Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/88739?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/88739?format=api", "purl": "pkg:rpm/redhat/kernel@4.18.0-477.122.1?arch=el8_8", "type": "rpm", "namespace": "redhat", "name": "kernel", "version": "4.18.0-477.122.1", "qualifiers": { "arch": "el8_8" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68082?format=api", "vulnerability_id": "VCID-62jz-qpdg-kyhe", "summary": "kernel: NFS: Fix a race when updating an existing write", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-39697.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-39697.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-39697", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.01912", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.01926", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.01927", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.0194", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.01925", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.0191", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.01905", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.01886", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.01885", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.0197", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.01956", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.01951", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.0198", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.01932", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.01923", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-39697" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39697", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39697" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2393481", "reference_id": "2393481", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2393481" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19106", "reference_id": "RHSA-2025:19106", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19106" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21051", "reference_id": "RHSA-2025:21051", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21051" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21091", "reference_id": "RHSA-2025:21091", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21091" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21118", "reference_id": "RHSA-2025:21118", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21118" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21128", "reference_id": "RHSA-2025:21128", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21128" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21136", "reference_id": "RHSA-2025:21136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21469", "reference_id": "RHSA-2025:21469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21760", "reference_id": "RHSA-2025:21760", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21760" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21917", "reference_id": "RHSA-2025:21917", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21917" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21920", "reference_id": "RHSA-2025:21920", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21920" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22006", "reference_id": "RHSA-2025:22006", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22006" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22752", "reference_id": "RHSA-2025:22752", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22752" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22998", "reference_id": "RHSA-2025:22998", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22998" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23445", "reference_id": "RHSA-2025:23445", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23445" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0804", "reference_id": "RHSA-2026:0804", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0804" }, { "reference_url": "https://usn.ubuntu.com/7909-1/", "reference_id": "USN-7909-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7909-1/" }, { "reference_url": "https://usn.ubuntu.com/7909-2/", "reference_id": "USN-7909-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7909-2/" }, { "reference_url": "https://usn.ubuntu.com/7909-3/", "reference_id": "USN-7909-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7909-3/" }, { "reference_url": "https://usn.ubuntu.com/7909-4/", "reference_id": "USN-7909-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7909-4/" }, { "reference_url": "https://usn.ubuntu.com/7909-5/", "reference_id": "USN-7909-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7909-5/" }, { "reference_url": "https://usn.ubuntu.com/7910-1/", "reference_id": "USN-7910-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7910-1/" }, { "reference_url": "https://usn.ubuntu.com/7910-2/", "reference_id": "USN-7910-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7910-2/" }, { "reference_url": "https://usn.ubuntu.com/7933-1/", "reference_id": "USN-7933-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7933-1/" }, { "reference_url": "https://usn.ubuntu.com/7938-1/", "reference_id": "USN-7938-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7938-1/" }, { "reference_url": "https://usn.ubuntu.com/8095-1/", "reference_id": "USN-8095-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-1/" }, { "reference_url": "https://usn.ubuntu.com/8095-2/", "reference_id": "USN-8095-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-2/" }, { "reference_url": "https://usn.ubuntu.com/8095-3/", "reference_id": "USN-8095-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-3/" }, { "reference_url": "https://usn.ubuntu.com/8095-4/", "reference_id": "USN-8095-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-4/" }, { "reference_url": "https://usn.ubuntu.com/8095-5/", "reference_id": "USN-8095-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8095-5/" }, { "reference_url": "https://usn.ubuntu.com/8100-1/", "reference_id": "USN-8100-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8100-1/" }, { "reference_url": "https://usn.ubuntu.com/8125-1/", "reference_id": "USN-8125-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8125-1/" }, { "reference_url": "https://usn.ubuntu.com/8126-1/", "reference_id": "USN-8126-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8126-1/" }, { "reference_url": "https://usn.ubuntu.com/8165-1/", "reference_id": "USN-8165-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8165-1/" }, { "reference_url": "https://usn.ubuntu.com/8261-1/", "reference_id": "USN-8261-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8261-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2025-39697" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-62jz-qpdg-kyhe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67610?format=api", "vulnerability_id": "VCID-657g-4e3s-qbbb", "summary": "kernel: iomap: iomap: fix memory corruption when recording errors during writeback", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50406.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50406.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50406", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.0268", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02705", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02694", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02702", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02725", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02698", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02684", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03592", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03722", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03725", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03718", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03771", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03733", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03753", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03579", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50406" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50406", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50406" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396538", "reference_id": "2396538", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396538" }, { "reference_url": "https://git.kernel.org/stable/c/3d5f3ba1ac28059bdf7000cae2403e4e984308d2", "reference