Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/redhat-virtualization-host@4.5.0-202205291010_8?arch=6
Typerpm
Namespaceredhat
Nameredhat-virtualization-host
Version4.5.0-202205291010_8
Qualifiers
arch 6
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-3adf-qttu-3kfd
vulnerability_id VCID-3adf-qttu-3kfd
summary A vulnerability has been discovered in GNU Gzip and XZ Utils' grep helpers which could result in writes to arbitrary files.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1271.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1271.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1271
reference_id
reference_type
scores
0
value 0.00813
scoring_system epss
scoring_elements 0.74254
published_at 2026-04-13T12:55:00Z
1
value 0.00813
scoring_system epss
scoring_elements 0.74207
published_at 2026-04-01T12:55:00Z
2
value 0.00813
scoring_system epss
scoring_elements 0.74213
published_at 2026-04-02T12:55:00Z
3
value 0.00813
scoring_system epss
scoring_elements 0.7424
published_at 2026-04-04T12:55:00Z
4
value 0.00813
scoring_system epss
scoring_elements 0.74212
published_at 2026-04-07T12:55:00Z
5
value 0.00813
scoring_system epss
scoring_elements 0.74245
published_at 2026-04-08T12:55:00Z
6
value 0.00813
scoring_system epss
scoring_elements 0.74259
published_at 2026-04-09T12:55:00Z
7
value 0.00813
scoring_system epss
scoring_elements 0.74281
published_at 2026-04-11T12:55:00Z
8
value 0.00813
scoring_system epss
scoring_elements 0.74261
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1271
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009167
reference_id 1009167
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009167
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009168
reference_id 1009168
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009168
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2073310
reference_id 2073310
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2073310
7
reference_url https://www.openwall.com/lists/oss-security/2022/04/07/8
reference_id 8
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/
url https://www.openwall.com/lists/oss-security/2022/04/07/8
8
reference_url https://security.archlinux.org/ASA-202204-7
reference_id ASA-202204-7
reference_type
scores
url https://security.archlinux.org/ASA-202204-7
9
reference_url https://security.archlinux.org/ASA-202204-8
reference_id ASA-202204-8
reference_type
scores
url https://security.archlinux.org/ASA-202204-8
10
reference_url https://security.archlinux.org/AVG-2665
reference_id AVG-2665
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2665
11
reference_url https://security.archlinux.org/AVG-2666
reference_id AVG-2666
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2666
12
reference_url https://access.redhat.com/security/cve/CVE-2022-1271
reference_id CVE-2022-1271
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/
url https://access.redhat.com/security/cve/CVE-2022-1271
13
reference_url https://security-tracker.debian.org/tracker/CVE-2022-1271
reference_id CVE-2022-1271
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/
url https://security-tracker.debian.org/tracker/CVE-2022-1271
14
reference_url https://security.gentoo.org/glsa/202209-01
reference_id GLSA-202209-01
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/
url https://security.gentoo.org/glsa/202209-01
15
reference_url https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html
reference_id msg00011.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/
url https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html
16
reference_url https://security.netapp.com/advisory/ntap-20220930-0006/
reference_id ntap-20220930-0006
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/
url https://security.netapp.com/advisory/ntap-20220930-0006/
17
reference_url https://git.tukaani.org/?p=xz.git%3Ba=commit%3Bh=69d1b3fc29677af8ade8dc15dba83f0589cb63d6
reference_id ?p=xz.git%3Ba=commit%3Bh=69d1b3fc29677af8ade8dc15dba83f0589cb63d6
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/
url https://git.tukaani.org/?p=xz.git%3Ba=commit%3Bh=69d1b3fc29677af8ade8dc15dba83f0589cb63d6
18
reference_url https://access.redhat.com/errata/RHSA-2022:1537
reference_id RHSA-2022:1537
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1537
19
reference_url https://access.redhat.com/errata/RHSA-2022:1592
reference_id RHSA-2022:1592
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1592
20
reference_url https://access.redhat.com/errata/RHSA-2022:1665
reference_id RHSA-2022:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1665
21
reference_url https://access.redhat.com/errata/RHSA-2022:1676
reference_id RHSA-2022:1676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1676
22
reference_url https://access.redhat.com/errata/RHSA-2022:2191
reference_id RHSA-2022:2191
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2191
23
reference_url https://access.redhat.com/errata/RHSA-2022:4582
reference_id RHSA-2022:4582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4582
24
reference_url https://access.redhat.com/errata/RHSA-2022:4896
reference_id RHSA-2022:4896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4896
25
reference_url https://access.redhat.com/errata/RHSA-2022:4940
reference_id RHSA-2022:4940
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4940
26
reference_url https://access.redhat.com/errata/RHSA-2022:4991
reference_id RHSA-2022:4991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4991
27
reference_url https://access.redhat.com/errata/RHSA-2022:4992
reference_id RHSA-2022:4992
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4992
28
reference_url https://access.redhat.com/errata/RHSA-2022:4993
reference_id RHSA-2022:4993
