Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/96301?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/96301?format=api", "purl": "pkg:rpm/redhat/kernel-rt@5.14.0-70.64.1.rt21.135?arch=el9_0", "type": "rpm", "namespace": "redhat", "name": "kernel-rt", "version": "5.14.0-70.64.1.rt21.135", "qualifiers": { "arch": "el9_0" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78893?format=api", "vulnerability_id": "VCID-4nqf-ct5y-6uev", "summary": "kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42896.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42896.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42896", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.61955", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62004", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.61994", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.61973", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62015", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62021", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62003", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62017", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.6201", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.61916", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.61946", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.61966", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.61983", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42896" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42896", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42896" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147364", "reference_id": "2147364", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147364" }, { "reference_url": "https://kernel.dance/#711f8c3fb3db61897080468586b970c87c61d9e4", "reference_id": "#711f8c3fb3db61897080468586b970c87c61d9e4", "reference_type": "", "scores": [ { "value": "8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:37:08Z/" } ], "url": "https://kernel.dance/#711f8c3fb3db61897080468586b970c87c61d9e4" }, { "reference_url": "https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4", "reference_id": "711f8c3fb3db61897080468586b970c87c61d9e4", "reference_type": "", "scores": [ { "value": "8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:37:08Z/" } ], "url": "https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2148", "reference_id": "RHSA-2023:2148", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2458", "reference_id": "RHSA-2023:2458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3461", "reference_id": "RHSA-2023:3461", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3461" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3462", "reference_id": "RHSA-2023:3462", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3462" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3517", "reference_id": "RHSA-2023:3517", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3517" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4137", "reference_id": "RHSA-2023:4137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4137" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4138", "reference_id": "RHSA-2023:4138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4138" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4230", "reference_id": "RHSA-2023:4230", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4230" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4517", "reference_id": "RHSA-2023:4517", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4517" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4531", "reference_id": "RHSA-2023:4531", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4531" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4541", "reference_id": "RHSA-2023:4541", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4541" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4789", "reference_id": "RHSA-2023:4789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4888", "reference_id": "RHSA-2023:4888", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4888" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5580", "reference_id": "RHSA-2023:5580", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5580" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5588", "reference_id": "RHSA-2023:5588", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5588" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5589", "reference_id": "RHSA-2023:5589", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5589" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0980", "reference_id": "RHSA-2024:0980", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0980" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1249", "reference_id": "RHSA-2024:1249", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1249" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1323", "reference_id": "RHSA-2024:1323", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1323" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1332", "reference_id": "RHSA-2024:1332", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1332" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1746", "reference_id": "RHSA-2024:1746", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1746" }, { "reference_url": "https://usn.ubuntu.com/5780-1/", "reference_id": "USN-5780-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5780-1/" }, { "reference_url": "https://usn.ubuntu.com/5783-1/", "reference_id": "USN-5783-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5783-1/" }, { "reference_url": "https://usn.ubuntu.com/5794-1/", "reference_id": "USN-5794-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5794-1/" }, { "reference_url": "https://usn.ubuntu.com/5802-1/", "reference_id": "USN-5802-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5802-1/" }, { "reference_url": "https://usn.ubuntu.com/5803-1/", "reference_id": "USN-5803-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5803-1/" }, { "reference_url": "https://usn.ubuntu.com/5804-1/", "reference_id": "USN-5804-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5804-1/" }, { "reference_url": "https://usn.ubuntu.com/5804-2/", "reference_id": "USN-5804-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5804-2/" }, { "reference_url": "https://usn.ubuntu.com/5808-1/", "reference_id": "USN-5808-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5808-1/" }, { "reference_url": "https://usn.ubuntu.com/5809-1/", "reference_id": "USN-5809-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5809-1/" }, { "reference_url": "https://usn.ubuntu.com/5813-1/", "reference_id": "USN-5813-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5813-1/" }, { "reference_url": "https://usn.ubuntu.com/5814-1/", "reference_id": "USN-5814-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5814-1/" }, { "reference_url": "https://usn.ubuntu.com/5829-1/", "reference_id": "USN-5829-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5829-1/" }, { "reference