Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/87580?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/87580?format=api", "purl": "pkg:rpm/redhat/kernel@4.18.0-553.82.1?arch=el8_10", "type": "rpm", "namespace": "redhat", "name": "kernel", "version": "4.18.0-553.82.1", "qualifiers": { "arch": "el8_10" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67474?format=api", "vulnerability_id": "VCID-1jvn-mqky-83d5", "summary": "kernel: wifi: cfg80211: fix use-after-free in cmp_bss()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-39864.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-39864.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-39864", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.027", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02714", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02719", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02722", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02742", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02713", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02697", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02694", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03862", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.037", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03711", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03831", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03837", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.0384", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03889", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03846", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-39864" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39864", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39864" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396934", "reference_id": "2396934", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396934" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19440", "reference_id": "RHSA-2025:19440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19447", "reference_id": "RHSA-2025:19447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19962", "reference_id": "RHSA-2025:19962", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19962" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21083", "reference_id": "RHSA-2025:21083", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21083" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21084", "reference_id": "RHSA-2025:21084", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21084" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21463", "reference_id": "RHSA-2025:21463", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21463" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22392", "reference_id": "RHSA-2025:22392", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22392" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22405", "reference_id": "RHSA-2025:22405", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22405" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22752", "reference_id": "RHSA-2025:22752", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22752" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23422", "reference_id": "RHSA-2025:23422", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23422" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23423", "reference_id": "RHSA-2025:23423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23424", "reference_id": "RHSA-2025:23424", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23424" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23426", "reference_id": "RHSA-2025:23426", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23426" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23445", "reference_id": "RHSA-2025:23445", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23445" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23450", "reference_id": "RHSA-2025:23450", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23450" }, { "reference_url": "https://usn.ubuntu.com/7909-1/", "reference_id": "USN-7909-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7909-1/" }, { "reference_url": "https://usn.ubuntu.com/7909-2/", "reference_id": "USN-7909-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7909-2/" }, { "reference_url": "https://usn.ubuntu.com/7909-3/", "reference_id": "USN-7909-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7909-3/" }, { "reference_url": "https://usn.ubuntu.com/7909-4/", "reference_id": "USN-7909-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7909-4/" }, { "reference_url": "https://usn.ubuntu.com/7909-5/", "reference_id": "USN-7909-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7909-5/" }, { "reference_url": "https://usn.ubuntu.com/7910-1/", "reference_id": "USN-7910-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7910-1/" }, { "reference_url": "https://usn.ubuntu.com/7910-2/", "reference_id": "USN-7910-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7910-2/" }, { "reference_url": "https://usn.ubuntu.com/7933-1/", "reference_id": "USN-7933-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7933-1/" }, { "reference_url": "https://usn.ubuntu.com/7938-1/", "reference_id": "USN-7938-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7938-1/" }, { "reference_url": "https://usn.ubuntu.com/8095-1/", "reference_id": "USN-8095-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-1/" }, { "reference_url": "https://usn.ubuntu.com/8095-2/", "reference_id": "USN-8095-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-2/" }, { "reference_url": "https://usn.ubuntu.com/8095-3/", "reference_id": "USN-8095-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-3/" }, { "reference_url": "https://usn.ubuntu.com/8095-4/", "reference_id": "USN-8095-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-4/" }, { "reference_url": "https://usn.ubuntu.com/8095-5/", "reference_id": "USN-8095-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-5/" }, { "reference_url": "https://usn.ubuntu.com/8100-1/", "reference_id": "USN-8100-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8100-1/" }, { "reference_url": "https://usn.ubuntu.com/8125-1/", "reference_id": "USN-8125-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8125-1/" }, { "reference_url": "https://usn.ubuntu.com/8126-1/", "reference_id": "USN-8126-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8126-1/" }, { "reference_url": "https://usn.ubuntu.com/8165-1/", "reference_id": "USN-8165-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8165-1/" }, { "reference_url": "https://usn.ubuntu.com/8261-1/", "reference_id": "USN-8261-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8261-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2025-39864" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1jvn-mqky-83d5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67977?format=api", "vulnerability_id": "VCID-6t5m-uuun-fqhe", "summary": "kernel: wifi: mwifiex: Fix OOB and integer underflow when rx packets", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53226.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53226.