{"url":"http://public2.vulnerablecode.io/api/packages/99217?format=json","purl":"pkg:rpm/redhat/redhat-virtualization-host@4.3.22-20220330.1?arch=el7_9","type":"rpm","namespace":"redhat","name":"redhat-virtualization-host","version":"4.3.22-20220330.1","qualifiers":{"arch":"el7_9"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79828?format=json","vulnerability_id":"VCID-45du-dgkd-p3b8","summary":"kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4155.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4155.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4155","reference_id":"","reference_type":"","scores":[{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05306","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05347","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05378","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05387","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0542","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05443","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05416","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05403","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05396","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05345","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0551","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05547","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05584","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05585","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05591","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05646","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05732","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05744","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05748","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05753","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4155"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034813","reference_id":"2034813","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034813"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0176","reference_id":"RHSA-2022:0176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0176"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0186","reference_id":"RHSA-2022:0186","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0186"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0187","reference_id":"RHSA-2022:0187","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0187"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0188","reference_id":"RHSA-2022:0188","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0188"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0231","reference_id":"RHSA-2022:0231","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0231"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0232","reference_id":"RHSA-2022:0232","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0232"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0335","reference_id":"RHSA-2022:0335","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0335"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0344","reference_id":"RHSA-2022:0344","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0344"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0529","reference_id":"RHSA-2022:0529","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0529"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0530","reference_id":"RHSA-2022:0530","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0530"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0531","reference_id":"RHSA-2022:0531","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0531"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0533","reference_id":"RHSA-2022:0533","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0533"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0540","reference_id":"RHSA-2022:0540","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0540"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0590","reference_id":"RHSA-2022:0590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0592","reference_id":"RHSA-2022:0592","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0592"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0620","reference_id":"RHSA-2022:0620","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0620"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0622","reference_id":"RHSA-2022:0622","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0622"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0629","reference_id":"RHSA-2022:0629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0636","reference_id":"RHSA-2022:0636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0712","reference_id":"RHSA-2022:0712","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0712"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0718","reference_id":"RHSA-2022:0718","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0718"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0958","reference_id":"RHSA-2022:0958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1263","reference_id":"RHSA-2022:1263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1263"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1417","reference_id":"RHSA-2022:1417","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1417"},{"reference_url":"https://usn.ubuntu.com/5278-1/","reference_id":"USN-5278-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5278-1/"},{"reference_url":"https://usn.ubuntu.com/5294-1/","reference_id":"USN-5294-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5294-1/"},{"reference_url":"https://usn.ubuntu.com/5294-2/","reference_id":"USN-5294-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5294-2/"},{"reference_url":"https://usn.ubuntu.com/5295-1/","reference_id":"USN-5295-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5295-1/"},{"reference_url":"https://usn.ubuntu.com/5295-2/","reference_id":"USN-5295-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5295-2/"},{"reference_url":"https://usn.ubuntu.com/5297-1/","reference_id":"USN-5297-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5297-1/"},{"reference_url":"https://usn.ubuntu.com/5298-1/","reference_id":"USN-5298-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5298-1/"},{"reference_url":"https://usn.ubuntu.com/5362-1/","reference_id":"USN-5362-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5362-1/"},{"reference_url":"https://usn.ubuntu.com/5884-1/","reference_id":"USN-5884-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5884-1/"},{"reference_url":"https://usn.ubuntu.com/5926-1/","reference_id":"USN-5926-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5926-1/"}],"fixed_packages":[],"aliases":["CVE-2021-4155"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-45du-dgkd-p3b8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31416?format=json","vulnerability_id":"VCID-cy2n-zexk-jyda","summary":"Multiple vulnerabilities have been discovered in Expat, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-25315.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-25315.