Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/92389?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/92389?format=api", "purl": "pkg:rpm/redhat/kernel@4.18.0-372.129.1?arch=el8_6", "type": "rpm", "namespace": "redhat", "name": "kernel", "version": "4.18.0-372.129.1", "qualifiers": { "arch": "el8_6" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77087?format=api", "vulnerability_id": "VCID-c3z1-ngn9-eycs", "summary": "kernel: drm/amdgpu: use-after-free vulnerability", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26656.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26656.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-26656", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.0143", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01331", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01423", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01433", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01438", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01445", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01436", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01338", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01343", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01354", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01359", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01358", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01346", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.0134", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01342", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-26656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26656" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.kernel.org/stable/c/22207fd5c80177b860279653d017474b2812af5e", "reference_id": "22207fd5c80177b860279653d017474b2812af5e", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-02T14:54:50Z/" } ], "url": "https://git.kernel.org/stable/c/22207fd5c80177b860279653d017474b2812af5e" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272692", "reference_id": "2272692", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272692" }, { "reference_url": "https://git.kernel.org/stable/c/22f665ecfd1225afa1309ace623157d12bb9bb0c", "reference_id": "22f665ecfd1225afa1309ace623157d12bb9bb0c", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-02T14:54:50Z/" } ], "url": "https://git.kernel.org/stable/c/22f665ecfd1225afa1309ace623157d12bb9bb0c" }, { "reference_url": "https://git.kernel.org/stable/c/2e13f88e01ae7e28a7e831bf5c2409c4748e0a60", "reference_id": "2e13f88e01ae7e28a7e831bf5c2409c4748e0a60", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-02T14:54:50Z/" } ], "url": "https://git.kernel.org/stable/c/2e13f88e01ae7e28a7e831bf5c2409c4748e0a60" }, { "reference_url": "https://git.kernel.org/stable/c/af054a5fb24a144f99895afce9519d709891894c", "reference_id": "af054a5fb24a144f99895afce9519d709891894c", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-02T14:54:50Z/" } ], "url": "https://git.kernel.org/stable/c/af054a5fb24a144f99895afce9519d709891894c" }, { "reference_url": "https://git.kernel.org/stable/c/e87e08c94c9541b4e18c4c13f2f605935f512605", "reference_id": "e87e08c94c9541b4e18c4c13f2f605935f512605", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-02T14:54:50Z/" } ], "url": "https://git.kernel.org/stable/c/e87e08c94c9541b4e18c4c13f2f605935f512605" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4211", "reference_id": "RHSA-2024:4211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4352", "reference_id": "RHSA-2024:4352", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4352" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4740", "reference_id": "RHSA-2024:4740", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4740" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9315", "reference_id": "RHSA-2024:9315", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9315" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9497", "reference_id": "RHSA-2024:9497", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9497" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9498", "reference_id": "RHSA-2024:9498", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9498" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9500", "reference_id": "RHSA-2024:9500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9546", "reference_id": "RHSA-2024:9546", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9546" }, { "reference_url": "https://usn.ubuntu.com/6816-1/", "reference_id": "USN-6816-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6816-1/" }, { "reference_url": "https://usn.ubuntu.com/6817-1/", "reference_id": "USN-6817-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6817-1/" }, { "reference_url": "https://usn.ubuntu.com/6817-2/", "reference_id": "USN-6817-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6817-2/" }, { "reference_url": "https://usn.ubuntu.com/6817-3/", "reference_id": "USN-6817-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6817-3/" }, { "reference_url": "https://usn.ubuntu.com/6878-1/", "reference_id": "USN-6878-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6878-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2024-26656" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c3z1-ngn9-eycs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73802?format=api", "vulnerability_id": "VCID-e6c8-xx93-vbcx", "summary": "kernel: mptcp: pm: Fix uaf in __timer_delete_sync", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46858.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46858.