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4993
29
reference_url https://access.redhat.com/errata/RHSA-2022:4994
reference_id RHSA-2022:4994
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4994
30
reference_url https://access.redhat.com/errata/RHSA-2022:5052
reference_id RHSA-2022:5052
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5052
31
reference_url https://access.redhat.com/errata/RHSA-2022:5439
reference_id RHSA-2022:5439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5439
32
reference_url https://usn.ubuntu.com/5378-1/
reference_id USN-5378-1
reference_type
scores
url https://usn.ubuntu.com/5378-1/
33
reference_url https://usn.ubuntu.com/5378-2/
reference_id USN-5378-2
reference_type
scores
url https://usn.ubuntu.com/5378-2/
34
reference_url https://usn.ubuntu.com/5378-3/
reference_id USN-5378-3
reference_type
scores
url https://usn.ubuntu.com/5378-3/
35
reference_url https://usn.ubuntu.com/5378-4/
reference_id USN-5378-4
reference_type
scores
url https://usn.ubuntu.com/5378-4/
36
reference_url https://tukaani.org/xz/xzgrep-ZDI-CAN-16587.patch
reference_id xzgrep-ZDI-CAN-16587.patch
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/
url https://tukaani.org/xz/xzgrep-ZDI-CAN-16587.patch
fixed_packages
aliases CVE-2022-1271
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3adf-qttu-3kfd
1
url VCID-4r5t-4pgd-2qeu
vulnerability_id VCID-4r5t-4pgd-2qeu
summary kernel: heap out of bounds write in nf_dup_netdev.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-25636.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-25636.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-25636
reference_id
reference_type
scores
0
value 0.00366
scoring_system epss
scoring_elements 0.58576
published_at 2026-04-13T12:55:00Z
1
value 0.00366
scoring_system epss
scoring_elements 0.58616
published_at 2026-04-11T12:55:00Z
2
value 0.00366
scoring_system epss
scoring_elements 0.58596
published_at 2026-04-12T12:55:00Z
3
value 0.00366
scoring_system epss
scoring_elements 0.5855
published_at 2026-04-02T12:55:00Z
4
value 0.00366
scoring_system epss
scoring_elements 0.5857
published_at 2026-04-04T12:55:00Z
5
value 0.00366
scoring_system epss
scoring_elements 0.58541
published_at 2026-04-07T12:55:00Z
6
value 0.00366
scoring_system epss
scoring_elements 0.58593
published_at 2026-04-08T12:55:00Z
7
value 0.00366
scoring_system epss
scoring_elements 0.58599
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-25636
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36310
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25636
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2056830
reference_id 2056830
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2056830
11
reference_url https://security.archlinux.org/AVG-2653
reference_id AVG-2653
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2653
12
reference_url https://access.redhat.com/errata/RHSA-2022:1413
reference_id RHSA-2022:1413
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1413
13
reference_url https://access.redhat.com/errata/RHSA-2022:1418
reference_id RHSA-2022:1418
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1418
14
reference_url https://access.redhat.com/errata/RHSA-2022:1455
reference_id RHSA-2022:1455
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1455
15
reference_url https://access.redhat.com/errata/RHSA-2022:1535
reference_id RHSA-2022:1535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1535
16
reference_url https://access.redhat.com/errata/RHSA-2022:1550
reference_id RHSA-2022:1550
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1550
17
reference_url https://access.redhat.com/errata/RHSA-2022:1555
reference_id RHSA-2022:1555
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1555
18
reference_url https://access.redhat.com/errata/RHSA-2022:4896
reference_id RHSA-2022:4896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4896
19
reference_url https://usn.ubuntu.com/5317-1/
reference_id USN-5317-1
reference_type
scores
url https://usn.ubuntu.com/5317-1/
20
reference_url https://usn.ubuntu.com/5318-1/
reference_id USN-5318-1
reference_type
scores
url https://usn.ubuntu.com/5318-1/
21
reference_url https://usn.ubuntu.com/5362-1/
reference_id USN-5362-1
reference_type
scores
url https://usn.ubuntu.com/5362-1/
fixed_packages
aliases CVE-2022-25636
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4r5t-4pgd-2qeu
2
url VCID-gsbn-6t86-7kf9
vulnerability_id VCID-gsbn-6t86-7kf9
summary
Loop with Unreachable Exit Condition ('Infinite Loop')
The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters
references
0
reference_url http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0778
reference_id
reference_type
scores
0
value 0.06432
scoring_system epss
scoring_elements 0.91023
published_at 2026-04-04T12:55:00Z
1
value 0.07109
scoring_system epss
scoring_elements 0.91513
published_at 2026-04-07T12:55:00Z
2
value 0.07109
scoring_system epss
scoring_elements 0.91526
published_at 2026-04-08T12:55:00Z
3
value 0.07109
scoring_system epss
scoring_elements 0.91532
published_at 2026-04-09T12:55:00Z
4
value 0.07394
scoring_system epss
scoring_elements 0.91693
published_at 2026-04-01T12:55:00Z
5
value 0.07394
scoring_system epss
scoring_elements 0.91701
published_at 2026-04-02T12:55:00Z
6
value 0.07807
scoring_system epss
scoring_elements 0.91978
published_at 2026-04-13T12:55:00Z
7
value 0.08117
scoring_system epss
scoring_elements 0.92165
published_at 2026-04-11T12:55:00Z
8
value 0.08117
scoring_system epss
scoring_elements 0.92166
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0778
3
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4160
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4160
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
6
