Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/87587?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/87587?format=api", "purl": "pkg:rpm/redhat/kernel@5.14.0-284.155.1?arch=el9_2", "type": "rpm", "namespace": "redhat", "name": "kernel", "version": "5.14.0-284.155.1", "qualifiers": { "arch": "el9_2" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66371?format=api", "vulnerability_id": "VCID-enr2-4j6n-jqf7", "summary": "kernel: Linux kernel: vsock vulnerability may lead to memory corruption", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40248.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40248.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-40248", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16755", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16694", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21111", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21121", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21077", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21025", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21015", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21026", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21004", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20877", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20879", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20847", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20969", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.2105", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-40248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40248" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418872", "reference_id": "2418872", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418872" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1142", "reference_id": "RHSA-2026:1142", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1142" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1143", "reference_id": "RHSA-2026:1143", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1143" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1148", "reference_id": "RHSA-2026:1148", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1148" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1442", "reference_id": "RHSA-2026:1442", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1442" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1445", "reference_id": "RHSA-2026:1445", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1445" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1494", "reference_id": "RHSA-2026:1494", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1494" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1495", "reference_id": "RHSA-2026:1495", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1495" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1512", "reference_id": "RHSA-2026:1512", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1512" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1581", "reference_id": "RHSA-2026:1581", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1581" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1623", "reference_id": "RHSA-2026:1623", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1623" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1690", "reference_id": "RHSA-2026:1690", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1690" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1703", "reference_id": "RHSA-2026:1703", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1703" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1727", "reference_id": "RHSA-2026:1727", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1727" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1879", "reference_id": "RHSA-2026:1879", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1879" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1886", "reference_id": "RHSA-2026:1886", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1886" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1909", "reference_id": "RHSA-2026:1909", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1909" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1946", "reference_id": "RHSA-2026:1946", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1946" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3848", "reference_id": "RHSA-2026:3848", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3848" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3865", "reference_id": "RHSA-2026:3865", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3865" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3866", "reference_id": "RHSA-2026:3866", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3866" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3867", "reference_id": "RHSA-2026:3867", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3867" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3868", "reference_id": "RHSA-2026:3868", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3868" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3873", "reference_id": "RHSA-2026:3873", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3873" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3886", "reference_id": "RHSA-2026:3886", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3886" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3987", "reference_id": "RHSA-2026:3987", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3987" }, { "reference_url": "https://usn.ubuntu.com/8094-1/", "reference_id": "USN-8094-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8094-1/" }, { "reference_url": "https://usn.ubuntu.com/8094-2/", "reference_id": "USN-8094-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8094-2/" }, { "reference_url": "https://usn.ubuntu.com/8094-3/", "reference_id": "USN-8094-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8094-3/" }, { "reference_url": "https://usn.ubuntu.com/8094-4/", "reference_id": "USN-8094-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8094-4/" }, { "reference_url": "https://usn.ubuntu.com/8094-5/", "reference_id": "USN-8094-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8094-5/" }, { "reference_url": "https://usn.ubuntu.com/8095-1/", "reference_id": "USN-8095-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-1/" }, { "reference_url": "https://usn.ubuntu.com/8095-2/", "reference_id": "USN-8095-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-2/" }, { "reference_url": "https://usn.ubuntu.com/8095-3/", "reference_id": "USN-8095-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-3/" }, { "reference_url": "https://usn.ubuntu.com/8095-4/", "reference_id": "USN-8095-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-4/" }, { "reference_url": "https://usn.ubuntu.com/8095-5/", "reference_id": "USN-8095-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-5/" }, { "reference_url": "https://usn.ubuntu.com/8096-1/", "reference_id": "USN-8096-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-1/" }, { "reference_url": "https://usn.ubuntu.com/8096-2/", "reference_id": "USN-8096-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-2/" }, { "reference_url": "https://usn.ubuntu.com/8096-3/", "reference_id": "USN-8096-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-3/" }, { "reference_url": "https://usn.ubuntu.com/8096-4/", "reference_id": "USN-8096-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-4/" }, { "reference_url": "https://usn.ubuntu.com/8096-5/", "reference_id": "USN-8096-