_url": "https://usn.ubuntu.com/5830-1/", "reference_id": "USN-5830-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5830-1/" }, { "reference_url": "https://usn.ubuntu.com/5831-1/", "reference_id": "USN-5831-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5831-1/" }, { "reference_url": "https://usn.ubuntu.com/5832-1/", "reference_id": "USN-5832-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5832-1/" }, { "reference_url": "https://usn.ubuntu.com/5860-1/", "reference_id": "USN-5860-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5860-1/" }, { "reference_url": "https://usn.ubuntu.com/5861-1/", "reference_id": "USN-5861-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5861-1/" }, { "reference_url": "https://usn.ubuntu.com/5863-1/", "reference_id": "USN-5863-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5863-1/" }, { "reference_url": "https://usn.ubuntu.com/5875-1/", "reference_id": "USN-5875-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5875-1/" }, { "reference_url": "https://usn.ubuntu.com/5877-1/", "reference_id": "USN-5877-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5877-1/" }, { "reference_url": "https://usn.ubuntu.com/5879-1/", "reference_id": "USN-5879-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5879-1/" }, { "reference_url": "https://usn.ubuntu.com/5914-1/", "reference_id": "USN-5914-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5914-1/" }, { "reference_url": "https://usn.ubuntu.com/5918-1/", "reference_id": "USN-5918-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5918-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-42896" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4nqf-ct5y-6uev" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79556?format=api", "vulnerability_id": "VCID-5pt2-wwc2-zbfy", "summary": "kernel: uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1016.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1016.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1016", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02384", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.0258", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02556", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02543", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02532", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02596", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02564", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02454", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02466", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02467", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.0247", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.0249", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02461", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02445", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02451", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1016" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066614", "reference_id": "2066614", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066614" }, { "reference_url": "https://security.archlinux.org/AVG-2698", "reference_id": "AVG-2698", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2698" }, { "reference_url": "https://security.archlinux.org/AVG-2699", "reference_id": "AVG-2699", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2699" }, { "reference_url": "https://security.archlinux.org/AVG-2700", "reference_id": "AVG-2700", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2700" }, { "reference_url": "https://security.archlinux.org/AVG-2701", "reference_id": "AVG-2701", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2701" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7444", "reference_id": "RHSA-2022:7444", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7444" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7683", "reference_id": "RHSA-2022:7683", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7683" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7933", "reference_id": "RHSA-2022:7933", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7933" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8267", "reference_id": "RHSA-2022:8267", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8267" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4137", "reference_id": "RHSA-2023:4137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4137" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4138", "reference_id": "RHSA-2023:4138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4138" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0412", "reference_id": "RHSA-2024:0412", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0412" }, { "reference_url": "https://usn.ubuntu.com/5381-1/", "reference_id": "USN-5381-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5381-1/" }, { "reference_url": "https://usn.ubuntu.com/5383-1/", "reference_id": "USN-5383-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5383-1/" }, { "reference_url": "https://usn.ubuntu.com/5390-1/", "reference_id": "USN-5390-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5390-1/" }, { "reference_url": "https://usn.ubuntu.com/5390-2/", "reference_id": "USN-5390-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5390-2/" }, { "reference_url": "https://usn.ubuntu.com/5415-1/", "reference_id": "USN-5415-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5415-1/" }, { "reference_url": "https://usn.ubuntu.com/5466-1/", "reference_id": "USN-5466-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5466-1/" }, { "reference_url": "https://usn.ubuntu.com/6001-1/", "reference_id": "USN-6001-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6001-1/" }, { "reference_url": "https://usn.ubuntu.com/6013-1/", "reference_id": "USN-6013-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6013-1/" }, { "reference_url": "https://usn.ubuntu.com/6014-1/", "reference_id": "USN-6014-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6014-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-1016" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5pt2-wwc2-zbfy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78962?format=api", "vulnerability_id": "VCID-dqhd-grev-t3ge", "summary": "kernel: use-after-free related to leaf anon_vma double reuse", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42703.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42703.