reference_url http://seclists.org/fulldisclosure/2022/May/33
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://seclists.org/fulldisclosure/2022/May/33
7
reference_url http://seclists.org/fulldisclosure/2022/May/35
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://seclists.org/fulldisclosure/2022/May/35
8
reference_url http://seclists.org/fulldisclosure/2022/May/38
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://seclists.org/fulldisclosure/2022/May/38
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65
11
reference_url https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83
12
reference_url https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246
13
reference_url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
14
reference_url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
15
reference_url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
16
reference_url https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
17
reference_url https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG
24
reference_url https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
25
reference_url https://rustsec.org/advisories/RUSTSEC-2022-0014.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://rustsec.org/advisories/RUSTSEC-2022-0014.html
26
reference_url https://security.netapp.com/advisory/ntap-20220321-0002
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20220321-0002
27
reference_url https://security.netapp.com/advisory/ntap-20220321-0002/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20220321-0002/
28
reference_url https://security.netapp.com/advisory/ntap-20220429-0005
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20220429-0005
29
reference_url https://security.netapp.com/advisory/ntap-20240621-0006
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20240621-0006
30
reference_url https://support.apple.com/kb/HT213255
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://support.apple.com/kb/HT213255
31
reference_url https://support.apple.com/kb/HT213256
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://support.apple.com/kb/HT213256
32
reference_url https://support.apple.com/kb/HT213257
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://support.apple.com/kb/HT213257
33
reference_url https://www.debian.org/security/2022/dsa-5103
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2022/dsa-5103
34
reference_url https://www.openssl.org/news/secadv/20220315.txt
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.openssl.org/news/secadv/20220315.txt
35
reference_url https://www.oracle.com/security-alerts/cpuapr2022.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuapr2022.html
36
reference_url https://www.oracle.com/security-alerts/cpujul2022.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpujul2022.html
37
reference_url https://www.tenable.com/security/tns-2022-06
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.tenable.com/security/tns-2022-06
38
reference_url https://www.tenable.com/security/tns-2022-07
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.tenable.com/security/tns-2022-07
39
reference_url https://www.tenable.com/security/tns-2022-08
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.tenable.com/security/tns-2022-08
40
reference_url https://www.tenable.com/security/tns-2022-09
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.tenable.com/security/tns-2022-09
41
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2062202
reference_id 2062202
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2062202
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-0778
reference_id CVE-2022-0778
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-0778
43
reference_url https://github.com/advisories/GHSA-x3mh-jvjw-3xwx
reference_id GHSA-x3mh-jvjw-3xwx
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-x3mh-jvjw-3xwx
44
reference_url https://security.gentoo.org/glsa/202210-02
reference_id GLSA-202210-02
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/202210-02
45
reference_url https://security.gentoo.org/glsa/202405-29
reference_id GLSA-202405-29
reference_type
scores
url https://security.gentoo.org/glsa/202405-29
46
reference_url https://access.redhat.com/errata/RHSA-2022:1065
reference_id RHSA-2022:1065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1065
47
reference_url https://access.redhat.com/errata/RHSA-2022:1066
reference_id RHSA-2022:1066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1066
48
reference_url https://access.redhat.com/errata/RHSA-2022:1071
reference_id RHSA-2022:1071
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1071
49
reference_url https://access.redhat.com/errata/RHSA-2022:1073
reference_id RHSA-2022:1073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1073
50
reference_url https://access.redhat.com/errata/RHSA-2022:1076
reference_id RHSA-2022:1076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1076
51
reference_url https://access.redhat.com/errata/RHSA-2022:1077
reference_id RHSA-2022:1077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1077
52
reference_url https://access.redhat.com/errata/RHSA-2022:1078
reference_id RHSA-2022:1078
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1078
53
reference_url https://access.redhat.com/errata/RHSA-2022:1082
reference_id RHSA-2022:1082
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1082
54
reference_url https://access.redhat.com/errata/RHSA-2022:1091
reference_id RHSA-2022:1091
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1091
55
reference_url https://access.redhat.com/errata/RHSA-2022:1112
reference_id RHSA-2022:1112
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1112
56
reference_url https://access.redhat.com/errata/RHSA-2022:1263
