Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/88120?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/88120?format=api", "purl": "pkg:rpm/redhat/kernel@4.18.0-477.123.1?arch=el8_8", "type": "rpm", "namespace": "redhat", "name": "kernel", "version": "4.18.0-477.123.1", "qualifiers": { "arch": "el8_8" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67527?format=api", "vulnerability_id": "VCID-1c4a-w8jv-cudd", "summary": "kernel: mm: kmem: fix a NULL pointer dereference in obj_stock_flush_required()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53401.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53401.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53401", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01826", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01857", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01838", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.0184", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01843", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01844", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01829", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01824", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02281", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02261", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02252", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02295", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02262", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02266", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02186", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02197", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53401" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53401", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53401" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396417", "reference_id": "2396417", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396417" }, { "reference_url": "https://git.kernel.org/stable/c/33391c7e1a2ad612bf3922cc168cb09a46bbe236", "reference_id": "33391c7e1a2ad612bf3922cc168cb09a46bbe236", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:01:39Z/" } ], "url": "https://git.kernel.org/stable/c/33391c7e1a2ad612bf3922cc168cb09a46bbe236" }, { "reference_url": "https://git.kernel.org/stable/c/33d9490b27e5d8da4444aefd714a4f50189db978", "reference_id": "33d9490b27e5d8da4444aefd714a4f50189db978", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:01:39Z/" } ], "url": "https://git.kernel.org/stable/c/33d9490b27e5d8da4444aefd714a4f50189db978" }, { "reference_url": "https://git.kernel.org/stable/c/3b8abb3239530c423c0b97e42af7f7e856e1ee96", "reference_id": "3b8abb3239530c423c0b97e42af7f7e856e1ee96", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:01:39Z/" } ], "url": "https://git.kernel.org/stable/c/3b8abb3239530c423c0b97e42af7f7e856e1ee96" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9315", "reference_id": "RHSA-2024:9315", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9315" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19886", "reference_id": "RHSA-2025:19886", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19886" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21051", "reference_id": "RHSA-2025:21051", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21051" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21091", "reference_id": "RHSA-2025:21091", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21091" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21128", "reference_id": "RHSA-2025:21128", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21128" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21136", "reference_id": "RHSA-2025:21136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22800", "reference_id": "RHSA-2025:22800", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22800" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22801", "reference_id": "RHSA-2025:22801", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22801" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23427", "reference_id": "RHSA-2025:23427", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23427" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0533", "reference_id": "RHSA-2026:0533", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0533" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0536", "reference_id": "RHSA-2026:0536", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0536" } ], "fixed_packages": [], "aliases": [ "CVE-2023-53401" ], "risk_score": 3.3, "exploitability": "0.5", "weighted_severity": "6.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1c4a-w8jv-cudd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66566?format=api", "vulnerability_id": "VCID-c3dk-zkrf-x3fj", "summary": "kernel: Linux kernel: Privilege escalation or Denial of Service via TCP Fast Open vulnerability", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40186.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40186.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-40186", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.1295", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13035", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.12996", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.1285", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.12853", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.12951", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.1805", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18026", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.1799", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.17845", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.17939", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21111", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21194", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21249", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20969", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.2105", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-40186" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40186", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40186" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414724", "reference_id": "2414724", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414724" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22387", "reference_id": "RHSA-2025:22387", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22387" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22388", "reference_id": "RHSA-2025:22388", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22388" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22392", "reference_id": "RHSA-2025:22392", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22392" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23422", "reference_id": "RHSA-2025:23422", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23422" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23423", "reference_id": "RHSA-2025:23423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23424", "reference_id": "RHSA-2025:23424", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23424" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23425", "reference_id": "RHSA-2025:23425", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23425" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23426", "reference_id": "RHSA-2025:23426", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23426" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23427", "reference_id": "RHSA-2025:23427", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23427" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23445", "reference_id": "RHSA-2025:23445", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23445" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23450", "reference_id": "RHSA-2025:23450", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23450" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23463", "reference_id": "RHSA-2025:23463", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23463" }, { "reference_url": "https://usn.ubuntu.com/8029-1/", "reference_id": "USN-8029-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8029-1/" }, { "reference_url": "https://usn.ubuntu.com/8029-2/", "reference_id": "USN-8029-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8029-2/" }, { "reference_url": "https://usn.ubuntu.com/8029-3/", "reference_id": "USN-8029-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8029-3/" }, { "reference_url": "https://usn.ubuntu.com/8030-1/", "reference_id": "USN-8030-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8030-1/" }, { "reference_url": "https://usn.ubuntu.com/8048-1/", "reference_id": "USN-8048-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8048-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2025-40186" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c3dk-zkrf-x3fj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66919?format=api", "vulnerability_id": "VCID-dmjg-sqz8-9yb7", "summary": "kernel: tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-39955.