Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/94251?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/94251?format=api", "purl": "pkg:rpm/redhat/kernel@4.18.0-372.93.1?arch=el8_6", "type": "rpm", "namespace": "redhat", "name": "kernel", "version": "4.18.0-372.93.1", "qualifiers": { "arch": "el8_6" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78508?format=api", "vulnerability_id": "VCID-2n9k-dqfk-gkb9", "summary": "kernel: blocking operation in dvb_frontend_get_event and wait_event_interruptible", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-31084.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-31084.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-31084", "reference_id": "", "reference_type": "", "scores": [ { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00829", "published_at": "2026-04-04T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00861", "published_at": "2026-05-07T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.0083", "published_at": "2026-04-07T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00834", "published_at": "2026-04-08T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00831", "published_at": "2026-04-09T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.0082", "published_at": "2026-04-18T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00815", "published_at": "2026-04-16T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00816", "published_at": "2026-04-13T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00865", "published_at": "2026-04-21T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00867", "published_at": "2026-05-05T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00869", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-31084" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213139", "reference_id": "2213139", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213139" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6HIEOLEOURP4BJZMIL7UGGPYRRB44UDN/", "reference_id": "6HIEOLEOURP4BJZMIL7UGGPYRRB44UDN", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6HIEOLEOURP4BJZMIL7UGGPYRRB44UDN/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AOATNX5UFL7V7W2QDIQKOHFFHYKWFP4W/", "reference_id": "AOATNX5UFL7V7W2QDIQKOHFFHYKWFP4W", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AOATNX5UFL7V7W2QDIQKOHFFHYKWFP4W/" }, { "reference_url": "https://lore.kernel.org/all/CA+UBctCu7fXn4q41O_3=id1+OdyQ85tZY1x+TkT-6OVBL6KAUw%40mail.gmail.com/", "reference_id": "CA+UBctCu7fXn4q41O_3=id1+OdyQ85tZY1x+TkT-6OVBL6KAUw%40mail.gmail.com", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/" } ], "url": "https://lore.kernel.org/all/CA+UBctCu7fXn4q41O_3=id1+OdyQ85tZY1x+TkT-6OVBL6KAUw%40mail.gmail.com/" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5448", "reference_id": "dsa-5448", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5448" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5480", "reference_id": "dsa-5480", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5480" }, { "reference_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b8c75e4a1b325ea0a9433fa8834be97b5836b946", "reference_id": "?id=b8c75e4a1b325ea0a9433fa8834be97b5836b946", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/" } ], "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b8c75e4a1b325ea0a9433fa8834be97b5836b946" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html", "reference_id": "msg00027.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html", "reference_id": "msg00030.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230929-0003/", "reference_id": "ntap-20230929-0003", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230929-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901", "reference_id": "RHSA-2023:6901", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6901" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077", "reference_id": "RHSA-2023:7077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0930", "reference_id": "RHSA-2024:0930", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0930" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1404", "reference_id": "RHSA-2024:1404", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1404" }, { "reference_url": "https://usn.ubuntu.com/6231-1/", "reference_id": "USN-6231-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6231-1/" }, { "reference_url": "https://usn.ubuntu.com/6309-1/", "reference_id": "USN-6309-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6309-1/" }, { "reference_url": "https://usn.ubuntu.com/6327-1/", "reference_id": "USN-6327-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6327-1/" }, { "reference_url": "https://usn.ubuntu.com/6338-1/", "reference_id": "USN-6338-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6338-1/" }, { "reference_url": "https://usn.ubuntu.com/6338-2/", "reference_id": "USN-6338-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6338-2/" }, { "reference_url": "https://usn.ubuntu.com/6339-1/", "reference_id": "USN-6339-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6339-1/" }, { "reference_url": "https://usn.ubuntu.com/6339-2/", "reference_id": "USN-6339-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6339-2/" }, { "reference_url": "https://usn.ubuntu.com/6339-3/", "reference_id": "USN-6339-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6339-3/" }, { "reference_url": "https://usn.ubuntu.com/6339-4/", "reference_id": "USN-6339-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6339-4/" }, { "reference_url": "https://usn.ubuntu.com/6340-1/", "reference_id": "USN-6340-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6340-1/" }, { "reference_url": "https://usn.ubuntu.com/6340-2/", "reference_id": "USN-6340-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6340-2/" }, { "reference_url": "https://usn.ubuntu.com/6342-1/", "reference_id": "USN-6342-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6342-1/" }, { "reference_url": "https://usn.ubuntu.com/6342-2/", "reference_id": "USN-6342-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6342-2/" }, { "reference_url": "https://usn.ubuntu.com/6344-1/", "reference_id": "USN-6344-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6344-1/" }, { "reference_url": "https://usn.ubuntu.com/6349-1/", "reference_id": "USN-6349-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6349-1/" }, { "reference_url": "https://usn.ubuntu.com/6350-1/", "reference_id": "USN-6350-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6350-1/" }, { "reference_url": "https://usn.ubuntu.com/6351-1/", "reference_id": "USN-6351-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6351-1/" }, { "reference_url": "https://usn.ubuntu.com/6357-1/", "reference_id": "USN-6357-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6357-1/" }, { "reference_url": "https://usn.ubuntu.com/6397-1/", "reference_id": "USN-6397-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6397-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-31084" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2n9k-dqfk-gkb9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79048?format=api", "vulnerability_id": "VCID-4gq7-1egy-p7a4", "summary": "kernel: vmwgfx: use-after-free in vmw_cmd_res_check", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38457.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38457.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38457", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.129", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.1289", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12969", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.1302", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.1298", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12944", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.128", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12803", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13192", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13095", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13448", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13513", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13249", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13315", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13322", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13295", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38457" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38457", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38457" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133455", "reference_id": "2133455", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133455" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583", "reference_id": "RHSA-2023:6583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901", "reference_id": "RHSA-2023:6901", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6901" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077", "reference_id": "RHSA-2023:7077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0930", "reference_id": "RHSA-2024:0930", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0930" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1404", "reference_id": "RHSA-2024:1404", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1404" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4823", "reference_id": "RHSA-2024:4823", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4823" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4831", "reference_id": "RHSA-2024:4831", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4831" } ], "fixed_packages": [], "aliases": [ "CVE-2022-38457" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4gq7-1egy-p7a4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79520?format=api", "vulnerability_id": "VCID-4w5c-d8pd-uqeb", "summary": "kernel: use-after-free due to improper update of reference count in net/sched/cls_u32.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29581.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29581.