/RHSA-2022:1373
reference_id RHSA-2022:1373
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1373
78
reference_url https://usn.ubuntu.com/5278-1/
reference_id USN-5278-1
reference_type
scores
url https://usn.ubuntu.com/5278-1/
79
reference_url https://usn.ubuntu.com/5294-1/
reference_id USN-5294-1
reference_type
scores
url https://usn.ubuntu.com/5294-1/
80
reference_url https://usn.ubuntu.com/5294-2/
reference_id USN-5294-2
reference_type
scores
url https://usn.ubuntu.com/5294-2/
81
reference_url https://usn.ubuntu.com/5295-1/
reference_id USN-5295-1
reference_type
scores
url https://usn.ubuntu.com/5295-1/
82
reference_url https://usn.ubuntu.com/5295-2/
reference_id USN-5295-2
reference_type
scores
url https://usn.ubuntu.com/5295-2/
83
reference_url https://usn.ubuntu.com/5297-1/
reference_id USN-5297-1
reference_type
scores
url https://usn.ubuntu.com/5297-1/
84
reference_url https://usn.ubuntu.com/5298-1/
reference_id USN-5298-1
reference_type
scores
url https://usn.ubuntu.com/5298-1/
85
reference_url https://usn.ubuntu.com/5362-1/
reference_id USN-5362-1
reference_type
scores
url https://usn.ubuntu.com/5362-1/
fixed_packages
aliases CVE-2022-22942
risk_score 10.0
exploitability 2.0
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tqsm-2e4k-aycp
8
url VCID-txgc-kd7n-ekc6
vulnerability_id VCID-txgc-kd7n-ekc6
summary kernel: Use After Free in unix_gc() which could result in a local privilege escalation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0920.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0920.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-0920
reference_id
reference_type
scores
0
value 0.00908
scoring_system epss
scoring_elements 0.75803
published_at 2026-04-16T12:55:00Z
1
value 0.00908
scoring_system epss
scoring_elements 0.75765
published_at 2026-04-13T12:55:00Z
2
value 0.00908
scoring_system epss
scoring_elements 0.75789
published_at 2026-04-11T12:55:00Z
3
value 0.00908
scoring_system epss
scoring_elements 0.75771
published_at 2026-04-12T12:55:00Z
4
value 0.00933
scoring_system epss
scoring_elements 0.76078
published_at 2026-04-02T12:55:00Z
5
value 0.00933
scoring_system epss
scoring_elements 0.76089
published_at 2026-04-07T12:55:00Z
6
value 0.00933
scoring_system epss
scoring_elements 0.76122
published_at 2026-04-08T12:55:00Z
7
value 0.00933
scoring_system epss
scoring_elements 0.76074
published_at 2026-04-01T12:55:00Z
8
value 0.00933
scoring_system epss
scoring_elements 0.7611
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-0920
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0920
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0920
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://source.android.com/security/bulletin/2021-11-01
reference_id 2021-11-01
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-06T16:18:51Z/
url https://source.android.com/security/bulletin/2021-11-01
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2031930
reference_id 2031930
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2031930
6
reference_url https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
reference_id msg00012.html
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-06T16:18:51Z/
url https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
7
reference_url https://access.redhat.com/errata/RHSA-2022:0590
reference_id RHSA-2022:0590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0590
8
reference_url https://access.redhat.com/errata/RHSA-2022:0592
reference_id RHSA-2022:0592
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0592
9
reference_url https://access.redhat.com/errata/RHSA-2022:0620
reference_id RHSA-2022:0620
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0620
10
reference_url https://access.redhat.com/errata/RHSA-2022:0622
reference_id RHSA-2022:0622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0622
11
reference_url https://access.redhat.com/errata/RHSA-2022:0629
reference_id RHSA-2022:0629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0629
12
reference_url https://access.redhat.com/errata/RHSA-2022:0636
reference_id RHSA-2022:0636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0636
13
reference_url https://access.redhat.com/errata/RHSA-2022:0771
reference_id RHSA-2022:0771
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0771
14
reference_url https://access.redhat.com/errata/RHSA-2022:0772
reference_id RHSA-2022:0772
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0772
15
reference_url https://access.redhat.com/errata/RHSA-2022:0777
reference_id RHSA-2022:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0777
16
reference_url https://access.redhat.com/errata/RHSA-2022:0819
reference_id RHSA-2022:0819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0819
17
reference_url https://access.redhat.com/errata/RHSA-2022:0823
reference_id RHSA-2022:0823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0823
18
reference_url https://access.redhat.com/errata/RHSA-2022:0825
reference_id RHSA-2022:0825
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0825
19
reference_url https://access.redhat.com/errata/RHSA-2022:0841
