Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/99289?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/99289?format=api", "purl": "pkg:rpm/redhat/redhat-virtualization-host@4.4.10-202203101736_8?arch=5", "type": "rpm", "namespace": "redhat", "name": "redhat-virtualization-host", "version": "4.4.10-202203101736_8", "qualifiers": { "arch": "5" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79607?format=api", "vulnerability_id": "VCID-89bv-8sdp-9uah", "summary": "kernel: improper initialization of the \"flags\" member of the new pipe_buffer", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0847.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0847.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0847", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.81211", "scoring_system": "epss", "scoring_elements": "0.99168", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.81633", "scoring_system": "epss", "scoring_elements": "0.99186", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.81633", "scoring_system": "epss", "scoring_elements": "0.99187", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.81633", "scoring_system": "epss", "scoring_elements": "0.99189", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.81875", "scoring_system": "epss", "scoring_elements": "0.99198", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.81875", "scoring_system": "epss", "scoring_elements": "0.99199", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.81875", "scoring_system": "epss", "scoring_elements": "0.99197", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.82337", "scoring_system": "epss", "scoring_elements": "0.99231", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.82683", "scoring_system": "epss", "scoring_elements": "0.99245", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.82683", "scoring_system": "epss", "scoring_elements": "0.99244", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.82687", "scoring_system": "epss", "scoring_elements": "0.99232", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.82687", "scoring_system": "epss", "scoring_elements": "0.9923", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.82687", "scoring_system": "epss", "scoring_elements": "0.99234", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0847" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0516" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0847", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0847" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060795", "reference_id": "2060795", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T18:38:16Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060795" }, { "reference_url": "https://security.archlinux.org/AVG-2652", "reference_id": "AVG-2652", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2652" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/50808.c", "reference_id": "CVE-2022-0847", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/50808.c" }, { "reference_url": "https://dirtypipe.cm4all.com/", "reference_id": "dirtypipe.cm4all.com", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T18:38:16Z/" } ], "url": "https://dirtypipe.cm4all.com/" }, { "reference_url": "http://packetstormsecurity.com/files/166229/Dirty-Pipe-Linux-Privilege-Escalation.html", "reference_id": "Dirty-Pipe-Linux-Privilege-Escalation.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T18:38:16Z/" } ], "url": "http://packetstormsecurity.com/files/166229/Dirty-Pipe-Linux-Privilege-Escalation.html" }, { "reference_url": "http://packetstormsecurity.com/files/166258/Dirty-Pipe-Local-Privilege-Escalation.html", "reference_id": "Dirty-Pipe-Local-Privilege-Escalation.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T18:38:16Z/" } ], "url": "http://packetstormsecurity.com/files/166258/Dirty-Pipe-Local-Privilege-Escalation.html" }, { "reference_url": "http://packetstormsecurity.com/files/166230/Dirty-Pipe-SUID-Binary-Hijack-Privilege-Escalation.html", "reference_id": "Dirty-Pipe-SUID-Binary-Hijack-Privilege-Escalation.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T18:38:16Z/" } ], "url": "http://packetstormsecurity.com/files/166230/Dirty-Pipe-SUID-Binary-Hijack-Privilege-Escalation.html" }, { "reference_url": "https://www.suse.com/support/kb/doc/?id=000020603", "reference_id": "?id=000020603", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T18:38:16Z/" } ], "url": "https://www.suse.com/support/kb/doc/?id=000020603" }, { "reference_url": "http://packetstormsecurity.com/files/176534/Linux-4.20-KTLS-Read-Only-Write.html", "reference_id": "Linux-4.20-KTLS-Read-Only-Write.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T18:38:16Z/" } ], "url": "http://packetstormsecurity.com/files/176534/Linux-4.20-KTLS-Read-Only-Write.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220325-0005/", "reference_id": "ntap-20220325-0005", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T18:38:16Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220325-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0819", "reference_id": "RHSA-2022:0819", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0819" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0820", "reference_id": "RHSA-2022:0820", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0820" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0821", "reference_id": "RHSA-2022:0821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0821" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0822", "reference_id": "RHSA-2022:0822", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0822" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0823", "reference_id": "RHSA-2022:0823", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0823" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0825", "reference_id": "RHSA-2022:0825", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0825" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0831", "reference_id": "RHSA-2022:0831", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0831" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0841", "reference_id": "RHSA-2022:0841", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0841" }, { "reference_url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0015", "reference_id": "SNWLID-2022-0015", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T18:38:16Z/" } ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0015" }, { "reference_url": "https://usn.ubuntu.com/5317-1/", "reference_id": "USN-5317-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5317-1/" }, { "reference_url": "https://usn.ubuntu.com/5362-1/", "reference_id": "USN-5362-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5362-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-0847" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-89bv-8sdp-9uah" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79875?format=api", "vulnerability_id": "VCID-c2z7-n1cg-cufz", "summary": "kernel: local privilege escalation by exploiting the fsconfig syscall parameter leads to container breakout", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4154.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4154.