Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/78871?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78871?format=api", "vulnerability_id": "VCID-fzyb-pezt-bkbt", "summary": "kernel: use-after-free due to race condition occurring in dvb_register_device()", "aliases": [ { "alias": "CVE-2022-45884" } ], "fixed_packages": [], "affected_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/88814?format=api", "purl": "pkg:rpm/redhat/kernel@4.18.0-372.80.1?arch=el8_6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-225u-cxd6-dqb5" }, { "vulnerability": "VCID-ed7y-vzk5-53bs" }, { "vulnerability": "VCID-fzyb-pezt-bkbt" }, { "vulnerability": "VCID-j6td-3edb-rugg" }, { "vulnerability": "VCID-kz9r-zumw-5ydf" }, { "vulnerability": "VCID-nsv2-4qub-93dd" }, { "vulnerability": "VCID-pq7v-b14b-tuhv" }, { "vulnerability": "VCID-srrf-b9jk-5uge" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-372.80.1%3Farch=el8_6" }, { "url": "http://public2.vulnerablecode.io/api/packages/87579?format=api", "purl": "pkg:rpm/redhat/kernel@4.18.0-477.36.1?arch=el8_8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-24gs-ss6s-2ka7" }, { "vulnerability": "VCID-6n6j-exu4-5qfq" }, { "vulnerability": "VCID-7bp6-cn74-ayar" }, { "vulnerability": "VCID-amu6-u9vr-x3gf" }, { "vulnerability": "VCID-an95-d2f9-wkbc" }, { "vulnerability": "VCID-ed7y-vzk5-53bs" }, { "vulnerability": "VCID-fzyb-pezt-bkbt" }, { "vulnerability": "VCID-hxjx-3the-x3ff" }, { "vulnerability": "VCID-j2y7-nwcd-5qh7" }, { "vulnerability": "VCID-jpsy-mz9f-bkey" }, { "vulnerability": "VCID-khqx-5cyy-p3fv" }, { "vulnerability": "VCID-khyt-2dss-uyb7" }, { "vulnerability": "VCID-kz9r-zumw-5ydf" }, { "vulnerability": "VCID-mwd5-aurx-fqh8" }, { "vulnerability": "VCID-n89e-y6eu-4ucf" }, { "vulnerability": "VCID-srrf-b9jk-5uge" }, { "vulnerability": "VCID-trxm-8mg3-4bbr" }, { "vulnerability": "VCID-ubr3-74hm-e7hy" }, { "vulnerability": "VCID-wnep-c9wf-hycp" }, { "vulnerability": "VCID-yrxe-ak75-qfhh" }, { "vulnerability": "VCID-zbbv-tgna-hybm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-477.36.1%3Farch=el8_8" }, { "url": "http://public2.vulnerablecode.io/api/packages/94039?format=api", "purl": "pkg:rpm/redhat/kernel@4.18.0-513.9.1?arch=el8_9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7bp6-cn74-ayar" }, { "vulnerability": "VCID-ae5d-jmsc-9ba5" }, { "vulnerability": "VCID-ed7y-vzk5-53bs" }, { "vulnerability": "VCID-fzyb-pezt-bkbt" }, { "vulnerability": "VCID-hxjx-3the-x3ff" }, { "vulnerability": "VCID-mhcw-xhun-3fe7" }, { "vulnerability": "VCID-s15g-xfaf-pqck" }, { "vulnerability": "VCID-srrf-b9jk-5uge" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-513.9.1%3Farch=el8_9" }, { "url": "http://public2.vulnerablecode.io/api/packages/95079?format=api", "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-513.9.1.rt7.311?arch=el8_9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ae5d-jmsc-9ba5" }, { "vulnerability": "VCID-ed7y-vzk5-53bs" }, { "vulnerability": "VCID-fzyb-pezt-bkbt" }, { "vulnerability": "VCID-hxjx-3the-x3ff" }, { "vulnerability": "VCID-mhcw-xhun-3fe7" }, { "vulnerability": "VCID-s15g-xfaf-pqck" }, { "vulnerability": "VCID-srrf-b9jk-5uge" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@4.18.0-513.9.1.rt7.311%3Farch=el8_9" } ], "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45884.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45884.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-45884", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04141", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.0416", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.03966", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.03971", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.03996", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.03965", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.03948", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.03918", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05251", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.04834", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.04842", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.0518", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05205", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05248", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-45884" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45884", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45884" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2148510", "reference_id": "2148510", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2148510" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7398", "reference_id": "RHSA-2023:7398", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7398" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7539", "reference_id": "RHSA-2023:7539", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7539" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7548", "reference_id": "RHSA-2023:7548", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7548" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7549", "reference_id": "RHSA-2023:7549", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7549" } ], "weaknesses": [ { "cwe_id": 366, "name": "Race Condition within a Thread", "description": "If two threads of execution use a resource simultaneously, there exists the possibility that resources may be used while invalid, in turn making the state of execution undefined." } ], "exploits": [], "severity_range_score": "4.1 - 6.4", "exploitability": "0.5", "weighted_severity": "5.8", "risk_score": 2.9, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fzyb-pezt-bkbt" }