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29581", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.39978", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40296", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.4022", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40141", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40128", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40047", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.3991", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40337", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.403", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.4028", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40327", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42113", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42163", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42175", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.60155", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.60181", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088021", "reference_id": "2088021", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088021" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7444", "reference_id": "RHSA-2022:7444", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7444" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7683", "reference_id": "RHSA-2022:7683", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7683" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7933", "reference_id": "RHSA-2022:7933", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7933" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8267", "reference_id": "RHSA-2022:8267", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8267" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0930", "reference_id": "RHSA-2024:0930", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0930" }, { "reference_url": "https://usn.ubuntu.com/5442-1/", "reference_id": "USN-5442-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5442-1/" }, { "reference_url": "https://usn.ubuntu.com/5442-2/", "reference_id": "USN-5442-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5442-2/" }, { "reference_url": "https://usn.ubuntu.com/5443-1/", "reference_id": "USN-5443-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5443-1/" }, { "reference_url": "https://usn.ubuntu.com/5443-2/", "reference_id": "USN-5443-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5443-2/" }, { "reference_url": "https://usn.ubuntu.com/5444-1/", "reference_id": "USN-5444-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5444-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-29581" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4w5c-d8pd-uqeb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79284?format=api", "vulnerability_id": "VCID-58sv-d9e3-rfbf", "summary": "kernel: malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33655.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33655.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33655", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06243", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06641", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06455", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.0647", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06492", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06504", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06513", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06277", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.0631", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06291", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06337", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06378", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06371", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06366", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06355", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06293", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06306", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33655" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108691", "reference_id": "2108691", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108691" }, { "reference_url": "https://security.archlinux.org/AVG-2772", "reference_id": "AVG-2772", "reference_type": "", "scores": [ { "value": "Unknown", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2772" }, { "reference_url": "https://security.archlinux.org/AVG-2773", "reference_id": "AVG-2773", "reference_type": "", "scores": [ { "value": "Unknown", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2773" }, { "reference_url": "https://security.archlinux.org/AVG-2774", "reference_id": "AVG-2774", "reference_type": "", "scores": [ { "value": "Unknown", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2774" }, { "reference_url": "https://security.archlinux.org/AVG-2775", "reference_id": "AVG-2775", "reference_type": "", "scores": [ { "value": "Unknown", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2775" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2148", "reference_id": "RHSA-2023:2148", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2458", "reference_id": "RHSA-2023:2458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2736", "reference_id": "RHSA-2023:2736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951", "reference_id": "RHSA-2023:2951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0930", "reference_id": "RHSA-2024:0930", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0930" }, { "reference_url": "https://usn.ubuntu.com/5577-1/", "reference_id": "USN-5577-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5577-1/" }, { "reference_url": "https://usn.ubuntu.com/5580-1/", "reference_id": "USN-5580-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5580-1/" }, { "reference_url": "https://usn.ubuntu.com/5596-1/", "reference_id": "USN-5596-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5596-1/" }, { "reference_url": "https://usn.ubuntu.com/5621-1/", "reference_id": "USN-5621-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5621-1/" }, { "reference_url": "https://usn.ubuntu.com/5622-1/", "reference_id": "USN-5622-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5622-1/" }, { "reference_url": "https://usn.ubuntu.com/5623-1/", "reference_id": "USN-5623-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5623-1/" }, { "reference_url": "https://usn.ubuntu.com/5624-1/", "reference_id": "USN-5624-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5624-1/" }, { "reference_url": "https://usn.ubuntu.com/5630-1/", "reference_id": "USN-5630-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5630-1/" }, { "reference_url": "https://usn.ubuntu.com/5633-1/", "reference_id": "USN-5633-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5633-1/" }, { "reference_url": "https://usn.ubuntu.com/5635-1/", "reference_id": "USN-5635-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5635-1/" }, { "reference_url": "https://usn.ubuntu.com/5639-1/", "reference_id": "USN-5639-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5639-1/" }, { "reference_url": "https://usn.ubuntu.com/5640-1/", "reference_id": "USN-5640-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5640-1/" }, { "reference_url": "https://usn.ubuntu.com/5644-1/", "reference_id": "USN-5644-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5644-1/" }, { "reference_url": "https://usn.ubuntu.com/5647-1/", "reference_id": "USN-5647-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5647-1/" }, { "reference_url": "https://usn.ubuntu.com/5648-1/", "reference_id": "USN-5648-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5648-1/" }, { "reference_url": "https://usn.ubuntu.com/5650-1/", "reference_id": "USN-5650-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5650-1/" }, { "reference_url": "https://usn.ubuntu.com/5652-1/", "reference_id": "USN-5652-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5652-1/" }, { "reference_url": "https://usn.ubuntu.com/5654-1/", "reference_id": "USN-5654-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5654-1/" }, { "reference_url": "https://usn.ubuntu.com/5655-1/", "reference_id": "USN-5655-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5655-1/" }, { "reference_url": "https://usn.ubuntu.com/5660-1/", "reference_id": "USN-5660-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5660-1/" }, { "reference_url": "https://usn.ubuntu.com/5683-1/", "reference_id": "USN-5683-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5683-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-33655" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-58sv-d9e3-rfbf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79037?format=api", "vulnerability_id": "VCID-5yqp-43hw-cuhu", "summary": "kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38096.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38096.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38096", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10633", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10463", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10537", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10604", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.106", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10576", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10445", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10427", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10871", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10892", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10793", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10737", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10977", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11039", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10937", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10851", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38096" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38096", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38096" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133452", "reference_id": "2133452", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133452" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "reference_id": "msg00017.