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4154", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.7464", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.74643", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.7467", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.74644", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.74676", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.74691", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.74714", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.74694", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.74685", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.74723", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.7473", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.74721", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.74757", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.74763", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.74766", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4154" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4154", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4154" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034514", "reference_id": "2034514", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034514" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0186", "reference_id": "RHSA-2022:0186", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0186" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0187", "reference_id": "RHSA-2022:0187", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0187" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0231", "reference_id": "RHSA-2022:0231", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0231" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0819", "reference_id": "RHSA-2022:0819", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0819" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0825", "reference_id": "RHSA-2022:0825", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0825" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0841", "reference_id": "RHSA-2022:0841", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0841" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0849", "reference_id": "RHSA-2022:0849", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0849" } ], "fixed_packages": [], "aliases": [ "CVE-2021-4154" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c2z7-n1cg-cufz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79734?format=api", "vulnerability_id": "VCID-ms42-54h5-2kfa", "summary": "kernel: possible privileges escalation due to missing TLB flush", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0330.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0330.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0330", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11564", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.1169", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11733", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11518", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11605", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11665", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11678", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11642", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11616", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11477", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11479", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11603", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11559", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.1152", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11447", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0330" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0516" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0847", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0847" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404", "reference_id": "2042404", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0592", "reference_id": "RHSA-2022:0592", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0592" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0620", "reference_id": "RHSA-2022:0620", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0620" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0622", "reference_id": "RHSA-2022:0622", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0622" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0712", "reference_id": "RHSA-2022:0712", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0712" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0718", "reference_id": "RHSA-2022:0718", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0718" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0771", "reference_id": "RHSA-2022:0771", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0771" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0772", "reference_id": "RHSA-2022:0772", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0772" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0777", "reference_id": "RHSA-2022:0777", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0777" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0819", "reference_id": "RHSA-2022:0819", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0819" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0820", "reference_id": "RHSA-2022:0820", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0820" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0821", "reference_id": "RHSA-2022:0821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0821" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0823", "reference_id": "RHSA-2022:0823", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0823" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0825", "reference_id": "RHSA-2022:0825", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0825" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0841", "reference_id": "RHSA-2022:0841", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0841" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0849", "reference_id": "RHSA-2022:0849", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0849" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0851", "reference_id": "RHSA-2022:0851", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0851" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0925", "reference_id": "RHSA-2022:0925", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0925" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0958", "reference_id": "RHSA-2022:0958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1103", "reference_id": "RHSA-2022:1103", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1103" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1104", "reference_id": "RHSA-2022:1104", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1104" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1106", "reference_id": "RHSA-2022:1106", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1106" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1107", "reference_id": "RHSA-2022:1107", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1107" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1263", "reference_id": "RHSA-2022:1263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1263" }, { "reference_url": "https://usn.ubuntu.com/5278-1/", "reference_id": "USN-5278-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5278-1/" }, { "reference_url": "https://usn.ubuntu.com/5294-1/", "reference_id": "USN-5294-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5294-1/" }, { "reference_url": "https://usn.ubuntu.com/5294-2/", "reference_id": "USN-5294-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5294-2/" }, { "reference_url": "https://usn.ubuntu.com/5295-1/", "reference_id": "USN-5295-