reference_id RHSA-2022:0841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0841
20
reference_url https://access.redhat.com/errata/RHSA-2022:0849
reference_id RHSA-2022:0849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0849
21
reference_url https://access.redhat.com/errata/RHSA-2022:0851
reference_id RHSA-2022:0851
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0851
22
reference_url https://access.redhat.com/errata/RHSA-2022:0958
reference_id RHSA-2022:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0958
23
reference_url https://access.redhat.com/errata/RHSA-2022:1103
reference_id RHSA-2022:1103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1103
24
reference_url https://access.redhat.com/errata/RHSA-2022:1104
reference_id RHSA-2022:1104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1104
25
reference_url https://access.redhat.com/errata/RHSA-2022:1106
reference_id RHSA-2022:1106
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1106
26
reference_url https://access.redhat.com/errata/RHSA-2022:1107
reference_id RHSA-2022:1107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1107
27
reference_url https://access.redhat.com/errata/RHSA-2022:1263
reference_id RHSA-2022:1263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1263
28
reference_url https://access.redhat.com/errata/RHSA-2022:1324
reference_id RHSA-2022:1324
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1324
29
reference_url https://access.redhat.com/errata/RHSA-2022:1373
reference_id RHSA-2022:1373
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1373
30
reference_url https://access.redhat.com/errata/RHSA-2022:1417
reference_id RHSA-2022:1417
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1417
31
reference_url https://usn.ubuntu.com/5361-1/
reference_id USN-5361-1
reference_type
scores
url https://usn.ubuntu.com/5361-1/
32
reference_url https://usn.ubuntu.com/7720-1/
reference_id USN-7720-1
reference_type
scores
url https://usn.ubuntu.com/7720-1/
fixed_packages
aliases CVE-2021-0920
risk_score 10.0
exploitability 2.0
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-txgc-kd7n-ekc6
9
url VCID-u4gb-1hyn-m7g4
vulnerability_id VCID-u4gb-1hyn-m7g4
summary kernel: fget: check that the fd still exists after getting a ref to it
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4083.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4083.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4083
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01551
published_at 2026-04-16T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01564
published_at 2026-04-02T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01568
published_at 2026-04-04T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01571
published_at 2026-04-11T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01574
published_at 2026-04-08T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01581
published_at 2026-04-09T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01563
published_at 2026-04-12T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.01562
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4083
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375
53
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
54
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2029923
reference_id 2029923
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2029923
55
reference_url https://access.redhat.com/errata/RHSA-2022:0820
reference_id RHSA-2022:0820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0820
56
reference_url https://access.redhat.com/errata/RHSA-2022:0821
reference_id RHSA-2022:0821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0821
57
reference_url https://access.redhat.com/errata/RHSA-2022:0823
reference_id RHSA-2022:0823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0823
58
reference_url https://access.redhat.com/errata/RHSA-2022:0851
reference_id RHSA-2022:0851
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0851
59
reference_url https://access.redhat.com/errata/RHSA-2022:0925
reference_id RHSA-2022:0925
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0925
60
reference_url https://access.redhat.com/errata/RHSA-2022:0958
reference_id RHSA-2022:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0958
61
reference_url https://access.redhat.com/errata/RHSA-2022:1103
reference_id RHSA-2022:1103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1103
62
reference_url https://access.redhat.com/errata/RHSA-2022:1104
reference_id RHSA-2022:1104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1104
63
reference_url https://access.redhat.com/errata/RHSA-2022:1107
reference_id RHSA-2022:1107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1107
64
reference_url https://access.redhat.com/errata/RHSA-2022:1185
reference_id RHSA-2022:1185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1185
65
reference_url https://access.redhat.com/errata/RHSA-2022:1198
reference_id RHSA-2022:1198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1198
66
reference_url https://access.redhat.com/errata/RHSA-2022:1199