reference_id RHSA-2022:1263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1263
57
reference_url https://access.redhat.com/errata/RHSA-2022:1389
reference_id RHSA-2022:1389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1389
58
reference_url https://access.redhat.com/errata/RHSA-2022:1390
reference_id RHSA-2022:1390
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1390
59
reference_url https://access.redhat.com/errata/RHSA-2022:1519
reference_id RHSA-2022:1519
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1519
60
reference_url https://access.redhat.com/errata/RHSA-2022:1520
reference_id RHSA-2022:1520
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1520
61
reference_url https://access.redhat.com/errata/RHSA-2022:4896
reference_id RHSA-2022:4896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4896
62
reference_url https://access.redhat.com/errata/RHSA-2022:4899
reference_id RHSA-2022:4899
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4899
63
reference_url https://access.redhat.com/errata/RHSA-2022:5326
reference_id RHSA-2022:5326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5326
64
reference_url https://usn.ubuntu.com/5328-1/
reference_id USN-5328-1
reference_type
scores
url https://usn.ubuntu.com/5328-1/
65
reference_url https://usn.ubuntu.com/5328-2/
reference_id USN-5328-2
reference_type
scores
url https://usn.ubuntu.com/5328-2/
66
reference_url https://usn.ubuntu.com/6457-1/
reference_id USN-6457-1
reference_type
scores
url https://usn.ubuntu.com/6457-1/
67
reference_url https://usn.ubuntu.com/7894-1/
reference_id USN-7894-1
reference_type
scores
url https://usn.ubuntu.com/7894-1/
fixed_packages
aliases CVE-2022-0778, GHSA-x3mh-jvjw-3xwx
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gsbn-6t86-7kf9
3
url VCID-m1fw-z29h-ubdn
vulnerability_id VCID-m1fw-z29h-ubdn
summary kernel: use-after-free in RDMA listen()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4028.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4028.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4028
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09528
published_at 2026-04-01T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09591
published_at 2026-04-13T12:55:00Z
2
value 0.00033
scoring_system epss
scoring_elements 0.09505
published_at 2026-04-07T12:55:00Z
3
value 0.00033
scoring_system epss
scoring_elements 0.0958
published_at 2026-04-08T12:55:00Z
4
value 0.00033
scoring_system epss
scoring_elements 0.09629
published_at 2026-04-09T12:55:00Z
5
value 0.00033
scoring_system epss
scoring_elements 0.09638
published_at 2026-04-11T12:55:00Z
6
value 0.00033
scoring_system epss
scoring_elements 0.09607
published_at 2026-04-12T12:55:00Z
7
value 0.00033
scoring_system epss
scoring_elements 0.09542
published_at 2026-04-02T12:55:00Z
8
value 0.00033
scoring_system epss
scoring_elements 0.09592
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4028
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4028
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2027201
reference_id 2027201
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2027201
5
reference_url https://security.archlinux.org/AVG-1741
reference_id AVG-1741
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1741
6
reference_url https://security.archlinux.org/AVG-1879
reference_id AVG-1879
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1879
7
reference_url https://security.archlinux.org/AVG-1880
reference_id AVG-1880
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1880
8
reference_url https://security.archlinux.org/AVG-1881
reference_id AVG-1881
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1881
9
reference_url https://access.redhat.com/errata/RHSA-2022:0590
reference_id RHSA-2022:0590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0590
10
reference_url https://access.redhat.com/errata/RHSA-2022:0629
reference_id RHSA-2022:0629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0629
11
reference_url https://access.redhat.com/errata/RHSA-2022:0636
reference_id RHSA-2022:0636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0636
12
reference_url https://access.redhat.com/errata/RHSA-2022:0771
reference_id RHSA-2022:0771
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0771
13
reference_url https://access.redhat.com/errata/RHSA-2022:0772
reference_id RHSA-2022:0772
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0772
14
reference_url https://access.redhat.com/errata/RHSA-2022:0777
reference_id RHSA-2022:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0777
15
reference_url https://access.redhat.com/errata/RHSA-2022:0823
reference_id RHSA-2022:0823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0823
16
reference_url https://access.redhat.com/errata/RHSA-2022:0851
reference_id RHSA-2022:0851
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0851
17
reference_url https://access.redhat.com/errata/RHSA-2022:0958
reference_id RHSA-2022:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0958
18
reference_url https://access.redhat.com/errata/RHSA-2022:1185
reference_id RHSA-2022:1185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1185
19
reference_url https://access.redhat.com/errata/RHSA-2022:1198
reference_id RHSA-2022:1198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1198
20
reference_url https://access.redhat.com/errata/RHSA-2022:1199
reference_id RHSA-2022:1199
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1199
21
reference_url https://access.redhat.com/errata/RHSA-2022:1263
reference_id RHSA-2022:1263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1263
22
reference_url https://access.redhat.com/errata/RHSA-2022:1324
reference_id RHSA-2022:1324
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1324