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53226", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02603", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.0259", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02631", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02611", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02606", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03749", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03649", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03625", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.036", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03575", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03588", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03713", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03717", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.0372", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03767", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.0373", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53226" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53226", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53226" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.kernel.org/stable/c/11958528161731c58e105b501ed60b83a91ea941", "reference_id": "11958528161731c58e105b501ed60b83a91ea941", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:51:16Z/" } ], "url": "https://git.kernel.org/stable/c/11958528161731c58e105b501ed60b83a91ea941" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395420", "reference_id": "2395420", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395420" }, { "reference_url": "https://git.kernel.org/stable/c/29eca8b7863d1d7de6c5b746b374e3487d14f154", "reference_id": "29eca8b7863d1d7de6c5b746b374e3487d14f154", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:51:16Z/" } ], "url": "https://git.kernel.org/stable/c/29eca8b7863d1d7de6c5b746b374e3487d14f154" }, { "reference_url": "https://git.kernel.org/stable/c/3975e21d4d01efaf0296ded40d11c06589c49245", "reference_id": "3975e21d4d01efaf0296ded40d11c06589c49245", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:51:16Z/" } ], "url": "https://git.kernel.org/stable/c/3975e21d4d01efaf0296ded40d11c06589c49245" }, { "reference_url": "https://git.kernel.org/stable/c/3fe3923d092e22d87d1ed03e2729db444b8c1331", "reference_id": "3fe3923d092e22d87d1ed03e2729db444b8c1331", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:51:16Z/" } ], "url": "https://git.kernel.org/stable/c/3fe3923d092e22d87d1ed03e2729db444b8c1331" }, { "reference_url": "https://git.kernel.org/stable/c/650d1bc02fba7b42f476d8b6643324abac5921ed", "reference_id": "650d1bc02fba7b42f476d8b6643324abac5921ed", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:51:16Z/" } ], "url": "https://git.kernel.org/stable/c/650d1bc02fba7b42f476d8b6643324abac5921ed" }, { "reference_url": "https://git.kernel.org/stable/c/7c54b6fc39eb1aac51cf2945f8a25e2a47fdca02", "reference_id": "7c54b6fc39eb1aac51cf2945f8a25e2a47fdca02", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:51:16Z/" } ], "url": "https://git.kernel.org/stable/c/7c54b6fc39eb1aac51cf2945f8a25e2a47fdca02" }, { "reference_url": "https://git.kernel.org/stable/c/8824aa4ab62c800f75d96f48e1883a5f56ec5869", "reference_id": "8824aa4ab62c800f75d96f48e1883a5f56ec5869", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:51:16Z/" } ], "url": "https://git.kernel.org/stable/c/8824aa4ab62c800f75d96f48e1883a5f56ec5869" }, { "reference_url": "https://git.kernel.org/stable/c/a7300e3800e9fd5405e88ce67709c1a97783b9c8", "reference_id": "a7300e3800e9fd5405e88ce67709c1a97783b9c8", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:51:16Z/" } ], "url": "https://git.kernel.org/stable/c/a7300e3800e9fd5405e88ce67709c1a97783b9c8" }, { "reference_url": "https://git.kernel.org/stable/c/f517c97fc129995de77dd06aa5a74f909ebf568f", "reference_id": "f517c97fc129995de77dd06aa5a74f909ebf568f", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:51:16Z/" } ], "url": "https://git.kernel.org/stable/c/f517c97fc129995de77dd06aa5a74f909ebf568f" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19440", "reference_id": "RHSA-2025:19440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19447", "reference_id": "RHSA-2025:19447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21051", "reference_id": "RHSA-2025:21051", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21051" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21091", "reference_id": "RHSA-2025:21091", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21091" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21128", "reference_id": "RHSA-2025:21128", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21128" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21136", "reference_id": "RHSA-2025:21136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22998", "reference_id": "RHSA-2025:22998", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22998" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23000", "reference_id": "RHSA-2025:23000", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23000" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23445", "reference_id": "RHSA-2025:23445", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23445" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23463", "reference_id": "RHSA-2025:23463", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23463" } ], "fixed_packages": [], "aliases": [ "CVE-2023-53226" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6t5m-uuun-fqhe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65388?format=api", "vulnerability_id": "VCID-gxc8-y1x5-1qgk", "summary": "kernel: cifs: Fix xid leak in cifs_ses_add_channel()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50856.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50856.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50856", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07346", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.0739", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07372", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07427", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07451", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07437", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07424", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07413", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07417", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07408", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07381", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07341", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07329", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07456", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09895", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10048", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50856" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50856", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50856" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426165", "reference_id": "2426165", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583", "reference_id": "RHSA-2023:6583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19447", "reference_id": "RHSA-2025:19447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19447" } ], "fixed_packages": [], "aliases": [ "CVE-2022-50856" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gxc8-y1x5-1qgk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67822?format=api", "vulnerability_id": "VCID-vqcd-ptr4-g3hp", "summary": "kernel: wifi: mac80211: check S1G action frame size", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53257.