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42703", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0088", "scoring_system": "epss", "scoring_elements": "0.75473", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76906", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76899", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76918", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76907", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76773", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76802", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76783", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76814", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76824", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76853", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76833", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76827", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.7687", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76875", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76866", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42703" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42703", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42703" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133483", "reference_id": "2133483", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133483" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1091", "reference_id": "RHSA-2023:1091", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1091" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1092", "reference_id": "RHSA-2023:1092", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1092" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2148", "reference_id": "RHSA-2023:2148", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2458", "reference_id": "RHSA-2023:2458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2736", "reference_id": "RHSA-2023:2736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951", "reference_id": "RHSA-2023:2951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3388", "reference_id": "RHSA-2023:3388", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3388" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4137", "reference_id": "RHSA-2023:4137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4137" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4138", "reference_id": "RHSA-2023:4138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4138" }, { "reference_url": "https://usn.ubuntu.com/5728-1/", "reference_id": "USN-5728-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5728-1/" }, { "reference_url": "https://usn.ubuntu.com/5728-2/", "reference_id": "USN-5728-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5728-2/" }, { "reference_url": "https://usn.ubuntu.com/5728-3/", "reference_id": "USN-5728-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5728-3/" }, { "reference_url": "https://usn.ubuntu.com/5755-1/", "reference_id": "USN-5755-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5755-1/" }, { "reference_url": "https://usn.ubuntu.com/5755-2/", "reference_id": "USN-5755-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5755-2/" }, { "reference_url": "https://usn.ubuntu.com/5756-1/", "reference_id": "USN-5756-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5756-1/" }, { "reference_url": "https://usn.ubuntu.com/5756-2/", "reference_id": "USN-5756-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5756-2/" }, { "reference_url": "https://usn.ubuntu.com/5756-3/", "reference_id": "USN-5756-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5756-3/" }, { "reference_url": "https://usn.ubuntu.com/5757-1/", "reference_id": "USN-5757-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5757-1/" }, { "reference_url": "https://usn.ubuntu.com/5757-2/", "reference_id": "USN-5757-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5757-2/" }, { "reference_url": "https://usn.ubuntu.com/5758-1/", "reference_id": "USN-5758-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5758-1/" }, { "reference_url": "https://usn.ubuntu.com/5773-1/", "reference_id": "USN-5773-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5773-1/" }, { "reference_url": "https://usn.ubuntu.com/5774-1/", "reference_id": "USN-5774-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5774-1/" }, { "reference_url": "https://usn.ubuntu.com/5779-1/", "reference_id": "USN-5779-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5779-1/" }, { "reference_url": "https://usn.ubuntu.com/5789-1/", "reference_id": "USN-5789-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5789-1/" }, { "reference_url": "https://usn.ubuntu.com/5916-1/", "reference_id": "USN-5916-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5916-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-42703" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dqhd-grev-t3ge" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78509?format=api", "vulnerability_id": "VCID-mdjx-3kwa-r7bj", "summary": "Kernel: bluetooth: Unauthorized management command execution", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2002.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2002.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2002", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00595", "scoring_system": "epss", "scoring_elements": "0.69275", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00595", "scoring_system": "epss", "scoring_elements": "0.69292", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00595", "scoring_system": "epss", "scoring_elements": "0.69272", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00595", "scoring_system": "epss", "scoring_elements": "0.69322", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00595", "scoring_system": "epss", "scoring_elements": "0.69339", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00595", "scoring_system": "epss", "scoring_elements": "0.69361", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00595", "scoring_system": "epss", "scoring_elements": "0.69346", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00595", "scoring_system": "epss", "scoring_elements": "0.69318", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00595", "scoring_system": "epss", "scoring_elements": "0.69356", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00595", "scoring_system": "epss", "scoring_elements": "0.69366", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00595", "scoring_system": "epss", "scoring_elements": "0.69429", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00595", "scoring_system": "epss", "scoring_elements": "0.69387", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00612", "scoring_system": "epss", "scoring_elements": "0.69897", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00612", "scoring_system": "epss", "scoring_elements": "0.69906", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00612", "scoring_system": "epss", "scoring_elements": "0.69909", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00612", "scoring_system": "epss", "scoring_elements": "0.69845", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187308", "reference_id": "2187308", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187308" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3708", "reference_id": "RHSA-2023:3708", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3708" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3723", "reference_id": "RHSA-2023:3723", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3723" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