{"url":"http://public2.vulnerablecode.io/api/packages/98409?format=json","purl":"pkg:rpm/redhat/grub2@1:2.02-99.el8_4?arch=9","type":"rpm","namespace":"redhat","name":"grub2","version":"1:2.02-99.el8_4","qualifiers":{"arch":"9"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56073?format=json","vulnerability_id":"VCID-2f6m-msj2-2fgy","summary":"Multiple vulnerabilities have been discovered in GRUB, the worst of which may allow for secureboot bypass.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3697.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3697.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3697","reference_id":"","reference_type":"","scores":[{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20795","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20483","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20827","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20774","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20765","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20757","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20589","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20942","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20999","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20716","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20793","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20854","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2087","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21106","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21234","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21103","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3697"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3697","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3697"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1991687","reference_id":"1991687","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1991687"},{"reference_url":"https://security.archlinux.org/AVG-2762","reference_id":"AVG-2762","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2762"},{"reference_url":"https://security.gentoo.org/glsa/202209-12","reference_id":"GLSA-202209-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202209-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5095","reference_id":"RHSA-2022:5095","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5095"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5096","reference_id":"RHSA-2022:5096","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5096"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5098","reference_id":"RHSA-2022:5098","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5098"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5099","reference_id":"RHSA-2022:5099","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5100","reference_id":"RHSA-2022:5100","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5100"},{"reference_url":"https://usn.ubuntu.com/6355-1/","reference_id":"USN-6355-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6355-1/"}],"fixed_packages":[],"aliases":["CVE-2021-3697"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2f6m-msj2-2fgy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56077?format=json","vulnerability_id":"VCID-6jes-p579-uyg3","summary":"Multiple vulnerabilities have been discovered in GRUB, the worst of which may allow for secureboot bypass.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28735.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28735.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-28735","reference_id":"","reference_type":"","scores":[{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04857","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04617","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04642","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04654","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04688","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.047","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04691","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04674","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04657","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04624","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04632","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04861","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05046","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05005","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04973","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-28735"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28735","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-24T19:20:44Z/"}],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28735"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1001057","reference_id":"1001057","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1001057"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2090857","reference_id":"2090857","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2090857"},{"reference_url":"https://www.openwall.com/lists/oss-security/2022/06/07/5","reference_id":"5","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-24T19:20:44Z/"}],"url":"https://www.openwall.com/lists/oss-security/2022/06/07/5"},{"reference_url":"https://security.archlinux.org/AVG-2762","reference_id":"AVG-2762","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2762"},{"reference_url":"https://security.gentoo.org/glsa/202209-12","reference_id":"GLSA-202209-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202209-12"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230825-0002/","reference_id":"ntap-20230825-0002","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-24T19:20:44Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230825-0002/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5095","reference_id":"RHSA-2022:5095","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5095"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5096","reference_id":"RHSA-2022:5096","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5096"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5098","reference_id":"RHSA-2022:5098","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5098"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5099","reference_id":"RHSA-2022:5099","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5100","reference_id":"RHSA-2022:5100","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5100"},{"reference_url":"https://usn.ubuntu.com/6355-1/","reference_id":"USN-6355-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6355-1/"}],"fixed_packages":[],"aliases":["CVE-2022-28735"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6jes-p579-uyg3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56071?format=json","vulnerability_id":"VCID-8zje-6cet-h3a4","summary":"Multiple vulnerabilities have been discovered in GRUB, the worst of which may allow for secureboot bypass.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3695.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3695.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3695","reference_id":"","reference_type":"","scores":[{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18734","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18368","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18737","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18687","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18635","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18647","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18495","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18871","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18925","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18645","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18724","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18779","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18783","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19016","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19135","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19028","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3695"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3695","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3695"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1991685","reference_id":"1991685","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1991685"},{"reference_url":"https://security.archlinux.org/AVG-2762","reference_id":"AVG-2762","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2762"},{"reference_url":"https://security.gentoo.org/glsa/202209-12","reference_id":"GLSA-202209-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202209-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5095","reference_id":"RHSA-2022:5095","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5095"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5096","reference_id":"RHSA-2022:5096","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5096"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5098","reference_id":"RHSA-2022:5098","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5098"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5099","reference_id":"RHSA-2022:5099","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5100","reference_id":"RHSA-2022:5100","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5100"},{"reference_url":"https://usn.ubuntu.com/6355-1/","reference_id":"USN-6355-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6355-1/"}],"fixed_packages":[],"aliases":["CVE-2021-3695"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8zje-6cet-h3a4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56075?format=json","vulnerability_id":"VCID-9dkn-kkgd-37ce","summary":"Multiple vulnerabilities have been discovered in GRUB, the worst of which may allow for secureboot bypass.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28733.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28733.