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T13:45:25Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0930", "reference_id": "RHSA-2024:0930", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0930" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1018", "reference_id": "RHSA-2024:1018", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1018" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1019", "reference_id": "RHSA-2024:1019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1250", "reference_id": "RHSA-2024:1250", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1250" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1268", "reference_id": "RHSA-2024:1268", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1268" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1269", "reference_id": "RHSA-2024:1269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1269" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1306", "reference_id": "RHSA-2024:1306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1367", "reference_id": "RHSA-2024:1367", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1367" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1382", "reference_id": "RHSA-2024:1382", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1382" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1404", "reference_id": "RHSA-2024:1404", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1404" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1607", "reference_id": "RHSA-2024:1607", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1607" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1614", "reference_id": "RHSA-2024:1614", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1614" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2093", "reference_id": "RHSA-2024:2093", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2093" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2394", "reference_id": "RHSA-2024:2394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2394" }, { "reference_url": "https://bugzilla.openanolis.cn/show_bug.cgi?id=2073", "reference_id": "show_bug.cgi?id=2073", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T13:45:25Z/" } ], "url": "https://bugzilla.openanolis.cn/show_bug.cgi?id=2073" }, { "reference_url": "https://usn.ubuntu.com/6816-1/", "reference_id": "USN-6816-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6816-1/" }, { "reference_url": "https://usn.ubuntu.com/6817-1/", "reference_id": "USN-6817-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6817-1/" }, { "reference_url": "https://usn.ubuntu.com/6817-2/", "reference_id": "USN-6817-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6817-2/" }, { "reference_url": "https://usn.ubuntu.com/6817-3/", "reference_id": "USN-6817-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6817-3/" }, { "reference_url": "https://usn.ubuntu.com/6878-1/", "reference_id": "USN-6878-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6878-1/" }, { "reference_url": "https://usn.ubuntu.com/6898-1/", "reference_id": "USN-6898-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6898-1/" }, { "reference_url": "https://usn.ubuntu.com/6898-2/", "reference_id": "USN-6898-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6898-2/" }, { "reference_url": "https://usn.ubuntu.com/6898-3/", "reference_id": "USN-6898-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6898-3/" }, { "reference_url": "https://usn.ubuntu.com/6898-4/", "reference_id": "USN-6898-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6898-4/" }, { "reference_url": "https://usn.ubuntu.com/6917-1/", "reference_id": "USN-6917-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6917-1/" }, { "reference_url": "https://usn.ubuntu.com/6919-1/", "reference_id": "USN-6919-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6919-1/" }, { "reference_url": "https://usn.ubuntu.com/6927-1/", "reference_id": "USN-6927-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6927-1/" }, { "reference_url": "https://usn.ubuntu.com/7019-1/", "reference_id": "USN-7019-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7019-1/" }, { "reference_url": "https://usn.ubuntu.com/7173-1/", "reference_id": "USN-7173-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7173-1/" }, { "reference_url": "https://usn.ubuntu.com/7173-2/", "reference_id": "USN-7173-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7173-2/" }, { "reference_url": "https://usn.ubuntu.com/7173-3/", "reference_id": "USN-7173-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7173-3/" }, { "reference_url": "https://usn.ubuntu.com/7195-1/", "reference_id": "USN-7195-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7195-1/" }, { "reference_url": "https://usn.ubuntu.com/7195-2/", "reference_id": "USN-7195-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7195-2/" }, { "reference_url": "https://usn.ubuntu.com/7413-1/", "reference_id": "USN-7413-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7413-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-38096" ], "risk_score": 2.9, "exploitability": "0.5", "weighted_severity": "5.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5yqp-43hw-cuhu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77789?format=api", "vulnerability_id": "VCID-5zmf-5v9v-k3h1", "summary": "kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51042.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51042.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-51042", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0907", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09151", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09122", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09153", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0912", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09105", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09001", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0898", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09136", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09179", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09123", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09042", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10096", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10153", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11062", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-51042" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51042", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51042" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259866", "reference_id": "2259866", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259866" }, { "reference_url": "https://github.com/torvalds/linux/commit/2e54154b9f27262efd0cb4f903cc7d5ad1fe9628", "reference_id": "2e54154b9f27262efd0cb4f903cc7d5ad1fe9628", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:10Z/" } ], "url": "https://github.com/torvalds/linux/commit/2e54154b9f27262efd0cb4f903cc7d5ad1fe9628" }, { "reference_url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.12", "reference_id": "ChangeLog-6.4.12", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:10Z/" } ], "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.12" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0930", "reference_id": "RHSA-2024:0930", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0930" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1018", "reference_id": "RHSA-2024:1018", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1018" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1019", "reference_id": "RHSA-2024:1019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1248", "reference_id": "RHSA-2024:1248", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1248" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1404", "reference_id": "RHSA-2024:1404", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1404" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1607", "reference_id": "RHSA-2024:1607", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1607" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1614", "reference_id": "RHSA-2024:1614", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1614" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2093", "reference_id": "RHSA-2024:2093", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2093" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2094", "reference_id": "RHSA-2024:2094", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2094" } ], "fixed_packages": [], "aliases": [ "CVE-2023-51042" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5zmf-5v9v-k3h1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79645?format=api", "vulnerability_id": "VCID-7e2m-a86y-c3bd", "summary": "kernel: media: em28xx: initialize refcount before kref_get", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3239.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3239.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3239", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07568", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07455", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07588", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07549", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07539", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07509", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07504", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07466", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07505", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07487", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07546", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07554", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07542", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08767", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3239" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3239", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3239" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127985", "reference_id": "2127985", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127985" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7933", "reference_id": "RHSA-2022:7933", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7933" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8267", "reference_id": "RHSA-2022:8267", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8267" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2736", "reference_id": "RHSA-2023:2736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951", "reference_id": "RHSA-2023:2951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0930", "reference_id": "RHSA-2024:0930", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0930" }, { "reference_url": "https://usn.ubuntu.com/5757-1/", "reference_id": "USN-5757-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5757-1/" }, { "reference_url": "https://usn.ubuntu.com/5757-2/", "reference_id": "USN-5757-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5757-2/" }, { "reference_url": "https://usn.ubuntu.com/5758-1/", "reference_id": "USN-5758-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5758-1/" }, { "reference_url": "https://usn.ubuntu.com/5774-1/", "reference_id": "USN-5774-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5774-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-3239" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7e2m-a86y-c3bd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78720?format=api", "vulnerability_id": "VCID-86j6-rxsj-jucj", "summary": "kernel: sctp: fail if no bound addresses can be used for a given scope", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1074.