reference_id RHSA-2022:1199
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1199
67
reference_url https://access.redhat.com/errata/RHSA-2022:1263
reference_id RHSA-2022:1263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1263
68
reference_url https://access.redhat.com/errata/RHSA-2022:1324
reference_id RHSA-2022:1324
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1324
69
reference_url https://access.redhat.com/errata/RHSA-2022:1373
reference_id RHSA-2022:1373
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1373
70
reference_url https://access.redhat.com/errata/RHSA-2022:1413
reference_id RHSA-2022:1413
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1413
71
reference_url https://access.redhat.com/errata/RHSA-2022:1418
reference_id RHSA-2022:1418
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1418
72
reference_url https://access.redhat.com/errata/RHSA-2022:1455
reference_id RHSA-2022:1455
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1455
73
reference_url https://access.redhat.com/errata/RHSA-2022:1975
reference_id RHSA-2022:1975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1975
74
reference_url https://access.redhat.com/errata/RHSA-2022:1988
reference_id RHSA-2022:1988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1988
75
reference_url https://access.redhat.com/errata/RHSA-2022:2189
reference_id RHSA-2022:2189
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2189
76
reference_url https://access.redhat.com/errata/RHSA-2022:4896
reference_id RHSA-2022:4896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4896
77
reference_url https://usn.ubuntu.com/5278-1/
reference_id USN-5278-1
reference_type
scores
url https://usn.ubuntu.com/5278-1/
78
reference_url https://usn.ubuntu.com/5294-1/
reference_id USN-5294-1
reference_type
scores
url https://usn.ubuntu.com/5294-1/
79
reference_url https://usn.ubuntu.com/5294-2/
reference_id USN-5294-2
reference_type
scores
url https://usn.ubuntu.com/5294-2/
80
reference_url https://usn.ubuntu.com/5295-1/
reference_id USN-5295-1
reference_type
scores
url https://usn.ubuntu.com/5295-1/
81
reference_url https://usn.ubuntu.com/5295-2/
reference_id USN-5295-2
reference_type
scores
url https://usn.ubuntu.com/5295-2/
82
reference_url https://usn.ubuntu.com/5297-1/
reference_id USN-5297-1
reference_type
scores
url https://usn.ubuntu.com/5297-1/
83
reference_url https://usn.ubuntu.com/5298-1/
reference_id USN-5298-1
reference_type
scores
url https://usn.ubuntu.com/5298-1/
84
reference_url https://usn.ubuntu.com/5361-1/
reference_id USN-5361-1
reference_type
scores
url https://usn.ubuntu.com/5361-1/
85
reference_url https://usn.ubuntu.com/5362-1/
reference_id USN-5362-1
reference_type
scores
url https://usn.ubuntu.com/5362-1/
fixed_packages
aliases CVE-2021-4083
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u4gb-1hyn-m7g4
10
url VCID-ukce-7qpu-c7cm
vulnerability_id VCID-ukce-7qpu-c7cm
summary
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
In Cyrus SASL 2.1.17 through 2.1.27 before 2.1.28, plugins/sql.c does not escape the password for a SQL INSERT or UPDATE statement.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24407.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24407.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-24407
reference_id
reference_type
scores
0
value 0.00431
scoring_system epss
scoring_elements 0.62623
published_at 2026-04-16T12:55:00Z
1
value 0.00431
scoring_system epss
scoring_elements 0.62616
published_at 2026-04-11T12:55:00Z
2
value 0.00431
scoring_system epss
scoring_elements 0.62605
published_at 2026-04-12T12:55:00Z
3
value 0.00431
scoring_system epss
scoring_elements 0.62582
published_at 2026-04-13T12:55:00Z
4
value 0.00528
scoring_system epss
scoring_elements 0.67182
published_at 2026-04-08T12:55:00Z
5
value 0.00528
scoring_system epss
scoring_elements 0.67195
published_at 2026-04-09T12:55:00Z
6
value 0.00528
scoring_system epss
scoring_elements 0.67134
published_at 2026-04-02T12:55:00Z
7
value 0.00528
scoring_system epss
scoring_elements 0.67157
published_at 2026-04-04T12:55:00Z
8
value 0.00528
scoring_system epss
scoring_elements 0.67132
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-24407
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst
reference_id
reference_type
scores
url https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst
5
reference_url https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28
reference_id
reference_type
scores
url https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28
6
reference_url https://www.debian.org/security/2022/dsa-5087
reference_id
reference_type
scores
url https://www.debian.org/security/2022/dsa-5087
7
reference_url http://www.openwall.com/lists/oss-security/2022/02/23/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2022/02/23/4
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2055326
reference_id 2055326
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2055326
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-24407
reference_id CVE-2022-24407