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-28733","reference_id":"","reference_type":"","scores":[{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.28635","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29258","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29308","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.2912","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29185","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29226","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29231","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29133","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29158","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29135","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.28784","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29363","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.2957","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29477","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-28733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28733","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-24T19:49:29Z/"}],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28733"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2083339","reference_id":"2083339","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2083339"},{"reference_url":"https://www.openwall.com/lists/oss-security/2022/06/07/5","reference_id":"5","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-24T19:49:29Z/"}],"url":"https://www.openwall.com/lists/oss-security/2022/06/07/5"},{"reference_url":"https://security.archlinux.org/AVG-2762","reference_id":"AVG-2762","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2762"},{"reference_url":"https://security.gentoo.org/glsa/202209-12","reference_id":"GLSA-202209-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202209-12"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230825-0002/","reference_id":"ntap-20230825-0002","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-24T19:49:29Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230825-0002/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5095","reference_id":"RHSA-2022:5095","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5095"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5096","reference_id":"RHSA-2022:5096","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5096"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5098","reference_id":"RHSA-2022:5098","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5098"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5099","reference_id":"RHSA-2022:5099","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5100","reference_id":"RHSA-2022:5100","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5100"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5678","reference_id":"RHSA-2022:5678","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5678"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8900","reference_id":"RHSA-2022:8900","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8900"},{"reference_url":"https://usn.ubuntu.com/6355-1/","reference_id":"USN-6355-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6355-1/"}],"fixed_packages":[],"aliases":["CVE-2022-28733"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9dkn-kkgd-37ce"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56076?format=json","vulnerability_id":"VCID-g3tz-5rzv-wkgk","summary":"Multiple vulnerabilities have been discovered in GRUB, the worst of which may allow for secureboot bypass.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28734.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28734.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-28734","reference_id":"","reference_type":"","scores":[{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.3177","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32062","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31897","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34367","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34396","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34399","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34359","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34336","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.3437","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34357","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33721","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34429","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34457","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34324","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33841","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-28734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28734"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2090463","reference_id":"2090463","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2090463"},{"reference_url":"https://security.archlinux.org/AVG-2762","reference_id":"AVG-2762","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2762"},{"reference_url":"https://security.gentoo.org/glsa/202209-12","reference_id":"GLSA-202209-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202209-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5095","reference_id":"RHSA-2022:5095","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5095"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5096","reference_id":"RHSA-2022:5096","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5096"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5098","reference_id":"RHSA-2022:5098","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5098"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5099","reference_id":"RHSA-2022:5099","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5100","reference_id":"RHSA-2022:5100","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5100"},{"reference_url":"https://usn.ubuntu.com/6355-1/","reference_id":"USN-6355-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6355-1/"}],"fixed_packages":[],"aliases":["CVE-2022-28734"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g3tz-5rzv-wkgk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56072?format=json","vulnerability_id":"VCID-nn2e-jq31-n7bc","summary":"Multiple vulnerabilities have been discovered in GRUB, the worst of which may allow for secureboot bypass.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3696.json","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3696.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3696","reference_id":"","reference_type":"","scores":[{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29993","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29457","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29949","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.299","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29917","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29897","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29599","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30033","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.3008","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29893","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29954","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.2999","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29995","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30138","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30313","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30252","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3696","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3696"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1991686","reference_id":"1991686","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1991686"},{"reference_url":"https://security.archlinux.org/AVG-2762","reference_id":"AVG-2762","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2762"},{"reference_url":"https://security.gentoo.org/glsa/202209-12","reference_id":"GLSA-202209-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202209-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5095","reference_id":"RHSA-2022:5095","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5095"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5096","reference_id":"RHSA-2022:5096","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5096"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5098","reference_id":"RHSA-2022:5098","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5098"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5099","reference_id":"RHSA-2022:5099","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5100","reference_id":"RHSA-2022:5100","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5100"},{"reference_url":"https://usn.ubuntu.com/6355-1/","reference_id":"USN-6355-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6355-1/"}],"fixed_packages":[],"aliases":["CVE-2021-3696"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nn2e-jq31-n7bc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56078?format=json","vulnerability_id":"VCID-wp1a-2ueg-mych","summary":"Multiple vulnerabilities have been discovered in GRUB, the worst of which may allow for secureboot bypass.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28736.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28736.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-28736","reference_id":"","reference_type":"","scores":[{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.091","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09147","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.092","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09124","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09204","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09233","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09236","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0919","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09085","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09066","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09188","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09558","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09545","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09592","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-28736"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28736","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-24T18:53:03Z/"}],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28736"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092613","reference_id":"2092613","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092613"},{"reference_url":"https://www.openwall.com/lists/oss-security/2022/06/07/5","reference_id":"5","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-24T18:53:03Z/"}],"url":"https://www.openwall.com/lists/oss-security/2022/06/07/5"},{"reference_url":"https://security.archlinux.org/AVG-2762","reference_id":"AVG-2762","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2762"},{"reference_url":"https://security.gentoo.org/glsa/202209-12","reference_id":"GLSA-202209-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202209-12"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230825-0002/","reference_id":"ntap-20230825-0002","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-24T18:53:03Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230825-0002/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5095","reference_id":"RHSA-2022:5095","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5095"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5096","reference_id":"RHSA-2022:5096","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5096"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5098","reference_id":"RHSA-2022:5098","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5098"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5099","reference_id":"RHSA-2022:5099","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5100","reference_id":"RHSA-2022:5100","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5100"},{"reference_url":"https://usn.ubuntu.com/6355-1/","reference_id":"USN-6355-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6355-1/"}],"fixed_packages":[],"aliases":["CVE-2022-28736"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wp1a-2ueg-mych"}],"fixing_vulnerabilities":[],"risk_score":"4.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/grub2@1:2.02-99.el8_4%3Farch=9"}