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1074.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1074", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01603", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01609", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01594", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01618", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01611", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01592", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.01974", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02018", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02004", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02001", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02031", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.01981", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02421", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02428", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1074" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1074", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1074" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.openwall.com/lists/oss-security/2023/01/23/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:31Z/" } ], "url": "https://www.openwall.com/lists/oss-security/2023/01/23/1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173430", "reference_id": "2173430", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:31Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173430" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/11/05/4", "reference_id": "4", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:31Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/11/05/4" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=458e279f861d3f61796894cd158b780765a1569f", "reference_id": "?id=458e279f861d3f61796894cd158b780765a1569f", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:31Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=458e279f861d3f61796894cd158b780765a1569f" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html", "reference_id": "msg00005.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:31Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html", "reference_id": "msg00006.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:31Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583", "reference_id": "RHSA-2023:6583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901", "reference_id": "RHSA-2023:6901", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6901" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077", "reference_id": "RHSA-2023:7077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0723", "reference_id": "RHSA-2024:0723", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0723" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0725", "reference_id": "RHSA-2024:0725", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0725" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0930", "reference_id": "RHSA-2024:0930", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0930" }, { "reference_url": "https://usn.ubuntu.com/5978-1/", "reference_id": "USN-5978-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5978-1/" }, { "reference_url": "https://usn.ubuntu.com/6001-1/", "reference_id": "USN-6001-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6001-1/" }, { "reference_url": "https://usn.ubuntu.com/6013-1/", "reference_id": "USN-6013-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6013-1/" }, { "reference_url": "https://usn.ubuntu.com/6014-1/", "reference_id": "USN-6014-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6014-1/" }, { "reference_url": "https://usn.ubuntu.com/6025-1/", "reference_id": "USN-6025-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6025-1/" }, { "reference_url": "https://usn.ubuntu.com/6027-1/", "reference_id": "USN-6027-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6027-1/" }, { "reference_url": "https://usn.ubuntu.com/6029-1/", "reference_id": "USN-6029-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6029-1/" }, { "reference_url": "https://usn.ubuntu.com/6030-1/", "reference_id": "USN-6030-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6030-1/" }, { "reference_url": "https://usn.ubuntu.com/6031-1/", "reference_id": "USN-6031-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6031-1/" }, { "reference_url": "https://usn.ubuntu.com/6032-1/", "reference_id": "USN-6032-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6032-1/" }, { "reference_url": "https://usn.ubuntu.com/6040-1/", "reference_id": "USN-6040-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6040-1/" }, { "reference_url": "https://usn.ubuntu.com/6057-1/", "reference_id": "USN-6057-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6057-1/" }, { "reference_url": "https://usn.ubuntu.com/6079-1/", "reference_id": "USN-6079-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6079-1/" }, { "reference_url": "https://usn.ubuntu.com/6091-1/", "reference_id": "USN-6091-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6091-1/" }, { "reference_url": "https://usn.ubuntu.com/6093-1/", "reference_id": "USN-6093-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6093-1/" }, { "reference_url": "https://usn.ubuntu.com/6096-1/", "reference_id": "USN-6096-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6096-1/" }, { "reference_url": "https://usn.ubuntu.com/6134-1/", "reference_id": "USN-6134-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6134-1/" }, { "reference_url": "https://usn.ubuntu.com/6222-1/", "reference_id": "USN-6222-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6222-1/" }, { "reference_url": "https://usn.ubuntu.com/6256-1/", "reference_id": "USN-6256-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6256-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-1074" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-86j6-rxsj-jucj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78529?format=api", "vulnerability_id": "VCID-8uzn-q3h8-8qfs", "summary": "kernel: KVM: nVMX: missing consistency checks for CR0 and CR4", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-30456.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-30456.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-30456", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01352", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01347", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.0134", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.01901", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.01963", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.01911", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03246", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03233", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03295", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03267", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03223", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03272", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03282", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03291", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03297", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03318", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-30456" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30456", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30456" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/torvalds/linux/commit/112e66017bff7f2837030f34c2bc19501e9212d5", "reference_id": "112e66017bff7f2837030f34c2bc19501e9212d5", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/" } ], "url": "https://github.com/torvalds/linux/commit/112e66017bff7f2837030f34c2bc19501e9212d5" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2188468", "reference_id": "2188468", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2188468" }, { "reference_url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.8", "reference_id": "ChangeLog-6.2.8", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/" } ], "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.8" }, { "reference_url": "http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html", "reference_id": "Kernel-Live-Patch-Security-Notice-LSN-0096-1.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/" } ], "url": "http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html", "reference_id": "msg00005.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html", "reference_id": "msg00006.