23
reference_url https://access.redhat.com/errata/RHSA-2022:1373
reference_id RHSA-2022:1373
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1373
24
reference_url https://access.redhat.com/errata/RHSA-2022:1535
reference_id RHSA-2022:1535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1535
25
reference_url https://access.redhat.com/errata/RHSA-2022:1550
reference_id RHSA-2022:1550
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1550
26
reference_url https://access.redhat.com/errata/RHSA-2022:1555
reference_id RHSA-2022:1555
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1555
27
reference_url https://access.redhat.com/errata/RHSA-2022:2186
reference_id RHSA-2022:2186
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2186
28
reference_url https://access.redhat.com/errata/RHSA-2022:2188
reference_id RHSA-2022:2188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2188
29
reference_url https://access.redhat.com/errata/RHSA-2022:2189
reference_id RHSA-2022:2189
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2189
30
reference_url https://access.redhat.com/errata/RHSA-2022:2211
reference_id RHSA-2022:2211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2211
31
reference_url https://access.redhat.com/errata/RHSA-2022:4896
reference_id RHSA-2022:4896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4896
fixed_packages
aliases CVE-2021-4028
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m1fw-z29h-ubdn
4
url VCID-u4gb-1hyn-m7g4
vulnerability_id VCID-u4gb-1hyn-m7g4
summary kernel: fget: check that the fd still exists after getting a ref to it
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4083.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4083.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4083
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01551
published_at 2026-04-01T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01564
published_at 2026-04-02T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01568
published_at 2026-04-04T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01571
published_at 2026-04-11T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01574
published_at 2026-04-08T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01581
published_at 2026-04-09T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01563
published_at 2026-04-12T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.01562
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4083
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375
53
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
54
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2029923
reference_id 2029923
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2029923
55
reference_url https://access.redhat.com/errata/RHSA-2022:0820
reference_id RHSA-2022:0820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0820
56
reference_url https://access.redhat.com/errata/RHSA-2022:0821
reference_id RHSA-2022:0821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0821
57
reference_url https://access.redhat.com/errata/RHSA-2022:0823
reference_id RHSA-2022:0823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0823
58
reference_url https://access.redhat.com/errata/RHSA-2022:0851
reference_id RHSA-2022:0851
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0851
59
reference_url https://access.redhat.com/errata/RHSA-2022:0925
reference_id RHSA-2022:0925
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0925
60
reference_url https://access.redhat.com/errata/RHSA-2022:0958
reference_id RHSA-2022:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0958
61
reference_url https://access.redhat.com/errata/RHSA-2022:1103
reference_id RHSA-2022:1103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1103
62
reference_url https://access.redhat.com/errata/RHSA-2022:1104
reference_id RHSA-2022:1104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1104
63
reference_url https://access.redhat.com/errata/RHSA-2022:1107
reference_id RHSA-2022:1107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1107
64
reference_url https://access.redhat.com/errata/RHSA-2022:1185
reference_id RHSA-2022:1185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1185
65
reference_url https://access.redhat.com/errata/RHSA-2022:1198
reference_id RHSA-2022:1198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1198
66
reference_url https://access.redhat.com/errata/RHSA-2022:1199
reference_id RHSA-2022:1199
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1199
67
reference_url https://access.redhat.com/errata/RHSA-2022:1263
reference_id RHSA-2022:1263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1263
68
reference_url https://access.redhat.com/errata/RHSA-2022:1324
reference_id RHSA-2022:1324
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1324
69
reference_url https://access.redhat.com/errata/RHSA-2022:1373
reference_id RHSA-2022:1373
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1373
70
reference_url https://access.redhat.com/errata/RHSA-2022:1413
reference_id RHSA-2022:1413
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1413
71
reference_url https://access.redhat.com/errata/RHSA-2022:1418
reference_id RHSA-2022:1418
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1418
72
reference_url https://access.redhat.com/errata/RHSA-2022:1455
reference_id RHSA-2022:1455
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1455
73
reference_url https://access.redhat.com/errata/RHSA-2022:1975
reference_id RHSA-2022:1975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1975
74
reference_url https://access.redhat.com/errata/RHSA-2022:1988
reference_id RHSA-2022:1988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1988
75