_id": "3d5f3ba1ac28059bdf7000cae2403e4e984308d2", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T19:07:48Z/" } ], "url": "https://git.kernel.org/stable/c/3d5f3ba1ac28059bdf7000cae2403e4e984308d2" }, { "reference_url": "https://git.kernel.org/stable/c/7308591d9c7787aec58f6a01a7823f14e90db7a2", "reference_id": "7308591d9c7787aec58f6a01a7823f14e90db7a2", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T19:07:48Z/" } ], "url": "https://git.kernel.org/stable/c/7308591d9c7787aec58f6a01a7823f14e90db7a2" }, { "reference_url": "https://git.kernel.org/stable/c/82c66c46f73b88be74c869e2cbfef45281adf3c6", "reference_id": "82c66c46f73b88be74c869e2cbfef45281adf3c6", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T19:07:48Z/" } ], "url": "https://git.kernel.org/stable/c/82c66c46f73b88be74c869e2cbfef45281adf3c6" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583", "reference_id": "RHSA-2023:6583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077", "reference_id": "RHSA-2023:7077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21051", "reference_id": "RHSA-2025:21051", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21051" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21084", "reference_id": "RHSA-2025:21084", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21084" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21091", "reference_id": "RHSA-2025:21091", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21091" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21128", "reference_id": "RHSA-2025:21128", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21128" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21136", "reference_id": "RHSA-2025:21136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22998", "reference_id": "RHSA-2025:22998", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22998" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23445", "reference_id": "RHSA-2025:23445", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23445" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23463", "reference_id": "RHSA-2025:23463", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23463" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23947", "reference_id": "RHSA-2025:23947", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23947" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23960", "reference_id": "RHSA-2025:23960", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23960" } ], "fixed_packages": [], "aliases": [ "CVE-2022-50406" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-657g-4e3s-qbbb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67977?format=api", "vulnerability_id": "VCID-6t5m-uuun-fqhe", "summary": "kernel: wifi: mwifiex: Fix OOB and integer underflow when rx packets", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53226.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53226.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53226", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02603", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.0259", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02631", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02611", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02606", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03749", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03649", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03625", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.036", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03575", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03588", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03713", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03717", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.0372", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03767", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.0373", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53226" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53226", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53226" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.kernel.org/stable/c/11958528161731c58e105b501ed60b83a91ea941", "reference_id": "11958528161731c58e105b501ed60b83a91ea941", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:51:16Z/" } ], "url": "https://git.kernel.org/stable/c/11958528161731c58e105b501ed60b83a91ea941" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395420", "reference_id": "2395420", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395420" }, { "reference_url": "https://git.kernel.org/stable/c/29eca8b7863d1d7de6c5b746b374e3487d14f154", "reference_id": "29eca8b7863d1d7de6c5b746b374e3487d14f154", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:51:16Z/" } ], "url": "https://git.kernel.org/stable/c/29eca8b7863d1d7de6c5b746b374e3487d14f154" }, { "reference_url": "https://git.kernel.org/stable/c/3975e21d4d01efaf0296ded40d11c06589c49245", "reference_id": "3975e21d4d01efaf0296ded40d11c06589c49245", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:51:16Z/" } ], "url": "https://git.kernel.org/stable/c/3975e21d4d01efaf0296ded40d11c06589c49245" }, { "reference_url": "https://git.kernel.org/stable/c/3fe3923d092e22d87d1ed03e2729db444b8c1331", "reference_id": "3fe3923d092e22d87d1ed03e2729db444b8c1331", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:51:16Z/" } ], "url": "https://git.kernel.org/stable/c/3fe3923d092e22d87d1ed03e2729db444b8c1331" }, { "reference_url": "https://git.kernel.org/stable/c/650d1bc02fba7b42f476d8b6643324abac5921ed", "reference_id": "650d1bc02fba7b42f476d8b6643324abac5921ed", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:51:16Z/" } ], "url": "https://git.kernel.org/stable/c/650d1bc02fba7b42f476d8b6643324abac5921ed" }, { "reference_url": "https://git.kernel.org/stable/c/7c54b6fc39eb1aac51cf2945f8a25e2a47fdca02", "reference_id": "7c54b6fc39eb1aac51cf2945f8a25e2a47fdca02", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:51:16Z/" } ], "url": "https://git.kernel.org/stable/c/7c54b6fc39eb1aac51cf2945f8a25e2a47fdca02" }, { "reference_url": "https://git.kernel.org/stable/c/8824aa4ab62c800f75d96f48e1883a5f56ec5869", "reference_id": "8824aa4ab62c800f75d96f48e1883a5f56ec5869", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:51:16Z/" } ], "url": "https://git.kernel.org/stable/c/8824aa4ab62c800f75d96f48e1883a5f56ec5869" }, { "reference_url": "https://git.kernel.org/stable/c/a7300e3800e9fd5405e88ce67709c1a97783b9c8", "reference_id": "a7300e3800e9fd5405e88ce67709c1a97783b9c8", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:51:16Z/" } ], "url": "https://git.kernel.org/stable/c/a7300e3800e9fd5405e88ce67709c1a97783b9c8" }, { "reference_url": "https://git.kernel.org/stable/c/f517c97fc129995de77dd06aa5a74f909ebf568f", "reference_id": "f517c97fc129995de77dd06aa5a74f909ebf568f", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:51:16Z/" } ], "url": "https://git.kernel.org/stable/c/f517c97fc129995de77dd06aa5a74f909ebf568f" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19440", "reference_id": "RHSA-2025:19440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19447", "reference_id": "RHSA-2025:19447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21051", "reference_id": "RHSA-2025:21051", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21051" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21091", "reference_id": "RHSA-2025:21091", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21091" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21128", "reference_id": "RHSA-2025:21128", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21128" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21136", "reference_id": "RHSA-2025:21136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22998", "reference_id": "RHSA-2025:22998", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22998" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23000", "reference_id": "RHSA-2025:23000", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23000" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23445", "reference_id": "RHSA-2025:23445", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23445" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23463", "reference_id": "RHSA-2025:23463", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23463" } ], "fixed_packages": [], "aliases": [ "CVE-2023-53226" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6t5m-uuun-fqhe" } ], "fixing_vulnerabilities": [], "risk_score": "3.4", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-477.122.1%3Farch=el8_8" }