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-25315","reference_id":"","reference_type":"","scores":[{"value":"0.07704","scoring_system":"epss","scoring_elements":"0.91903","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07704","scoring_system":"epss","scoring_elements":"0.91915","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07704","scoring_system":"epss","scoring_elements":"0.91896","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07704","scoring_system":"epss","scoring_elements":"0.91888","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07704","scoring_system":"epss","scoring_elements":"0.91974","published_at":"2026-05-12T12:55:00Z"},{"value":"0.07704","scoring_system":"epss","scoring_elements":"0.91967","published_at":"2026-05-11T12:55:00Z"},{"value":"0.07704","scoring_system":"epss","scoring_elements":"0.91968","published_at":"2026-05-09T12:55:00Z"},{"value":"0.07704","scoring_system":"epss","scoring_elements":"0.91958","published_at":"2026-05-07T12:55:00Z"},{"value":"0.07704","scoring_system":"epss","scoring_elements":"0.91945","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07704","scoring_system":"epss","scoring_elements":"0.91932","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07704","scoring_system":"epss","scoring_elements":"0.91937","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07704","scoring_system":"epss","scoring_elements":"0.91938","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07704","scoring_system":"epss","scoring_elements":"0.91933","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07704","scoring_system":"epss","scoring_elements":"0.91936","published_at":"2026-04-18T12:55:00Z"},{"value":"0.07704","scoring_system":"epss","scoring_elements":"0.91939","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07704","scoring_system":"epss","scoring_elements":"0.9192","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07704","scoring_system":"epss","scoring_elements":"0.91923","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07704","scoring_system":"epss","scoring_elements":"0.91924","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07704","scoring_system":"epss","scoring_elements":"0.91921","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08995","scoring_system":"epss","scoring_elements":"0.92694","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-25315"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25314","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25314"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/02/19/1","reference_id":"1","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:38Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/02/19/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2056363","reference_id":"2056363","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2056363"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/","reference_id":"3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:38Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/"},{"reference_url":"https://github.com/libexpat/libexpat/pull/559","reference_id":"559","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:38Z/"}],"url":"https://github.com/libexpat/libexpat/pull/559"},{"reference_url":"https://www.debian.org/security/2022/dsa-5085","reference_id":"dsa-5085","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:38Z/"}],"url":"https://www.debian.org/security/2022/dsa-5085"},{"reference_url":"https://security.gentoo.org/glsa/202209-24","reference_id":"GLSA-202209-24","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:38Z/"}],"url":"https://security.gentoo.org/glsa/202209-24"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html","reference_id":"msg00007.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:38Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220303-0008/","reference_id":"ntap-20220303-0008","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:38Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220303-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0815","reference_id":"RHSA-2022:0815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0815"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0816","reference_id":"RHSA-2022:0816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0817","reference_id":"RHSA-2022:0817","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0817"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0818","reference_id":"RHSA-2022:0818","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0818"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0824","reference_id":"RHSA-2022:0824","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0824"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0843","reference_id":"RHSA-2022:0843","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0843"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0845","reference_id":"RHSA-2022:0845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0847","reference_id":"RHSA-2022:0847","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0847"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0850","reference_id":"RHSA-2022:0850","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0850"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0853","reference_id":"RHSA-2022:0853","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0853"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0951","reference_id":"RHSA-2022:0951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1012","reference_id":"RHSA-2022:1012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1053","reference_id":"RHSA-2022:1053","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1053"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1068","reference_id":"RHSA-2022:1068","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1068"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1069","reference_id":"RHSA-2022:1069","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1069"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1070","reference_id":"RHSA-2022:1070","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1070"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1263","reference_id":"RHSA-2022:1263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1263"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1309","reference_id":"RHSA-2022:1309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7144","reference_id":"RHSA-2022:7144","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7144"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7811","reference_id":"RHSA-2022:7811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7811"},{"reference_url":"https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf","reference_id":"ssa-484086.pdf","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:38Z/"}],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf"},{"reference_url":"https://usn.ubuntu.com/5320-1/","reference_id":"USN-5320-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5320-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/","reference_id":"Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:38Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/"}],"fixed_packages":[],"aliases":["CVE-2022-25315"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cy2n-zexk-jyda"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/13325?format=json","vulnerability_id":"VCID-gsbn-6t86-7kf9","summary":"Loop with Unreachable Exit Condition ('Infinite