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-5/" }, { "reference_url": "https://usn.ubuntu.com/8100-1/", "reference_id": "USN-8100-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8100-1/" }, { "reference_url": "https://usn.ubuntu.com/8116-1/", "reference_id": "USN-8116-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8116-1/" }, { "reference_url": "https://usn.ubuntu.com/8125-1/", "reference_id": "USN-8125-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8125-1/" }, { "reference_url": "https://usn.ubuntu.com/8126-1/", "reference_id": "USN-8126-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8126-1/" }, { "reference_url": "https://usn.ubuntu.com/8141-1/", "reference_id": "USN-8141-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8141-1/" }, { "reference_url": "https://usn.ubuntu.com/8152-1/", "reference_id": "USN-8152-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8152-1/" }, { "reference_url": "https://usn.ubuntu.com/8163-1/", "reference_id": "USN-8163-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8163-1/" }, { "reference_url": "https://usn.ubuntu.com/8163-2/", "reference_id": "USN-8163-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8163-2/" }, { "reference_url": "https://usn.ubuntu.com/8165-1/", "reference_id": "USN-8165-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8165-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2025-40248" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-enr2-4j6n-jqf7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66039?format=api", "vulnerability_id": "VCID-qfge-zawt-qyb3", "summary": "kernel: net: atlantic: fix fragment overflow handling in RX path", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-68301.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-68301.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-68301", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16694", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16755", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16546", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16631", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16684", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16662", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16621", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16561", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16499", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20847", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21026", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21004", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20877", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20879", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-68301" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68301", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68301" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2422836", "reference_id": "2422836", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2422836" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0759", "reference_id": "RHSA-2026:0759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0760", "reference_id": "RHSA-2026:0760", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0760" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1143", "reference_id": "RHSA-2026:1143", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1143" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1690", "reference_id": "RHSA-2026:1690", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1690" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1703", "reference_id": "RHSA-2026:1703", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1703" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1727", "reference_id": "RHSA-2026:1727", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1727" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1879", "reference_id": "RHSA-2026:1879", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1879" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1886", "reference_id": "RHSA-2026:1886", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1886" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1909", "reference_id": "RHSA-2026:1909", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1909" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1946", "reference_id": "RHSA-2026:1946", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1946" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2490", "reference_id": "RHSA-2026:2490", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2490" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2535", "reference_id": "RHSA-2026:2535", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2535" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2573", "reference_id": "RHSA-2026:2573", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2573" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2577", "reference_id": "RHSA-2026:2577", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2577" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2664", "reference_id": "RHSA-2026:2664", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2664" }, { "reference_url": "https://usn.ubuntu.com/8094-1/", "reference_id": "USN-8094-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8094-1/" }, { "reference_url": "https://usn.ubuntu.com/8094-2/", "reference_id": "USN-8094-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8094-2/" }, { "reference_url": "https://usn.ubuntu.com/8094-3/", "reference_id": "USN-8094-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8094-3/" }, { "reference_url": "https://usn.ubuntu.com/8094-4/", "reference_id": "USN-8094-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8094-4/" }, { "reference_url": "https://usn.ubuntu.com/8094-5/", "reference_id": "USN-8094-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8094-5/" }, { "reference_url": "https://usn.ubuntu.com/8095-1/", "reference_id": "USN-8095-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-1/" }, { "reference_url": "https://usn.ubuntu.com/8095-2/", "reference_id": "USN-8095-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-2/" }, { "reference_url": "https://usn.ubuntu.com/8095-3/", "reference_id": "USN-8095-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-3/" }, { "reference_url": "https://usn.ubuntu.com/8095-4/", "reference_id": "USN-8095-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-4/" }, { "reference_url": "https://usn.ubuntu.com/8095-5/", "reference_id": "USN-8095-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-5/" }, { "reference_url": "https://usn.ubuntu.com/8096-1/", "reference_id": "USN-8096-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-1/" }, { "reference_url": "https://usn.ubuntu.com/8096-2/", "reference_id": "USN-8096-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-2/" }, { "reference_url": "https://usn.ubuntu.com/8096-3/", "reference_id": "USN-8096-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-3/" }, { "reference_url": "https://usn.ubuntu.com/8096-4/", "reference_id": "USN-8096-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-4/" }, { "reference_url": "https://usn.ubuntu.com/8096-5/", "reference_id": "USN-8096-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8096-5/" }, { "reference_url": "https://usn.ubuntu.com/8100-1/", "reference_id": "USN-8100-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8100-1/" }, { "reference_url": "https://usn.ubuntu.com/8116-1/", "reference_id": "USN-8116-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8116-1/" }, { "reference_url": "https://usn.ubuntu.com/8125-1/", "reference_id": "USN-8125-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8125-1/" }, { "reference_url": "https://usn.ubuntu.com/8126-1/", "reference_id": "USN-8126-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8126-1/" }, { "reference_url": "https://usn.ubuntu.com/8141-1/", "reference_id": "USN-8141-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8141-1/" }, { "reference_url": "https://usn.ubuntu.com/8152-1/", "reference_id": "USN-8152-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8152-1/" }, { "reference_url": "https://usn.ubuntu.com/8163-1/", "reference_id": "USN-8163-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8163-1/" }, { "reference_url": "https://usn.ubuntu.com/8163-2/", "reference_id": "USN-8163-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8163-2/" }, { "reference_url": "https://usn.ubuntu.com/8165-1/", "reference_id": "USN-8165-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8165-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2025-68301" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qfge-zawt-qyb3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65446?format=api", "vulnerability_id": "VCID-vwpb-78dc-wuf7", "summary": "kernel: tcp: fix a signed-integer-overflow bug in tcp_add_backlog()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50865.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50865.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50865", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07494", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07533", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07514", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07573", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07593", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.0759", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07576", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07564", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07488", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07476", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07608", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07569", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07549", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07518", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50865" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50865", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50865" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426226", "reference_id": "2426226", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426226" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583", "reference_id": "RHSA-2023:6583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1661", "reference_id": "RHSA-2026:1661", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1661" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1662", "reference_id": "RHSA-2026:1662", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1662" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1909", "reference_id": "RHSA-2026:1909", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1909" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1946", "reference_id": "RHSA-2026:1946", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1946" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2490", "reference_id": "RHSA-2026:2490", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2490" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2573", "reference_id": "RHSA-2026:2573", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2573" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2577", "reference_id": "RHSA-2026:2577", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2577" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3277", "reference_id": "RHSA-2026:3277", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3277" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3360", "reference_id": "RHSA-2026:3360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3360" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3388", "reference_id": "RHSA-2026:3388", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3388" } ], "fixed_packages": [], "aliases": [ "CVE-2022-50865" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vwpb-78dc-wuf7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66238?format=api", "vulnerability_id": "VCID-xhsu-dqfq-3fev", "summary": "kernel: Linux kernel (CIFS): Use-after-free vulnerability allows data integrity compromise and denial of service", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53751.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53751.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53751", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07427", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07346", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.0739", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07372", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09883", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09858", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10007", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10037", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10017", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09961", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10049", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10071", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.1003", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10009", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53751" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53751", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53751" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419858", "reference_id": "2419858", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419858" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2394", "reference_id": "RHSA-2024:2394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19447", "reference_id": "RHSA-2025:19447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1512", "reference_id": "RHSA-2026:1512", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1512" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1886", "reference_id": "RHSA-2026:1886", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1886" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1909", "reference_id": "RHSA-2026:1909", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1909" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1946", "reference_id": "RHSA-2026:1946", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1946" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2490", "reference_id": "RHSA-2026:2490", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2490" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2535", "reference_id": "RHSA-2026:2535", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2535" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2573", "reference_id": "RHSA-2026:2573", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2573" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2577", "reference_id": "RHSA-2026:2577", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2577" } ], "fixed_packages": [], "aliases": [ "CVE-2023-53751" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xhsu-dqfq-3fev" } ], "fixing_vulnerabilities": [], "risk_score": "3.4", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@5.14.0-284.155.1%3Farch=el9_2" }