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53257.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53257", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02871", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02894", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02761", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02757", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02742", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02753", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02865", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02859", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02846", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02904", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02876", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02886", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02895", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02897", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02921", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.0278", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53257" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.kernel.org/stable/c/19e4a47ee74718a22e963e8a647c8c3bfe8bb05c", "reference_id": "19e4a47ee74718a22e963e8a647c8c3bfe8bb05c", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:02:03Z/" } ], "url": "https://git.kernel.org/stable/c/19e4a47ee74718a22e963e8a647c8c3bfe8bb05c" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395253", "reference_id": "2395253", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395253" }, { "reference_url": "https://git.kernel.org/stable/c/5e030a2509be72b452b6f4a800786d43229414db", "reference_id": "5e030a2509be72b452b6f4a800786d43229414db", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:02:03Z/" } ], "url": "https://git.kernel.org/stable/c/5e030a2509be72b452b6f4a800786d43229414db" }, { "reference_url": "https://git.kernel.org/stable/c/7ae7a1378a119780c8c17a6b5fc03011c3bb7029", "reference_id": "7ae7a1378a119780c8c17a6b5fc03011c3bb7029", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:02:03Z/" } ], "url": "https://git.kernel.org/stable/c/7ae7a1378a119780c8c17a6b5fc03011c3bb7029" }, { "reference_url": "https://git.kernel.org/stable/c/fedd9377dd9c71a950d432fbe1628eebfbed70a1", "reference_id": "fedd9377dd9c71a950d432fbe1628eebfbed70a1", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:02:03Z/" } ], "url": "https://git.kernel.org/stable/c/fedd9377dd9c71a950d432fbe1628eebfbed70a1" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19440", "reference_id": "RHSA-2025:19440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19447", "reference_id": "RHSA-2025:19447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21083", "reference_id": "RHSA-2025:21083", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21083" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21091", "reference_id": "RHSA-2025:21091", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21091" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21136", "reference_id": "RHSA-2025:21136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22006", "reference_id": "RHSA-2025:22006", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22006" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22095", "reference_id": "RHSA-2025:22095", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22095" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22124", "reference_id": "RHSA-2025:22124", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22124" } ], "fixed_packages": [], "aliases": [ "CVE-2023-53257" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vqcd-ptr4-g3hp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66238?format=api", "vulnerability_id": "VCID-xhsu-dqfq-3fev", "summary": "kernel: Linux kernel (CIFS): Use-after-free vulnerability allows data integrity compromise and denial of service", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53751.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53751.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53751", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.06061", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07346", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.0739", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07372", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07427", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10049", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10071", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.1003", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10009", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09883", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09858", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10007", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10037", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10017", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09961", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09895", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53751" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53751", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53751" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419858", "reference_id": "2419858", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419858" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2394", "reference_id": "RHSA-2024:2394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19447", "reference_id": "RHSA-2025:19447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1512", "reference_id": "RHSA-2026:1512", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1512" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1886", "reference_id": "RHSA-2026:1886", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1886" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1909", "reference_id": "RHSA-2026:1909", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1909" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1946", "reference_id": "RHSA-2026:1946", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1946" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2490", "reference_id": "RHSA-2026:2490", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2490" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2535", "reference_id": "RHSA-2026:2535", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2535" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2573", "reference_id": "RHSA-2026:2573", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2573" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2577", "reference_id": "RHSA-2026:2577", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2577" } ], "fixed_packages": [], "aliases": [ "CVE-2023-53751" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xhsu-dqfq-3fev" } ], "fixing_vulnerabilities": [], "risk_score": "3.4", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-553.82.1%3Farch=el8_10" }