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-46858", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04237", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04038", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04026", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.0416", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04172", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04191", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04232", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.0421", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04034", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04053", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04068", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04073", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04092", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04075", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04063", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-46858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46858", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46858" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.kernel.org/stable/c/0e7814b028cd50b3ff79659d23dfa9da6a1e75e1", "reference_id": "0e7814b028cd50b3ff79659d23dfa9da6a1e75e1", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-29T13:57:46Z/" } ], "url": "https://git.kernel.org/stable/c/0e7814b028cd50b3ff79659d23dfa9da6a1e75e1" }, { "reference_url": "https://git.kernel.org/stable/c/12134a652b0a10064844ea235173e70246eba6dc", "reference_id": "12134a652b0a10064844ea235173e70246eba6dc", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-29T13:57:46Z/" } ], "url": "https://git.kernel.org/stable/c/12134a652b0a10064844ea235173e70246eba6dc" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2315210", "reference_id": "2315210", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2315210" }, { "reference_url": "https://git.kernel.org/stable/c/3554482f4691571fc4b5490c17ae26896e62171c", "reference_id": "3554482f4691571fc4b5490c17ae26896e62171c", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-29T13:57:46Z/" } ], "url": "https://git.kernel.org/stable/c/3554482f4691571fc4b5490c17ae26896e62171c" }, { "reference_url": "https://git.kernel.org/stable/c/6452b162549c7f9ef54655d3fb9977b9192e6e5b", "reference_id": "6452b162549c7f9ef54655d3fb9977b9192e6e5b", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-29T13:57:46Z/" } ], "url": "https://git.kernel.org/stable/c/6452b162549c7f9ef54655d3fb9977b9192e6e5b" }, { "reference_url": "https://git.kernel.org/stable/c/67409b358500c71632116356a0b065f112d7b707", "reference_id": "67409b358500c71632116356a0b065f112d7b707", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-29T13:57:46Z/" } ], "url": "https://git.kernel.org/stable/c/67409b358500c71632116356a0b065f112d7b707" }, { "reference_url": "https://git.kernel.org/stable/c/b4cd80b0338945a94972ac3ed54f8338d2da2076", "reference_id": "b4cd80b0338945a94972ac3ed54f8338d2da2076", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-29T13:57:46Z/" } ], "url": "https://git.kernel.org/stable/c/b4cd80b0338945a94972ac3ed54f8338d2da2076" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10262", "reference_id": "RHSA-2024:10262", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10262" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10265", "reference_id": "RHSA-2024:10265", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10265" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10281", "reference_id": "RHSA-2024:10281", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10281" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9497", "reference_id": "RHSA-2024:9497", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9497" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9498", "reference_id": "RHSA-2024:9498", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9498" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9500", "reference_id": "RHSA-2024:9500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9546", "reference_id": "RHSA-2024:9546", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9546" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9605", "reference_id": "RHSA-2024:9605", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9605" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9942", "reference_id": "RHSA-2024:9942", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9942" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9943", "reference_id": "RHSA-2024:9943", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9943" }, { "reference_url": "https://usn.ubuntu.com/7154-1/", "reference_id": "USN-7154-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7154-1/" }, { "reference_url": "https://usn.ubuntu.com/7154-2/", "reference_id": "USN-7154-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7154-2/" }, { "reference_url": "https://usn.ubuntu.com/7155-1/", "reference_id": "USN-7155-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7155-1/" }, { "reference_url": "https://usn.ubuntu.com/7156-1/", "reference_id": "USN-7156-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7156-1/" }, { "reference_url": "https://usn.ubuntu.com/7166-1/", "reference_id": "USN-7166-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7166-1/" }, { "reference_url": "https://usn.ubuntu.com/7166-2/", "reference_id": "USN-7166-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7166-2/" }, { "reference_url": "https://usn.ubuntu.com/7166-3/", "reference_id": "USN-7166-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7166-3/" }, { "reference_url": "https://usn.ubuntu.com/7166-4/", "reference_id": "USN-7166-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7166-4/" }, { "reference_url": "https://usn.ubuntu.com/7186-1/", "reference_id": "USN-7186-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7186-1/" }, { "reference_url": "https://usn.ubuntu.com/7186-2/", "reference_id": "USN-7186-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7186-2/" }, { "reference_url": "https://usn.ubuntu.com/7194-1/", "reference_id": "USN-7194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7194-1/" }, { "reference_url": "https://usn.ubuntu.com/7196-1/", "reference_id": "USN-7196-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7196-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2024-46858" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e6c8-xx93-vbcx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76479?format=api", "vulnerability_id": "VCID-guqa-19j6-bba4", "summary": "kernel: scsi: mpt3sas: Fix use-after-free warning", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48695.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48695.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-48695", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04582", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04906", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04636", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04585", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04594", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04732", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04769", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04804", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04827", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04824", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04861", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04602", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04609", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04644", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04659", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04654", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-48695" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48695", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48695" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278999", "reference_id": "2278999", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278999" }, { "reference_url": "https://git.kernel.org/stable/c/41acb064c4e013808bc7d5fc1b506fa449425b0b", "reference_id": "41acb064c4e013808bc7d5fc1b506fa449425b0b", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:45Z/" } ], "url": "https://git.kernel.org/stable/c/41acb064c4e013808bc7d5fc1b506fa449425b0b" }, { "reference_url": "https://git.kernel.org/stable/c/5682c94644fde72f72bded6580c38189ffc856b5", "reference_id": "5682c94644fde72f72bded6580c38189ffc856b5", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:45Z/" } ], "url": "https://git.kernel.org/stable/c/5682c94644fde72f72bded6580c38189ffc856b5" }, { "reference_url": "https://git.kernel.org/stable/c/6229fa494a5949be209bc73afbc5d0a749c2e3c7", "reference_id": "6229fa494a5949be209bc73afbc5d0a749c2e3c7", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:45Z/" } ], "url": "https://git.kernel.org/stable/c/6229fa494a5949be209bc73afbc5d0a749c2e3c7" }, { "reference_url": "https://git.kernel.org/stable/c/82efb917eeb27454dc4c6fe26432fc8f6c75bc16", "reference_id": "82efb917eeb27454dc4c6fe26432fc8f6c75bc16", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:45Z/" } ], "url": "https://git.kernel.org/stable/c/82efb917eeb27454dc4c6fe26432fc8f6c75bc16" }, { "reference_url": "https://git.kernel.org/stable/c/991df3dd5144f2e6b1c38b8d20ed3d4d21e20b34", "reference_id": "991df3dd5144f2e6b1c38b8d20ed3d4d21e20b34", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:45Z/" } ], "url": "https://git.kernel.org/stable/c/991df3dd5144f2e6b1c38b8d20ed3d4d21e20b34" }, { "reference_url": "https://git.kernel.org/stable/c/b8fc9e91b931215110ba824d1a2983c5f60b6f82", "reference_id": "b8fc9e91b931215110ba824d1a2983c5f60b6f82", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:45Z/" } ], "url": "https://git.kernel.org/stable/c/b8fc9e91b931215110ba824d1a2983c5f60b6f82" }, { "reference_url": "https://git.kernel.org/stable/c/d4959d09b76eb7a4146f5133962b88d3bddb63d6", "reference_id": "d4959d09b76eb7a4146f5133962b88d3bddb63d6", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:45Z/" } ], "url": "https://git.kernel.org/stable/c/d4959d09b76eb7a4146f5133962b88d3bddb63d6" }, { "reference_url": "https://git.kernel.org/stable/c/ea10a652ad2ae2cf3eced6f632a5c98f26727057", "reference_id": "ea10a652ad2ae2cf3eced6f632a5c98f26727057", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:39:45Z/" } ], "url": "https://git.kernel.org/stable/c/ea10a652ad2ae2cf3eced6f632a5c98f26727057" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2148", "reference_id": "RHSA-2023:2148", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2458", "reference_id": "RHSA-2023:2458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2736", "reference_id": "RHSA-2023:2736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951", "reference_id": "RHSA-2023:2951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9500", "reference_id": "RHSA-2024:9500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9500" } ], "fixed_packages": [], "aliases": [ "CVE-2022-48695" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-guqa-19j6-bba4" } ], "fixing_vulnerabilities": [], "risk_score": "3.1", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-372.129.1%3Farch=el8_6" }