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2022-24407
10
reference_url https://access.redhat.com/errata/RHSA-2022:0658
reference_id RHSA-2022:0658
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0658
11
reference_url https://access.redhat.com/errata/RHSA-2022:0666
reference_id RHSA-2022:0666
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0666
12
reference_url https://access.redhat.com/errata/RHSA-2022:0668
reference_id RHSA-2022:0668
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0668
13
reference_url https://access.redhat.com/errata/RHSA-2022:0730
reference_id RHSA-2022:0730
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0730
14
reference_url https://access.redhat.com/errata/RHSA-2022:0731
reference_id RHSA-2022:0731
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0731
15
reference_url https://access.redhat.com/errata/RHSA-2022:0780
reference_id RHSA-2022:0780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0780
16
reference_url https://access.redhat.com/errata/RHSA-2022:0841
reference_id RHSA-2022:0841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0841
17
reference_url https://access.redhat.com/errata/RHSA-2022:1029
reference_id RHSA-2022:1029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1029
18
reference_url https://access.redhat.com/errata/RHSA-2022:1263
reference_id RHSA-2022:1263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1263
19
reference_url https://usn.ubuntu.com/5301-1/
reference_id USN-5301-1
reference_type
scores
url https://usn.ubuntu.com/5301-1/
20
reference_url https://usn.ubuntu.com/5301-2/
reference_id USN-5301-2
reference_type
scores
url https://usn.ubuntu.com/5301-2/
fixed_packages
aliases CVE-2022-24407
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ukce-7qpu-c7cm
11
url VCID-y5u5-dgk3-u3da
vulnerability_id VCID-y5u5-dgk3-u3da
summary A vulnerability has been found in AIDE which can lead to root privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45417.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45417.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-45417
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11285
published_at 2026-04-01T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11425
published_at 2026-04-02T12:55:00Z
2
value 0.00038
scoring_system epss
scoring_elements 0.11484
published_at 2026-04-04T12:55:00Z
3
value 0.00038
scoring_system epss
scoring_elements 0.11272
published_at 2026-04-07T12:55:00Z
4
value 0.00038
scoring_system epss
scoring_elements 0.11354
published_at 2026-04-08T12:55:00Z
5
value 0.00038
scoring_system epss
scoring_elements 0.11412
published_at 2026-04-09T12:55:00Z
6
value 0.00038
scoring_system epss
scoring_elements 0.11419
published_at 2026-04-11T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.11387
published_at 2026-04-12T12:55:00Z
8
value 0.00038
scoring_system epss
scoring_elements 0.11357
published_at 2026-04-13T12:55:00Z
9
value 0.00038
scoring_system epss
scoring_elements 0.11216
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-45417
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45417
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45417
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041489
reference_id 2041489
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041489
5
reference_url https://security.gentoo.org/glsa/202311-07
reference_id GLSA-202311-07
reference_type
scores
url https://security.gentoo.org/glsa/202311-07
6
reference_url https://access.redhat.com/errata/RHSA-2022:0440
reference_id RHSA-2022:0440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0440
7
reference_url https://access.redhat.com/errata/RHSA-2022:0441
reference_id RHSA-2022:0441
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0441
8
reference_url https://access.redhat.com/errata/RHSA-2022:0456
reference_id RHSA-2022:0456
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0456
9
reference_url https://access.redhat.com/errata/RHSA-2022:0464
reference_id RHSA-2022:0464
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0464
10
reference_url https://access.redhat.com/errata/RHSA-2022:0472
reference_id RHSA-2022:0472
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0472
11
reference_url https://access.redhat.com/errata/RHSA-2022:0473
reference_id RHSA-2022:0473
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0473
12
reference_url https://access.redhat.com/errata/RHSA-2022:0540
reference_id RHSA-2022:0540
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0540
13
reference_url https://access.redhat.com/errata/RHSA-2022:1263
reference_id RHSA-2022:1263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1263
14
reference_url https://usn.ubuntu.com/5243-1/
reference_id USN-5243-1
reference_type
scores
url https://usn.ubuntu.com/5243-1/
15
reference_url https://usn.ubuntu.com/5243-2/
reference_id USN-5243-2
reference_type
scores
url https://usn.ubuntu.com/5243-2/
fixed_packages
aliases CVE-2021-45417
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y5u5-dgk3-u3da
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/redhat-virtualization-host@4.3.22-20220330.1%3Farch=el7_9