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5295-1/" }, { "reference_url": "https://usn.ubuntu.com/5295-2/", "reference_id": "USN-5295-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5295-2/" }, { "reference_url": "https://usn.ubuntu.com/5297-1/", "reference_id": "USN-5297-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5297-1/" }, { "reference_url": "https://usn.ubuntu.com/5298-1/", "reference_id": "USN-5298-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5298-1/" }, { "reference_url": "https://usn.ubuntu.com/5362-1/", "reference_id": "USN-5362-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5362-1/" }, { "reference_url": "https://usn.ubuntu.com/5505-1/", "reference_id": "USN-5505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5505-1/" }, { "reference_url": "https://usn.ubuntu.com/5513-1/", "reference_id": "USN-5513-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5513-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-0330" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ms42-54h5-2kfa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79693?format=api", "vulnerability_id": "VCID-rwk5-nah5-sfat", "summary": "kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0435.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0435.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0435", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.50256", "scoring_system": "epss", "scoring_elements": "0.97848", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.50256", "scoring_system": "epss", "scoring_elements": "0.97845", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.50256", "scoring_system": "epss", "scoring_elements": "0.97843", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.50256", "scoring_system": "epss", "scoring_elements": "0.97844", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.54322", "scoring_system": "epss", "scoring_elements": "0.98011", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.54322", "scoring_system": "epss", "scoring_elements": "0.98018", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.54322", "scoring_system": "epss", "scoring_elements": "0.98019", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.54322", "scoring_system": "epss", "scoring_elements": "0.98023", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.54322", "scoring_system": "epss", "scoring_elements": "0.9803", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.54322", "scoring_system": "epss", "scoring_elements": "0.98004", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.54322", "scoring_system": "epss", "scoring_elements": "0.98013", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.54322", "scoring_system": "epss", "scoring_elements": "0.98009", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0435" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0516" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0847", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0847" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048738", "reference_id": "2048738", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048738" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0771", "reference_id": "RHSA-2022:0771", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0771" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0772", "reference_id": "RHSA-2022:0772", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0772" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0777", "reference_id": "RHSA-2022:0777", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0777" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0819", "reference_id": "RHSA-2022:0819", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0819" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0825", "reference_id": "RHSA-2022:0825", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0825" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0841", "reference_id": "RHSA-2022:0841", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0841" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0849", "reference_id": "RHSA-2022:0849", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0849" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1186", "reference_id": "RHSA-2022:1186", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1186" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1209", "reference_id": "RHSA-2022:1209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1213", "reference_id": "RHSA-2022:1213", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1213" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1589", "reference_id": "RHSA-2022:1589", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1589" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1619", "reference_id": "RHSA-2022:1619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1619" }, { "reference_url": "https://usn.ubuntu.com/5302-1/", "reference_id": "USN-5302-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5302-1/" }, { "reference_url": "https://usn.ubuntu.com/5337-1/", "reference_id": "USN-5337-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5337-1/" }, { "reference_url": "https://usn.ubuntu.com/5338-1/", "reference_id": "USN-5338-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5338-1/" }, { "reference_url": "https://usn.ubuntu.com/5339-1/", "reference_id": "USN-5339-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5339-1/" }, { "reference_url": "https://usn.ubuntu.com/5362-1/", "reference_id": "USN-5362-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5362-1/" }, { "reference_url": "https://usn.ubuntu.com/5368-1/", "reference_id": "USN-5368-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5368-1/" }, { "reference_url": "https://usn.ubuntu.com/5377-1/", "reference_id": "USN-5377-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5377-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-0435" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rwk5-nah5-sfat" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79720?format=api", "vulnerability_id": "VCID-tqsm-2e4k-aycp", "summary": "kernel: failing usercopy allows for use-after-free exploitation", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22942.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22942.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-22942", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.13534", "scoring_system": "epss", "scoring_elements": "0.94191", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.13534", "scoring_system": "epss", "scoring_elements": "0.94204", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.13534", "scoring_system": "epss", "scoring_elements": "0.94205", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.13534", "scoring_system": "epss", "scoring_elements": "0.94215", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.13534", "scoring_system": "epss", "scoring_elements": "0.94219", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.13534", "scoring_system": "epss", "scoring_elements": "0.94223", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.13534", "scoring_system": "epss", "scoring_elements": "0.94224", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.13534", "scoring_system": "epss", "scoring_elements": "0.94239", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.13534", "scoring_system": "epss", "scoring_elements": "0.94244", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.13534", "scoring_system": "epss", "scoring_elements": "0.94248", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-22942" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0516" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0847", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0847" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809", "reference_id": "2044809", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0592", "reference_id": "RHSA-2022:0592", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0592" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0620", "reference_id": "RHSA-2022:0620", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0620" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0622", "reference_id": "RHSA-2022:0622", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0622" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0771", "reference_id": "RHSA-2022:0771", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0771" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0772", "reference_id": "RHSA-2022:0772", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0772" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0777", "reference_id": "RHSA-2022:0777", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0777" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0819", "reference_id": "RHSA-2022:0819", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0819" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0820", "reference_id": "RHSA-2022:0820", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0820" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0821", "reference_id": "RHSA-2022:0821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0821" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0823", "reference_id": "RHSA-2022:0823", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0823" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0825", "reference_id": "RHSA-2022:0825", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0825" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0841", "reference_id": "RHSA-2022:0841", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0841" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0849", "reference_id": "RHSA-2022:0849", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0849" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0851", "reference_id": "RHSA-2022:0851", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0851" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0925", "reference_id": "RHSA-2022:0925", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0925" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0958", "reference_id": "RHSA-2022:0958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1103", "reference_id": "RHSA-2022:1103", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1103" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1107", "reference_id": "RHSA-2022:1107", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1107" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1263", "reference_id": "RHSA-2022:1263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1263" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1324", "reference_id": "RHSA-2022:1324", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1324" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1373", "reference_id": "RHSA-2022:1373", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1373" }, { "reference_url": "https://usn.ubuntu.com/5278-1/", "reference_id": "USN-5278-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5278-1/" }, { "reference_url": "https://usn.ubuntu.com/5294-1/", "reference_id": "USN-5294-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5294-1/" }, { "reference_url": "https://usn.ubuntu.com/5294-2/", "reference_id": "USN-5294-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5294-2/" }, { "reference_url": "https://usn.ubuntu.com/5295-1/", "reference_id": "USN-5295-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5295-1/" }, { "reference_url": "https://usn.ubuntu.com/5295-2/", "reference_id": "USN-5295-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5295-2/" }, { "reference_url": "https://usn.ubuntu.com/5297-1/", "reference_id": "USN-5297-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5297-1/" }, { "reference_url": "https://usn.ubuntu.com/5298-1/", "reference_id": "USN-5298-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5298-1/" }, { "reference_url": "https://usn.ubuntu.com/5362-1/", "reference_id": "USN-5362-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5362-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-22942" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tqsm-2e4k-aycp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80127?format=api", "vulnerability_id": "VCID-txgc-kd7n-ekc6", "summary": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0920.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0920.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-0920", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75852", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75765", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75789", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75771", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75803", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75806", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75792", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75831", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75841", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00933", "scoring_system": "epss", "scoring_elements": "0.76122", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00933", "scoring_system": "epss", "scoring_elements": "0.76074", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00933", "scoring_system": "epss", "scoring_elements": "0.76078", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00933", "scoring_system": "epss", "scoring_elements": "0.7611", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00933", "scoring_system": "epss", "scoring_elements": "0.76089", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-0920" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0920", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0920" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://source.android.com/security/bulletin/2021-11-01", "reference_id": "2021-11-01", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-06T16:18:51Z/" } ], "url": "https://source.android.com/security/bulletin/2021-11-01" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930", "reference_id": "2031930", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html", "reference_id": "msg00012.html", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-06T16:18:51Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0590", "reference_id": "RHSA-2022:0590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0592", "reference_id": "RHSA-2022:0592", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0592" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0620", "reference_id": "RHSA-2022:0620", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0620" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0622", "reference_id": "RHSA-2022:0622", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0622" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0629", "reference_id": "RHSA-2022:0629", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0629" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0636", "reference_id": "RHSA-2022:0636", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0636" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0771", "reference_id": "RHSA-2022:0771", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0771" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0772", "reference_id": "RHSA-2022:0772", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0772" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0777", "reference_id": "RHSA-2022:0777", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0777" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0819", "reference_id": "RHSA-2022:0819", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0819" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0823", "reference_id": "RHSA-2022:0823", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0823" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0825", "reference_id": "RHSA-2022:0825", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0825" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0841", "reference_id": "RHSA-2022:0841", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0841" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0849", "reference_id": "RHSA-2022:0849", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0849" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0851", "reference_id": "RHSA-2022:0851", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0851" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0958", "reference_id": "RHSA-2022:0958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1103", "reference_id": "RHSA-2022:1103", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1103" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1104", "reference_id": "RHSA-2022:1104", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1104" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1106", "reference_id": "RHSA-2022:1106", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1106" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1107", "reference_id": "RHSA-2022:1107", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1107" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1263", "reference_id": "RHSA-2022:1263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1263" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1324", "reference_id": "RHSA-2022:1324", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1324" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1373", "reference_id": "RHSA-2022:1373", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1373" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1417", "reference_id": "RHSA-2022:1417", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1417" }, { "reference_url": "https://usn.ubuntu.com/5361-1/", "reference_id": "USN-5361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5361-1/" }, { "reference_url": "https://usn.ubuntu.com/7720-1/", "reference_id": "USN-7720-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7720-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-0920" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "6.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-txgc-kd7n-ekc6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/13044?format=api", "vulnerability_id": "VCID-ukce-7qpu-c7cm", "summary": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nIn Cyrus SASL 2.1.17 through 2.1.27 before 2.1.28, plugins/sql.c does not escape the password for a SQL INSERT or UPDATE statement.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24407.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24407.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24407", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00431", "scoring_system": "epss", "scoring_elements": "0.62637", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00431", "scoring_system": "epss", "scoring_elements": "0.62582", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00431", "scoring_system": "epss", "scoring_elements": "0.62623", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00431", "scoring_system": "epss", "scoring_elements": "0.6263", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00431", "scoring_system": "epss", "scoring_elements": "0.62612", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00431", "scoring_system": "epss", "scoring_elements": "0.62624", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00431", "scoring_system": "epss", "scoring_elements": "0.6264", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00431", "scoring_system": "epss", "scoring_elements": "0.62616", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00431", "scoring_system": "epss", "scoring_elements": "0.62605", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.67134", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.67157", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.67132", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.67182", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00528", "scoring_system": "epss", "scoring_elements": "0.67195", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24407" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst" }, { "reference_url": "https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5087", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2022/dsa-5087" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2022/02/23/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2022/02/23/4" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2055326", "reference_id": "2055326", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2055326" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24407", "reference_id": "CVE-2022-24407", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24407" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0658", "reference_id": "RHSA-2022:0658", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0658" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0666", "reference_id": "RHSA-2022:0666", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0666" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0668", "reference_id": "RHSA-2022:0668", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0668" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0730", "reference_id": "RHSA-2022:0730", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0730" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0731", "reference_id": "RHSA-2022:0731", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0731" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0780", "reference_id": "RHSA-2022:0780", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0780" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0841", "reference_id": "RHSA-2022:0841", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0841" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1029", "reference_id": "RHSA-2022:1029", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1029" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1263", "reference_id": "RHSA-2022:1263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1263" }, { "reference_url": "https://usn.ubuntu.com/5301-1/", "reference_id": "USN-5301-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5301-1/" }, { "reference_url": "https://usn.ubuntu.com/5301-2/", "reference_id": "USN-5301-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5301-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-24407" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ukce-7qpu-c7cm" } ], "fixing_vulnerabilities": [], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/redhat-virtualization-host@4.4.10-202203101736_8%3Farch=5" }