reference_url https://access.redhat.com/errata/RHSA-2022:2189
reference_id RHSA-2022:2189
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2189
76
reference_url https://access.redhat.com/errata/RHSA-2022:4896
reference_id RHSA-2022:4896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4896
77
reference_url https://usn.ubuntu.com/5278-1/
reference_id USN-5278-1
reference_type
scores
url https://usn.ubuntu.com/5278-1/
78
reference_url https://usn.ubuntu.com/5294-1/
reference_id USN-5294-1
reference_type
scores
url https://usn.ubuntu.com/5294-1/
79
reference_url https://usn.ubuntu.com/5294-2/
reference_id USN-5294-2
reference_type
scores
url https://usn.ubuntu.com/5294-2/
80
reference_url https://usn.ubuntu.com/5295-1/
reference_id USN-5295-1
reference_type
scores
url https://usn.ubuntu.com/5295-1/
81
reference_url https://usn.ubuntu.com/5295-2/
reference_id USN-5295-2
reference_type
scores
url https://usn.ubuntu.com/5295-2/
82
reference_url https://usn.ubuntu.com/5297-1/
reference_id USN-5297-1
reference_type
scores
url https://usn.ubuntu.com/5297-1/
83
reference_url https://usn.ubuntu.com/5298-1/
reference_id USN-5298-1
reference_type
scores
url https://usn.ubuntu.com/5298-1/
84
reference_url https://usn.ubuntu.com/5361-1/
reference_id USN-5361-1
reference_type
scores
url https://usn.ubuntu.com/5361-1/
85
reference_url https://usn.ubuntu.com/5362-1/
reference_id USN-5362-1
reference_type
scores
url https://usn.ubuntu.com/5362-1/
fixed_packages
aliases CVE-2021-4083
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u4gb-1hyn-m7g4
5
url VCID-xd6j-x83x-r3gn
vulnerability_id VCID-xd6j-x83x-r3gn
summary
Out-of-bounds Write
zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-25032.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-25032.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-25032
reference_id
reference_type
scores
0
value 0.00081
scoring_system epss
scoring_elements 0.24064
published_at 2026-04-02T12:55:00Z
1
value 0.00081
scoring_system epss
scoring_elements 0.24102
published_at 2026-04-04T12:55:00Z
2
value 0.00081
scoring_system epss
scoring_elements 0.23937
published_at 2026-04-01T12:55:00Z
3
value 0.00089
scoring_system epss
scoring_elements 0.25394
published_at 2026-04-09T12:55:00Z
4
value 0.00089
scoring_system epss
scoring_elements 0.2535
published_at 2026-04-08T12:55:00Z
5
value 0.00089
scoring_system epss
scoring_elements 0.25282
published_at 2026-04-07T12:55:00Z
6
value 0.00089
scoring_system epss
scoring_elements 0.25311
published_at 2026-04-13T12:55:00Z
7
value 0.00089
scoring_system epss
scoring_elements 0.25364
published_at 2026-04-12T12:55:00Z
8
value 0.00089
scoring_system epss
scoring_elements 0.25406
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-25032
2
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
4
reference_url http://seclists.org/fulldisclosure/2022/May/33
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url http://seclists.org/fulldisclosure/2022/May/33
5
reference_url http://seclists.org/fulldisclosure/2022/May/35
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url http://seclists.org/fulldisclosure/2022/May/35
6
reference_url http://seclists.org/fulldisclosure/2022/May/38
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url http://seclists.org/fulldisclosure/2022/May/38
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
9
reference_url https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
10
reference_url https://github.com/madler/zlib/issues/605
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://github.com/madler/zlib/issues/605
11
reference_url https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
12
reference_url https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
13
reference_url https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/
16
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
26
reference_url https://security.gentoo.org/glsa/202210-42
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://security.gentoo.org/glsa/202210-42
27
reference_url https://security.netapp.com/advisory/ntap-20220526-0009
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20220526-0009
28
reference_url https://security.netapp.com/advisory/ntap-20220526-0009/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://security.netapp.com/advisory/ntap-20220526-0009/
29
reference_url https://security.netapp.com/advisory/ntap-20220729-0004
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20220729-0004
30
reference_url https://security.netapp.com/advisory/ntap-20220729-0004/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://security.netapp.com/advisory/ntap-20220729-0004/
31
reference_url https://support.apple.com/kb/HT213255
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://support.apple.com/kb/HT213255
32
reference_url https://support.apple.com/kb/HT213256
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://support.apple.com/kb/HT213256
33
reference_url https://support.apple.com/kb/HT213257
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://support.apple.com/kb/HT213257
34
reference_url https://www.debian.org/security/2022/dsa-5111
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://www.debian.org/security/2022/dsa-5111
35
reference_url https://www.openwall.com/lists/oss-security/2022/03/24/1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://www.openwall.com/lists/oss-security/2022/03/24/1
36
reference_url https://www.openwall.com/lists/oss-security/2022/03/28/1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://www.openwall.com/lists/oss-security/2022/03/28/1
37
reference_url https://www.openwall.com/lists/oss-security/2022/03/28/3
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://www.openwall.com/lists/oss-security/2022/03/28/3