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-39955.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-39955", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04642", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04666", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.0468", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04713", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04726", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04717", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.047", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04683", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04834", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04872", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04885", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.0465", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04658", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04799", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05822", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05902", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-39955" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39955", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39955" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402699", "reference_id": "2402699", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402699" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21931", "reference_id": "RHSA-2025:21931", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21931" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22387", "reference_id": "RHSA-2025:22387", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22387" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22388", "reference_id": "RHSA-2025:22388", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22388" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22392", "reference_id": "RHSA-2025:22392", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22392" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22405", "reference_id": "RHSA-2025:22405", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22405" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22571", "reference_id": "RHSA-2025:22571", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22571" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23422", "reference_id": "RHSA-2025:23422", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23422" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23423", "reference_id": "RHSA-2025:23423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23424", "reference_id": "RHSA-2025:23424", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23424" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23425", "reference_id": "RHSA-2025:23425", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23425" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23426", "reference_id": "RHSA-2025:23426", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23426" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23427", "reference_id": "RHSA-2025:23427", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23427" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23445", "reference_id": "RHSA-2025:23445", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23445" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23450", "reference_id": "RHSA-2025:23450", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23450" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23463", "reference_id": "RHSA-2025:23463", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23463" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23947", "reference_id": "RHSA-2025:23947", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23947" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23960", "reference_id": "RHSA-2025:23960", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23960" }, { "reference_url": "https://usn.ubuntu.com/8033-1/", "reference_id": "USN-8033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8033-1/" }, { "reference_url": "https://usn.ubuntu.com/8033-2/", "reference_id": "USN-8033-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8033-2/" }, { "reference_url": "https://usn.ubuntu.com/8033-3/", "reference_id": "USN-8033-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8033-3/" }, { "reference_url": "https://usn.ubuntu.com/8033-4/", "reference_id": "USN-8033-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8033-4/" }, { "reference_url": "https://usn.ubuntu.com/8033-5/", "reference_id": "USN-8033-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8033-5/" }, { "reference_url": "https://usn.ubuntu.com/8033-6/", "reference_id": "USN-8033-6", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8033-6/" }, { "reference_url": "https://usn.ubuntu.com/8033-7/", "reference_id": "USN-8033-7", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8033-7/" }, { "reference_url": "https://usn.ubuntu.com/8033-8/", "reference_id": "USN-8033-8", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8033-8/" }, { "reference_url": "https://usn.ubuntu.com/8034-1/", "reference_id": "USN-8034-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8034-1/" }, { "reference_url": "https://usn.ubuntu.com/8034-2/", "reference_id": "USN-8034-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8034-2/" }, { "reference_url": "https://usn.ubuntu.com/8095-1/", "reference_id": "USN-8095-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-1/" }, { "reference_url": "https://usn.ubuntu.com/8095-2/", "reference_id": "USN-8095-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-2/" }, { "reference_url": "https://usn.ubuntu.com/8095-3/", "reference_id": "USN-8095-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-3/" }, { "reference_url": "https://usn.ubuntu.com/8095-4/", "reference_id": "USN-8095-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-4/" }, { "reference_url": "https://usn.ubuntu.com/8095-5/", "reference_id": "USN-8095-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-5/" }, { "reference_url": "https://usn.ubuntu.com/8100-1/", "reference_id": "USN-8100-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8100-1/" }, { "reference_url": "https://usn.ubuntu.com/8125-1/", "reference_id": "USN-8125-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8125-1/" }, { "reference_url": "https://usn.ubuntu.com/8126-1/", "reference_id": "USN-8126-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8126-1/" }, { "reference_url": "https://usn.ubuntu.com/8141-1/", "reference_id": "USN-8141-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8141-1/" }, { "reference_url": "https://usn.ubuntu.com/8163-1/", "reference_id": "USN-8163-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8163-1/" }, { "reference_url": "https://usn.ubuntu.com/8163-2/", "reference_id": "USN-8163-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8163-2/" }, { "reference_url": "https://usn.ubuntu.com/8165-1/", "reference_id": "USN-8165-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8165-1/" }, { "reference_url": "https://usn.ubuntu.com/8243-1/", "reference_id": "USN-8243-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8243-1/" }, { "reference_url": "https://usn.ubuntu.com/8261-1/", "reference_id": "USN-8261-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8261-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2025-39955" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dmjg-sqz8-9yb7" } ], "fixing_vulnerabilities": [], "risk_score": "3.4", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-477.123.1%3Farch=el8_8" }