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230511-0007/", "reference_id": "ntap-20230511-0007", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230511-0007/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583", "reference_id": "RHSA-2023:6583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901", "reference_id": "RHSA-2023:6901", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6901" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077", "reference_id": "RHSA-2023:7077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0930", "reference_id": "RHSA-2024:0930", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0930" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1404", "reference_id": "RHSA-2024:1404", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1404" }, { "reference_url": "https://usn.ubuntu.com/6033-1/", "reference_id": "USN-6033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6033-1/" }, { "reference_url": "https://usn.ubuntu.com/6123-1/", "reference_id": "USN-6123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6123-1/" }, { "reference_url": "https://usn.ubuntu.com/6124-1/", "reference_id": "USN-6124-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6124-1/" }, { "reference_url": "https://usn.ubuntu.com/6127-1/", "reference_id": "USN-6127-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6127-1/" }, { "reference_url": "https://usn.ubuntu.com/6130-1/", "reference_id": "USN-6130-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6130-1/" }, { "reference_url": "https://usn.ubuntu.com/6131-1/", "reference_id": "USN-6131-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6131-1/" }, { "reference_url": "https://usn.ubuntu.com/6132-1/", "reference_id": "USN-6132-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6132-1/" }, { "reference_url": "https://usn.ubuntu.com/6135-1/", "reference_id": "USN-6135-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6135-1/" }, { "reference_url": "https://usn.ubuntu.com/6149-1/", "reference_id": "USN-6149-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6149-1/" }, { "reference_url": "https://usn.ubuntu.com/6150-1/", "reference_id": "USN-6150-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6150-1/" }, { "reference_url": "https://usn.ubuntu.com/6162-1/", "reference_id": "USN-6162-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6162-1/" }, { "reference_url": "https://usn.ubuntu.com/6175-1/", "reference_id": "USN-6175-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6175-1/" }, { "reference_url": "https://usn.ubuntu.com/6186-1/", "reference_id": "USN-6186-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6186-1/" }, { "reference_url": "https://usn.ubuntu.com/6222-1/", "reference_id": "USN-6222-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6222-1/" }, { "reference_url": "https://usn.ubuntu.com/6256-1/", "reference_id": "USN-6256-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6256-1/" }, { "reference_url": "https://usn.ubuntu.com/6699-1/", "reference_id": "USN-6699-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6699-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-30456" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8uzn-q3h8-8qfs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79586?format=api", "vulnerability_id": "VCID-bdpj-gk16-a3dz", "summary": "kernel: net/packet: slab-out-of-bounds access in packet_recvmsg()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-20368.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-20368.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-20368", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16103", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16204", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16223", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16261", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16153", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16151", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16112", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.15989", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21019", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.2092", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20942", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20974", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21093", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21147", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20861", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20941", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21003", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-20368" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20368", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20368" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123695", "reference_id": "2123695", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123695" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7444", "reference_id": "RHSA-2022:7444", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7444" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7683", "reference_id": "RHSA-2022:7683", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7683" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7933", "reference_id": "RHSA-2022:7933", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7933" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8267", "reference_id": "RHSA-2022:8267", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8267" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0930", "reference_id": "RHSA-2024:0930", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0930" }, { "reference_url": "https://usn.ubuntu.com/5580-1/", "reference_id": "USN-5580-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5580-1/" }, { "reference_url": "https://usn.ubuntu.com/5650-1/", "reference_id": "USN-5650-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5650-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-20368" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bdpj-gk16-a3dz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77884?format=api", "vulnerability_id": "VCID-cavt-1v84-uqgt", "summary": "kernel: GSM multiplexing race condition leads to privilege escalation", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6546.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6546.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6546", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55796", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55818", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55798", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55849", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55852", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55861", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55841", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55822", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55859", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55862", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55751", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55704", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56524", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56543", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56525", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56589", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6546" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255498", "reference_id": "2255498", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255498" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0930", "reference_id": "RHSA-2024:0930", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0930" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0937", "reference_id": "RHSA-2024:0937", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0937" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1018", "reference_id": "RHSA-2024:1018", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1018" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1019", "reference_id": "RHSA-2024:1019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1055", "reference_id": "RHSA-2024:1055", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1055" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1250", "reference_id": "RHSA-2024:1250", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1250" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1253", "reference_id": "RHSA-2024:1253", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1253" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1306", "reference_id": "RHSA-2024:1306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1607", "reference_id": "RHSA-2024:1607", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1607" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1612", "reference_id": "RHSA-2024:1612", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1612" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1614", "reference_id": "RHSA-2024:1614", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1614" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2093", "reference_id": "RHSA-2024:2093", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2093" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2394", "reference_id": "RHSA-2024:2394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2621", "reference_id": "RHSA-2024:2621", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2621" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2697", "reference_id": "RHSA-2024:2697", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2697" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4577", "reference_id": "RHSA-2024:4577", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4577" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4729", "reference_id": "RHSA-2024:4729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4729" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4731", "reference_id": "RHSA-2024:4731", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4731" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4970", "reference_id": "RHSA-2024:4970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4970" } ], "fixed_packages": [], "aliases": [ "CVE-2023-6546" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cavt-1v84-uqgt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79042?format=api", "vulnerability_id": "VCID-gpdn-rup2-7fey", "summary": "kernel: vmwgfx: use-after-free in vmw_execbuf_tie_context", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40133.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40133.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-40133", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.129", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.1289", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12969", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.1302", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.1298", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12944", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.128", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12803", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13192", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13095", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13448", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13513", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13249", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13315", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13322", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13295", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-40133" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40133", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40133" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133453", "reference_id": "2133453", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133453" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583", "reference_id": "RHSA-2023:6583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6901", "reference_id": "RHSA-2023:6901", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6901" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077", "reference_id": "RHSA-2023:7077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0930", "reference_id": "RHSA-2024:0930", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0930" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1404", "reference_id": "RHSA-2024:1404", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1404" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4823", "reference_id": "RHSA-2024:4823", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4823" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4831", "reference_id": "RHSA-2024:4831", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4831" } ], "fixed_packages": [], "aliases": [ "CVE-2022-40133" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gpdn-rup2-7fey" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79605?format=api", "vulnerability_id": "VCID-k4hm-xb4b-cbaw", "summary": "hw: cpu: arm64: Spectre-BHB", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23960.