4137", "reference_id": "RHSA-2023:4137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4137" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4138", "reference_id": "RHSA-2023:4138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4138" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4789", "reference_id": "RHSA-2023:4789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4961", "reference_id": "RHSA-2023:4961", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4961" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4962", "reference_id": "RHSA-2023:4962", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4962" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5244", "reference_id": "RHSA-2023:5244", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5244" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5255", "reference_id": "RHSA-2023:5255", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5255" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1746", "reference_id": "RHSA-2024:1746", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1746" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2003", "reference_id": "RHSA-2024:2003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2004", "reference_id": "RHSA-2024:2004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4098", "reference_id": "RHSA-2024:4098", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4098" }, { "reference_url": "https://usn.ubuntu.com/6173-1/", "reference_id": "USN-6173-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6173-1/" }, { "reference_url": "https://usn.ubuntu.com/6283-1/", "reference_id": "USN-6283-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6283-1/" }, { "reference_url": "https://usn.ubuntu.com/6300-1/", "reference_id": "USN-6300-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6300-1/" }, { "reference_url": "https://usn.ubuntu.com/6311-1/", "reference_id": "USN-6311-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6311-1/" }, { "reference_url": "https://usn.ubuntu.com/6332-1/", "reference_id": "USN-6332-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6332-1/" }, { "reference_url": "https://usn.ubuntu.com/6340-1/", "reference_id": "USN-6340-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6340-1/" }, { "reference_url": "https://usn.ubuntu.com/6340-2/", "reference_id": "USN-6340-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6340-2/" }, { "reference_url": "https://usn.ubuntu.com/6347-1/", "reference_id": "USN-6347-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6347-1/" }, { "reference_url": "https://usn.ubuntu.com/6349-1/", "reference_id": "USN-6349-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6349-1/" }, { "reference_url": "https://usn.ubuntu.com/6357-1/", "reference_id": "USN-6357-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6357-1/" }, { "reference_url": "https://usn.ubuntu.com/6385-1/", "reference_id": "USN-6385-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6385-1/" }, { "reference_url": "https://usn.ubuntu.com/6397-1/", "reference_id": "USN-6397-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6397-1/" }, { "reference_url": "https://usn.ubuntu.com/6701-1/", "reference_id": "USN-6701-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6701-1/" }, { "reference_url": "https://usn.ubuntu.com/6701-2/", "reference_id": "USN-6701-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6701-2/" }, { "reference_url": "https://usn.ubuntu.com/6701-3/", "reference_id": "USN-6701-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6701-3/" }, { "reference_url": "https://usn.ubuntu.com/6701-4/", "reference_id": "USN-6701-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6701-4/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-2002" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mdjx-3kwa-r7bj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78523?format=api", "vulnerability_id": "VCID-t7q4-3b72-u3a5", "summary": "kernel: OOB access in the Linux kernel's XFS subsystem", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2124.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2124.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2124", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05611", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05463", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05562", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.0554", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05601", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05574", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05562", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05555", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05504", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05513", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05505", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05578", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.06163", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.06171", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.06131", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187439", "reference_id": "2187439", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187439" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3708", "reference_id": "RHSA-2023:3708", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3708" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3723", "reference_id": "RHSA-2023:3723", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3723" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4137", "reference_id": "RHSA-2023:4137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4137" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4138", "reference_id": "RHSA-2023:4138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4138" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4515", "reference_id": "RHSA-2023:4515", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4515" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4517", "reference_id": "RHSA-2023:4517", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4517" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4541", "reference_id": "RHSA-2023:4541", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4541" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4789", "reference_id": "RHSA-2023:4789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4815", "reference_id": "RHSA-2023:4815", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4815" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4817", "reference_id": "RHSA-2023:4817", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4817" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4961", "reference_id": "RHSA-2023:4961", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4961" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4962", "reference_id": "RHSA-2023:4962", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4962" }, { "reference_url": "https://usn.ubuntu.com/6206-1/", "reference_id": "USN-6206