38
reference_url https://www.oracle.com/security-alerts/cpujul2022.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://www.oracle.com/security-alerts/cpujul2022.html
39
reference_url http://www.openwall.com/lists/oss-security/2022/03/25/2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url http://www.openwall.com/lists/oss-security/2022/03/25/2
40
reference_url http://www.openwall.com/lists/oss-security/2022/03/26/1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url http://www.openwall.com/lists/oss-security/2022/03/26/1
41
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1008265
reference_id 1008265
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1008265
42
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2067945
reference_id 2067945
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2067945
43
reference_url https://security.archlinux.org/ASA-202204-3
reference_id ASA-202204-3
reference_type
scores
url https://security.archlinux.org/ASA-202204-3
44
reference_url https://security.archlinux.org/AVG-2657
reference_id AVG-2657
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2657
45
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-25032
reference_id CVE-2018-25032
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2018-25032
46
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2018-25032.yml
reference_id CVE-2018-25032.YML
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2018-25032.yml
47
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/
reference_id DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/
48
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/
reference_id DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/
49
reference_url https://github.com/advisories/GHSA-jc36-42cf-vqwj
reference_id GHSA-jc36-42cf-vqwj
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-jc36-42cf-vqwj
50
reference_url https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
reference_id GHSA-v6gp-9mmm-c6p5
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
51
reference_url https://security.gentoo.org/glsa/202405-22
reference_id GLSA-202405-22
reference_type
scores
url https://security.gentoo.org/glsa/202405-22
52
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/
reference_id JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/
53
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
reference_id NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
54
reference_url https://access.redhat.com/errata/RHSA-2022:1591
reference_id RHSA-2022:1591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1591
55
reference_url https://access.redhat.com/errata/RHSA-2022:1642
reference_id RHSA-2022:1642
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1642
56
reference_url https://access.redhat.com/errata/RHSA-2022:1661
reference_id RHSA-2022:1661
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1661
57
reference_url https://access.redhat.com/errata/RHSA-2022:2192
reference_id RHSA-2022:2192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2192
58
reference_url https://access.redhat.com/errata/RHSA-2022:2197
reference_id RHSA-2022:2197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2197
59
reference_url https://access.redhat.com/errata/RHSA-2022:2198
reference_id RHSA-2022:2198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2198
60
reference_url https://access.redhat.com/errata/RHSA-2022:2201
reference_id RHSA-2022:2201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2201
61
reference_url https://access.redhat.com/errata/RHSA-2022:2213
reference_id RHSA-2022:2213
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2213
62
reference_url https://access.redhat.com/errata/RHSA-2022:2214
reference_id RHSA-2022:2214
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2214
63
reference_url https://access.redhat.com/errata/RHSA-2022:4584
reference_id RHSA-2022:4584
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4584
64
reference_url https://access.redhat.com/errata/RHSA-2022:4592
reference_id RHSA-2022:4592
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4592
65
reference_url https://access.redhat.com/errata/RHSA-2022:4845
reference_id RHSA-2022:4845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4845
66
reference_url https://access.redhat.com/errata/RHSA-2022:4896
reference_id RHSA-2022:4896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4896
67
reference_url https://access.redhat.com/errata/RHSA-2022:5439
reference_id RHSA-2022:5439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5439
68
reference_url https://access.redhat.com/errata/RHSA-2022:7144
reference_id RHSA-2022:7144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7144
69
reference_url https://access.redhat.com/errata/RHSA-2022:7813
reference_id RHSA-2022:7813
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7813
70
reference_url https://access.redhat.com/errata/RHSA-2022:8420
reference_id RHSA-2022:8420
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8420
71
reference_url https://access.redhat.com/errata/RHSA-2023:0943
reference_id RHSA-2023:0943
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0943
72
reference_url https://access.redhat.com/errata/RHSA-2023:0975
reference_id RHSA-2023:0975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0975
73
reference_url https://access.redhat.com/errata/RHSA-2023:0976
reference_id RHSA-2023:0976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0976
74
reference_url https://usn.ubuntu.com/5355-1/
reference_id USN-5355-1
reference_type
scores
url https://usn.ubuntu.com/5355-1/
75
reference_url https://usn.ubuntu.com/5355-2/
reference_id USN-5355-2
reference_type
scores
url https://usn.ubuntu.com/5355-2/
76
reference_url https://usn.ubuntu.com/5359-1/