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23960.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23960", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41419", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41447", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41375", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41425", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41433", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41453", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41421", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41449", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41348", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41239", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41233", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41406", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45394", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45457", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45499", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23960" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062284", "reference_id": "2062284", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062284" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7683", "reference_id": "RHSA-2022:7683", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7683" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0930", "reference_id": "RHSA-2024:0930", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0930" }, { "reference_url": "https://usn.ubuntu.com/5317-1/", "reference_id": "USN-5317-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5317-1/" }, { "reference_url": "https://usn.ubuntu.com/5318-1/", "reference_id": "USN-5318-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5318-1/" }, { "reference_url": "https://usn.ubuntu.com/5362-1/", "reference_id": "USN-5362-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5362-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-23960" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k4hm-xb4b-cbaw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79035?format=api", "vulnerability_id": "VCID-kkm1-jzbg-97d3", "summary": "kernel: vmwgfx: integer overflow in vmwgfx_execbuf.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36402.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36402.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36402", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15574", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15642", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15442", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15529", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15584", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15548", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15511", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15445", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15367", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.1537", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15423", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15467", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15465", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15409", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.1528", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15402", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36402" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36402", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36402" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133451", "reference_id": "2133451", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0113", "reference_id": "RHSA-2024:0113", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0113" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0134", "reference_id": "RHSA-2024:0134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0461", "reference_id": "RHSA-2024:0461", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0461" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0930", "reference_id": "RHSA-2024:0930", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0930" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1404", "reference_id": "RHSA-2024:1404", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1404" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4823", "reference_id": "RHSA-2024:4823", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4823" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4831", "reference_id": "RHSA-2024:4831", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4831" }, { "reference_url": "https://usn.ubuntu.com/7088-1/", "reference_id": "USN-7088-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7088-1/" }, { "reference_url": "https://usn.ubuntu.com/7088-2/", "reference_id": "USN-7088-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7088-2/" }, { "reference_url": "https://usn.ubuntu.com/7088-3/", "reference_id": "USN-7088-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7088-3/" }, { "reference_url": "https://usn.ubuntu.com/7088-4/", "reference_id": "USN-7088-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7088-4/" }, { "reference_url": "https://usn.ubuntu.com/7088-5/", "reference_id": "USN-7088-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7088-5/" }, { "reference_url": "https://usn.ubuntu.com/7119-1/", "reference_id": "USN-7119-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7119-1/" }, { "reference_url": "https://usn.ubuntu.com/7183-1/", "reference_id": "USN-7183-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7183-1/" }, { "reference_url": "https://usn.ubuntu.com/7184-1/", "reference_id": "USN-7184-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7184-1/" }, { "reference_url": "https://usn.ubuntu.com/7185-1/", "reference_id": "USN-7185-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7185-1/" }, { "reference_url": "https://usn.ubuntu.com/7185-2/", "reference_id": "USN-7185-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7185-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-36402" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kkm1-jzbg-97d3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78998?format=api", "vulnerability_id": "VCID-m26e-r8mc-jbbq", "summary": "kernel: KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2196.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2196.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2196", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09678", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09629", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09677", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09644", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09601", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09517", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12452", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12259", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12258", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12496", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12301", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.1238", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.1243", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12437", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12398", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12358", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2196" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2196", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2196" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160023", "reference_id": "2160023", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160023" }, { "reference_url": "https://kernel.dance/#2e7eab81425a", "reference_id": "#2e7eab81425a", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-01T15:07:47Z/" } ], "url": "https://kernel.dance/#2e7eab81425a" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2e7eab81425ad6c875f2ed47c0ce01e78afc38a5", "reference_id": "?id=2e7eab81425ad6c875f2ed47c0ce01e78afc38a5", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-01T15:07:47Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2e7eab81425ad6c875f2ed47c0ce01e78afc38a5" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html", "reference_id": "msg00005.html", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-01T15:07:47Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2148", "reference_id": "RHSA-2023:2148", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2458", "reference_id": "RHSA-2023:2458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2736", "reference_id": "RHSA-2023:2736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951", "reference_id": "RHSA-2023:2951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0930", "reference_id": "RHSA-2024:0930", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0930" }, { "reference_url": "https://usn.ubuntu.com/5970-1/", "reference_id": "USN-5970-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5970-1/" }, { "reference_url": "https://usn.ubuntu.com/5976-1/", "reference_id": "USN-5976-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5976-1/" }, { "reference_url": "https://usn.ubuntu.com/5977-1/", "reference