-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6206-1/" }, { "reference_url": "https://usn.ubuntu.com/6224-1/", "reference_id": "USN-6224-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6224-1/" }, { "reference_url": "https://usn.ubuntu.com/6228-1/", "reference_id": "USN-6228-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6228-1/" }, { "reference_url": "https://usn.ubuntu.com/6231-1/", "reference_id": "USN-6231-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6231-1/" }, { "reference_url": "https://usn.ubuntu.com/6235-1/", "reference_id": "USN-6235-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6235-1/" }, { "reference_url": "https://usn.ubuntu.com/6252-1/", "reference_id": "USN-6252-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6252-1/" }, { "reference_url": "https://usn.ubuntu.com/6254-1/", "reference_id": "USN-6254-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6254-1/" }, { "reference_url": "https://usn.ubuntu.com/6284-1/", "reference_id": "USN-6284-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6284-1/" }, { "reference_url": "https://usn.ubuntu.com/6300-1/", "reference_id": "USN-6300-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6300-1/" }, { "reference_url": "https://usn.ubuntu.com/6301-1/", "reference_id": "USN-6301-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6301-1/" }, { "reference_url": "https://usn.ubuntu.com/6311-1/", "reference_id": "USN-6311-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6311-1/" }, { "reference_url": "https://usn.ubuntu.com/6312-1/", "reference_id": "USN-6312-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6312-1/" }, { "reference_url": "https://usn.ubuntu.com/6314-1/", "reference_id": "USN-6314-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6314-1/" }, { "reference_url": "https://usn.ubuntu.com/6331-1/", "reference_id": "USN-6331-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6331-1/" }, { "reference_url": "https://usn.ubuntu.com/6332-1/", "reference_id": "USN-6332-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6332-1/" }, { "reference_url": "https://usn.ubuntu.com/6337-1/", "reference_id": "USN-6337-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6337-1/" }, { "reference_url": "https://usn.ubuntu.com/6347-1/", "reference_id": "USN-6347-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6347-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-2124" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t7q4-3b72-u3a5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78595?format=api", "vulnerability_id": "VCID-zsmq-81fu-q3fq", "summary": "kernel: use-after-free vulnerability in the perf_group_detach function of the Linux Kernel Performance Events", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2235.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2235.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2235", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02509", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02639", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02616", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02601", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02589", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02652", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02623", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02522", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02524", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02528", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02549", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02529", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02518", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02517", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02504", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2235" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2192589", "reference_id": "2192589", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2192589" }, { "reference_url": "https://kernel.dance/fd0815f632c24878e325821943edccc7fde947a2", "reference_id": "fd0815f632c24878e325821943edccc7fde947a2", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:38:34Z/" } ], "url": "https://kernel.dance/fd0815f632c24878e325821943edccc7fde947a2" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fd0815f632c24878e325821943edccc7fde947a2", "reference_id": "?id=fd0815f632c24878e325821943edccc7fde947a2", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:38:34Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fd0815f632c24878e325821943edccc7fde947a2" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3705", "reference_id": "RHSA-2023:3705", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3705" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3708", "reference_id": "RHSA-2023:3708", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3708" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3723", "reference_id": "RHSA-2023:3723", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3723" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4137", "reference_id": "RHSA-2023:4137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4137" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4138", "reference_id": "RHSA-2023:4138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4138" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4517", "reference_id": "RHSA-2023:4517", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4517" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4541", "reference_id": "RHSA-2023:4541", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4541" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5627", "reference_id": "RHSA-2023:5627", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5627" }, { "reference_url": "https://usn.ubuntu.com/6175-1/", "reference_id": "USN-6175-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6175-1/" }, { "reference_url": "https://usn.ubuntu.com/6186-1/", "reference_id": "USN-6186-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6186-1/" }, { "reference_url": "https://usn.ubuntu.com/6300-1/", "reference_id": "USN-6300-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6300-1/" }, { "reference_url": "https://usn.ubuntu.com/6311-1/", "reference_id": "USN-6311-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6311-1/" }, { "reference_url": "https://usn.ubuntu.com/6332-1/", "reference_id": "USN-6332-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6332-1/" }, { "reference_url": "https://usn.ubuntu.com/6347-1/", "reference_id": "USN-6347-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6347-1/" }, { "reference_url": "https://usn.ubuntu.com/6385-1/", "reference_id": "USN-6385-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6385-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-2235" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zsmq-81fu-q3fq" } ], "fixing_vulnerabilities": [], "risk_score": "4.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@5.14.0-70.64.1.rt21.135%3Farch=el9_0" }