reference_id USN-5359-1
reference_type
scores
url https://usn.ubuntu.com/5359-1/
77
reference_url https://usn.ubuntu.com/5359-2/
reference_id USN-5359-2
reference_type
scores
url https://usn.ubuntu.com/5359-2/
78
reference_url https://usn.ubuntu.com/5739-1/
reference_id USN-5739-1
reference_type
scores
url https://usn.ubuntu.com/5739-1/
79
reference_url https://usn.ubuntu.com/6736-1/
reference_id USN-6736-1
reference_type
scores
url https://usn.ubuntu.com/6736-1/
80
reference_url https://usn.ubuntu.com/6736-2/
reference_id USN-6736-2
reference_type
scores
url https://usn.ubuntu.com/6736-2/
81
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
reference_id VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
82
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
reference_id XOKFMSNQ5D5WGMALBNBXU3GE442V74WU
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
fixed_packages
aliases CVE-2018-25032, GHSA-jc36-42cf-vqwj
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xd6j-x83x-r3gn
6
url VCID-ybfq-unp3-dbav
vulnerability_id VCID-ybfq-unp3-dbav
summary A vulnerability has been discovered in rsyslog, which could possibly lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24903.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24903.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-24903
reference_id
reference_type
scores
0
value 0.00501
scoring_system epss
scoring_elements 0.66004
published_at 2026-04-13T12:55:00Z
1
value 0.00501
scoring_system epss
scoring_elements 0.66034
published_at 2026-04-12T12:55:00Z
2
value 0.00781
scoring_system epss
scoring_elements 0.73676
published_at 2026-04-04T12:55:00Z
3
value 0.00781
scoring_system epss
scoring_elements 0.73652
published_at 2026-04-02T12:55:00Z
4
value 0.00781
scoring_system epss
scoring_elements 0.73697
published_at 2026-04-09T12:55:00Z
5
value 0.00781
scoring_system epss
scoring_elements 0.73683
published_at 2026-04-08T12:55:00Z
6
value 0.00781
scoring_system epss
scoring_elements 0.73648
published_at 2026-04-07T12:55:00Z
7
value 0.00781
scoring_system epss
scoring_elements 0.73718
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-24903
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24903
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010619
reference_id 1010619
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010619
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2081353
reference_id 2081353
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2081353
6
reference_url https://www.debian.org/security/2022/dsa-5150
reference_id dsa-5150
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:53:40Z/
url https://www.debian.org/security/2022/dsa-5150
7
reference_url https://github.com/rsyslog/rsyslog/commit/f211042ecbb472f9d8beb4678a65d272b6f07705
reference_id f211042ecbb472f9d8beb4678a65d272b6f07705
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:53:40Z/
url https://github.com/rsyslog/rsyslog/commit/f211042ecbb472f9d8beb4678a65d272b6f07705
8
reference_url https://github.com/rsyslog/rsyslog/security/advisories/GHSA-ggw7-xr6h-mmr8
reference_id GHSA-ggw7-xr6h-mmr8
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:53:40Z/
url https://github.com/rsyslog/rsyslog/security/advisories/GHSA-ggw7-xr6h-mmr8
9
reference_url https://security.gentoo.org/glsa/202408-28
reference_id GLSA-202408-28
reference_type
scores
url https://security.gentoo.org/glsa/202408-28
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GMNNXLCU2UORRVSZO24HL4KMVPK5PHVW/
reference_id GMNNXLCU2UORRVSZO24HL4KMVPK5PHVW
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:53:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GMNNXLCU2UORRVSZO24HL4KMVPK5PHVW/
11
reference_url https://security.netapp.com/advisory/ntap-20221111-0002/
reference_id ntap-20221111-0002
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:53:40Z/
url https://security.netapp.com/advisory/ntap-20221111-0002/
12
reference_url https://access.redhat.com/errata/RHSA-2022:4795
reference_id RHSA-2022:4795
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4795
13
reference_url https://access.redhat.com/errata/RHSA-2022:4799
reference_id RHSA-2022:4799
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4799
14
reference_url https://access.redhat.com/errata/RHSA-2022:4800
reference_id RHSA-2022:4800
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4800
15
reference_url https://access.redhat.com/errata/RHSA-2022:4801
reference_id RHSA-2022:4801
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4801
16
reference_url https://access.redhat.com/errata/RHSA-2022:4802
reference_id RHSA-2022:4802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4802
17
reference_url https://access.redhat.com/errata/RHSA-2022:4803
reference_id RHSA-2022:4803
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4803
18
reference_url https://access.redhat.com/errata/RHSA-2022:4808
reference_id RHSA-2022:4808
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4808
19
reference_url https://access.redhat.com/errata/RHSA-2022:4896
reference_id RHSA-2022:4896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4896
20
reference_url https://access.redhat.com/errata/RHSA-2022:5439
reference_id RHSA-2022:5439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5439
21
reference_url https://usn.ubuntu.com/5404-1/
reference_id USN-5404-1
reference_type
scores
url https://usn.ubuntu.com/5404-1/
22
reference_url https://usn.ubuntu.com/5404-2/
reference_id USN-5404-2
reference_type
scores
url https://usn.ubuntu.com/5404-2/
fixed_packages
aliases CVE-2022-24903
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ybfq-unp3-dbav
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/redhat-virtualization-host@4.5.0-202205291010_8%3Farch=6