_id": "USN-5977-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5977-1/" }, { "reference_url": "https://usn.ubuntu.com/5978-1/", "reference_id": "USN-5978-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5978-1/" }, { "reference_url": "https://usn.ubuntu.com/5979-1/", "reference_id": "USN-5979-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5979-1/" }, { "reference_url": "https://usn.ubuntu.com/5980-1/", "reference_id": "USN-5980-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5980-1/" }, { "reference_url": "https://usn.ubuntu.com/5982-1/", "reference_id": "USN-5982-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5982-1/" }, { "reference_url": "https://usn.ubuntu.com/5985-1/", "reference_id": "USN-5985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5985-1/" }, { "reference_url": "https://usn.ubuntu.com/5987-1/", "reference_id": "USN-5987-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5987-1/" }, { "reference_url": "https://usn.ubuntu.com/6004-1/", "reference_id": "USN-6004-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6004-1/" }, { "reference_url": "https://usn.ubuntu.com/6020-1/", "reference_id": "USN-6020-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6020-1/" }, { "reference_url": "https://usn.ubuntu.com/6151-1/", "reference_id": "USN-6151-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6151-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-2196" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m26e-r8mc-jbbq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79149?format=api", "vulnerability_id": "VCID-nck8-brgn-hkdx", "summary": "kernel: use-after-free after failed devlink reload in devlink_param_get", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3625.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3625.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3625", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.06021", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05836", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05869", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05906", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05917", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05932", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06159", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06154", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06147", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06107", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06118", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06169", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06078", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06106", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06089", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.0613", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3625" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3625", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3625" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2144720", "reference_id": "2144720", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2144720" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2148", "reference_id": "RHSA-2023:2148", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2458", "reference_id": "RHSA-2023:2458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2736", "reference_id": "RHSA-2023:2736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951", "reference_id": "RHSA-2023:2951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0930", "reference_id": "RHSA-2024:0930", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0930" }, { "reference_url": "https://usn.ubuntu.com/5728-1/", "reference_id": "USN-5728-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5728-1/" }, { "reference_url": "https://usn.ubuntu.com/5728-2/", "reference_id": "USN-5728-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5728-2/" }, { "reference_url": "https://usn.ubuntu.com/5728-3/", "reference_id": "USN-5728-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5728-3/" }, { "reference_url": "https://usn.ubuntu.com/5729-1/", "reference_id": "USN-5729-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5729-1/" }, { "reference_url": "https://usn.ubuntu.com/5729-2/", "reference_id": "USN-5729-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5729-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-3625" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nck8-brgn-hkdx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77772?format=api", "vulnerability_id": "VCID-qkq7-ws9x-43f7", "summary": "kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1086.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1086.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-1086", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.85106", "scoring_system": "epss", "scoring_elements": "0.9936", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.85264", "scoring_system": "epss", "scoring_elements": "0.99365", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.85405", "scoring_system": "epss", "scoring_elements": "0.99366", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.85405", "scoring_system": "epss", "scoring_elements": "0.99364", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.85405", "scoring_system": "epss", "scoring_elements": "0.99365", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.85405", "scoring_system": "epss", "scoring_elements": "0.99367", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.85405", "scoring_system": "epss", "scoring_elements": "0.99369", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.85911", "scoring_system": "epss", "scoring_elements": "0.99383", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.86034", "scoring_system": "epss", "scoring_elements": "0.99397", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.86056", "scoring_system": "epss", "scoring_elements": "0.99389", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.86056", "scoring_system": "epss", "scoring_elements": "0.99399", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.86753", "scoring_system": "epss", "scoring_elements": "0.99429", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.86753", "scoring_system": "epss", "scoring_elements": "0.99427", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-1086" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1086", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1086" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/04/14/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/04/14/1" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/04/15/2", "reference_id": "2", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/04/15/2" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/04/10/22", "reference_id": "22", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/04/10/22" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2262126", "reference_id": "2262126", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2262126" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/04/10/23", "reference_id": "23", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/04/10/23" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/04/17/5", "reference_id": "5", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/04/17/5" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/", "reference_id": "7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/" }, { "reference_url": "https://github.com/Notselwyn/CVE-2024-1086", "reference_id": "CVE-2024-1086", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/" } ], "url": "https://github.com/Notselwyn/CVE-2024-1086" }, { "reference_url": "https://kernel.dance/f342de4e2f33e0e39165d8639387aa6c19dff660", "reference_id": "f342de4e2f33e0e39165d8639387aa6c19dff660", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/" } ], "url": "https://kernel.dance/f342de4e2f33e0e39165d8639387aa6c19dff660" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660", "reference_id": "?id=f342de4e2f33e0e39165d8639387aa6c19dff660", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660" }, { "reference_url": "https://news.ycombinator.com/item?id=39828424", "reference_id": "item?id=39828424", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/" } ], "url": "https://news.ycombinator.com/item?id=39828424" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html", "reference_id": "msg00016.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", "reference_id": "msg00020.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html" }, { "reference_url": "https://pwning.tech/nftables/", "reference_id": "nftables", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/" } ], "url": "https://pwning.tech/nftables/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240614-0009/", "reference_id": "ntap-20240614-0009", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240614-0009/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0930", "reference_id": "RHSA-2024:0930", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0930" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1018", "reference_id": "RHSA-2024:1018", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1018" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1019", "reference_id": "RHSA-2024:1019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1249", "reference_id": "RHSA-2024:1249", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1249" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1332", "reference_id": "RHSA-2024:1332", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1332" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1404", "reference_id": "RHSA-2024:1404", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1404" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1607", "reference_id": "RHSA-2024:1607", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1607" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1614", "reference_id": "RHSA-2024:1614", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1614" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2093", "reference_id": "RHSA-2024:2093", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2093" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2394", "reference_id": "RHSA-2024:2394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2697", "reference_id": "RHSA-2024:2697", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2697" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3318", "reference_id": "RHSA-2024:3318", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3318" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3319", "reference_id": "RHSA-2024:3319", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3319" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3414", "reference_id": "RHSA-2024:3414", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3414" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3421", "reference_id": "RHSA-2024:3421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3427", "reference_id": "RHSA-2024:3427", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3427" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3528", "reference_id": "RHSA-2024:3528", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3528" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3529", "reference_id": "RHSA-2024:3529", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3529" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3530", "reference_id": "RHSA-2024:3530", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3530" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3805", "reference_id": "RHSA-2024:3805", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3805" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4073", "reference_id": "RHSA-2024:4073", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4073" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4074", "reference_id": "RHSA-2024:4074", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4074" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4075", "reference_id": "RHSA-2024:4075", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4075" }, { "reference_url": "https://usn.ubuntu.com/6688-1/", "reference_id": "USN-6688-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6688-1/" }, { "reference_url": "https://usn.ubuntu.com/6700-1/", "reference_id": "USN-6700-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6700-1/" }, { "reference_url": "https://usn.ubuntu.com/6700-2/", "reference_id": "USN-6700-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6700-2/" }, { "reference_url": "https://usn.ubuntu.com/6701-1/", "reference_id": "USN-6701-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6701-1/" }, { "reference_url": "https://usn.ubuntu.com/6701-2/", "reference_id": "USN-6701-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6701-2/" }, { "reference_url": "https://usn.ubuntu.com/6701-3/", "reference_id": "USN-6701-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6701-3/" }, { "reference_url": "https://usn.ubuntu.com/6701-4/", "reference_id": "USN-6701-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6701-4/" }, { "reference_url": "https://usn.ubuntu.com/6702-1/", "reference_id": "USN-6702-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6702-1/" }, { "reference_url": "https://usn.ubuntu.com/6702-2/", "reference_id": "USN-6702-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6702-2/" }, { "reference_url": "https://usn.ubuntu.com/6704-1/", "reference_id": "USN-6704-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6704-1/" }, { "reference_url": "https://usn.ubuntu.com/6704-2/", "reference_id": "USN-6704-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6704-2/" }, { "reference_url": "https://usn.ubuntu.com/6704-3/", "reference_id": "USN-6704-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6704-3/" }, { "reference_url": "https://usn.ubuntu.com/6704-4/", "reference_id": "USN-6704-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6704-4/" }, { "reference_url": "https://usn.ubuntu.com/6705-1/", "reference_id": "USN-6705-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6705-1/" }, { "reference_url": "https://usn.ubuntu.com/6707-1/", "reference_id": "USN-6707-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6707-1/" }, { "reference_url": "https://usn.ubuntu.com/6707-2/", "reference_id": "USN-6707-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6707-2/" }, { "reference_url": "https://usn.ubuntu.com/6707-3/", "reference_id": "USN-6707-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6707-3/" }, { "reference_url": "https://usn.ubuntu.com/6707-4/", "reference_id": "USN-6707-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6707-4/" }, { "reference_url": "https://usn.ubuntu.com/6716-1/", "reference_id": "USN-6716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6716-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2024-1086" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qkq7-ws9x-43f7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77930?format=api", "vulnerability_id": "VCID-wmdx-p5fr-yqe4", "summary": "kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6931.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6931.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6931", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00437", "scoring_system": "epss", "scoring_elements": "0.62987", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00437", "scoring_system": "epss", "scoring_elements": "0.63016", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00437", "scoring_system": "epss", "scoring_elements": "0.6298", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00437", "scoring_system": "epss", "scoring_elements": "0.63031", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00437", "scoring_system": "epss", "scoring_elements": "0.63047", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00437", "scoring_system": "epss", "scoring_elements": "0.63064", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00437", "scoring_system": "epss", "scoring_elements": "0.6305", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00437", "scoring_system": "epss", "scoring_elements": "0.63028", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00437", "scoring_system": "epss", "scoring_elements": "0.63072", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00437", "scoring_system": "epss", "scoring_elements": "0.63071", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00437", "scoring_system": "epss", "scoring_elements": "0.63085", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00437", "scoring_system": "epss", "scoring_elements": "0.63084", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00437", "scoring_system": "epss", "scoring_elements": "0.63042", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00437", "scoring_system": "epss", "scoring_elements": "0.63089", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6931" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2252731", "reference_id": "2252731", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2252731" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0930", "reference_id": "RHSA-2024:0930", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0930" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1018", "reference_id": "RHSA-2024:1018", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1018" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1019", "reference_id": "RHSA-2024:1019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1404", "reference_id": "RHSA-2024:1404", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1404" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1607", "reference_id": "RHSA-2024:1607", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1607" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1614", "reference_id": "RHSA-2024:1614", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1614" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1836", "reference_id": "RHSA-2024:1836", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1836" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1840", "reference_id": "RHSA-2024:1840", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1840" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2093", "reference_id": "RHSA-2024:2093", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2093" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2394", "reference_id": "RHSA-2024:2394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2394" }, { "reference_url": "https://usn.ubuntu.com/6602-1/", "reference_id": "USN-6602-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6602-1/" }, { "reference_url": "https://usn.ubuntu.com/6603-1/", "reference_id": "USN-6603-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6603-1/" }, { "reference_url": "https://usn.ubuntu.com/6604-1/", "reference_id": "USN-6604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6604-1/" }, { "reference_url": "https://usn.ubuntu.com/6604-2/", "reference_id": "USN-6604-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6604-2/" }, { "reference_url": "https://usn.ubuntu.com/6605-1/", "reference_id": "USN-6605-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6605-1/" }, { "reference_url": "https://usn.ubuntu.com/6605-2/", "reference_id": "USN-6605-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6605-2/" }, { "reference_url": "https://usn.ubuntu.com/6606-1/", "reference_id": "USN-6606-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6606-1/" }, { "reference_url": "https://usn.ubuntu.com/6607-1/", "reference_id": "USN-6607-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6607-1/" }, { "reference_url": "https://usn.ubuntu.com/6608-1/", "reference_id": "USN-6608-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6608-1/" }, { "reference_url": "https://usn.ubuntu.com/6608-2/", "reference_id": "USN-6608-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6608-2/" }, { "reference_url": "https://usn.ubuntu.com/6609-1/", "reference_id": "USN-6609-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6609-1/" }, { "reference_url": "https://usn.ubuntu.com/6609-2/", "reference_id": "USN-6609-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6609-2/" }, { "reference_url": "https://usn.ubuntu.com/6609-3/", "reference_id": "USN-6609-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6609-3/" }, { "reference_url": "https://usn.ubuntu.com/6628-1/", "reference_id": "USN-6628-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6628-1/" }, { "reference_url": "https://usn.ubuntu.com/6628-2/", "reference_id": "USN-6628-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6628-2/" }, { "reference_url": "https://usn.ubuntu.com/6635-1/", "reference_id": "USN-6635-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6635-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-6931" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wmdx-p5fr-yqe4" } ], "fixing_vulnerabilities": [], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-372.93.1%3Farch=el8_6" }