Loop')\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters","references":[{"reference_url":"http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-0778","reference_id":"","reference_type":"","scores":[{"value":"0.05863","scoring_system":"epss","scoring_elements":"0.90588","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05863","scoring_system":"epss","scoring_elements":"0.90631","published_at":"2026-05-09T12:55:00Z"},{"value":"0.05863","scoring_system":"epss","scoring_elements":"0.90618","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05863","scoring_system":"epss","scoring_elements":"0.90592","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06432","scoring_system":"epss","scoring_elements":"0.91023","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06449","scoring_system":"epss","scoring_elements":"0.9115","published_at":"2026-05-12T12:55:00Z"},{"value":"0.06449","scoring_system":"epss","scoring_elements":"0.91142","published_at":"2026-05-11T12:55:00Z"},{"value":"0.06486","scoring_system":"epss","scoring_elements":"0.91133","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06863","scoring_system":"epss","scoring_elements":"0.91417","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07109","scoring_system":"epss","scoring_elements":"0.91513","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07109","scoring_system":"epss","scoring_elements":"0.91526","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07109","scoring_system":"epss","scoring_elements":"0.91532","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07128","scoring_system":"epss","scoring_elements":"0.91562","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07128","scoring_system":"epss","scoring_elements":"0.91567","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07394","scoring_system":"epss","scoring_elements":"0.91701","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07394","scoring_system":"epss","scoring_elements":"0.91693","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07539","scoring_system":"epss","scoring_elements":"0.9189","published_at":"2026-05-14T12:55:00Z"},{"value":"0.07807","scoring_system":"epss","scoring_elements":"0.91978","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08117","scoring_system":"epss","scoring_elements":"0.92166","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08117","scoring_system":"epss","scoring_elements":"0.92165","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-0778"},{"reference_url":"https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4160","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4160"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778"},{"reference_url":"http://seclists.org/fulldisclosure/2022/May/33","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://seclists.org/fulldisclosure/2022/May/33"},{"reference_url":"http://seclists.org/fulldisclosure/2022/May/35","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://seclists.org/fulldisclosure/2022/May/35"},{"reference_url":"http://seclists.org/fulldisclosure/2022/May/38","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://seclists.org/fulldisclosure/2022/May/38"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65"},{"reference_url":"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83"},{"reference_url":"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246"},{"reference_url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65"},{"reference_url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83"},{"reference_url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG"},{"reference_url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002"},{"reference_url":"https://rustsec.org/advisories/RUSTSEC-2022-0014.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://rustsec.org/advisories/RUSTSEC-2022-0014.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220321-0002","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.netapp.com/advisory/ntap-20220321-0002"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220321-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20220321-0002/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240621-0006","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.netapp.com/advisory/ntap-20240621-0006"},{"reference_url":"https://support.apple.com/kb/HT213255","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://support.apple.com/kb/HT213255"},{"reference_url":"https://support.apple.com/kb/HT213256","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://support.apple.com/kb/HT213256"},{"reference_url":"https://support.apple.com/kb/HT213257","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://support.apple.com/kb/HT213257"},{"reference_url":"https://www.debian.org/security/2022/dsa-5103","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.debian.org/security/2022/dsa-5103"},{"reference_url":"https://www.openssl.org/news/secadv/20220315.txt","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.openssl.org/news/secadv/20220315.txt"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2022.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2022.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"reference_url":"https://www.tenable.com/security/tns-2022-06","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.tenable.com/security/tns-2022-06"},{"reference_url":"https://www.tenable.com/security/tns-2022-07","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.tenable.com/security/tns-2022-07"},{"reference_url":"https://www.tenable.com/security/tns-2022-08","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.tenable.com/security/tns-2022-08"},{"reference_url":"https://www.tenable.com/security/tns-2022-09","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.tenable.com/security/tns-2022-09"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2062202","reference_id":"2062202","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2062202"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0778","reference_id":"CVE-2022-0778","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0778"},{"reference_url":"https://github.com/advisories/GHSA-x3mh-jvjw-3xwx","reference_id":"GHSA-x3mh-jvjw-3xwx","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-x3mh-jvjw-3xwx"},{"reference_url":"https://security.gentoo.org/glsa/202210-02","reference_id":"GLSA-202210-02","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.gentoo.org/glsa/202210-02"},{"reference_url":"https://security.gentoo.org/glsa/202405-29","reference_id":"GLSA-202405-29","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-29"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1065","reference_id":"RHSA-2022:1065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1066","reference_id":"RHSA-2022:1066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1071","reference_id":"RHSA-2022:1071","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1071"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1073","reference_id":"RHSA-2022:1073","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1073"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1076","reference_id":"RHSA-2022:1076","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1076"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1077","reference_id":"RHSA-2022:1077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1078","reference_id":"RHSA-2022:1078","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1078"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1082","reference_id":"RHSA-2022:1082","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1082"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1091","reference_id":"RHSA-2022:1091","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1091"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1112","reference_id":"RHSA-2022:1112","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1112"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1263","reference_id":"RHSA-2022:1263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1263"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1389","reference_id":"RHSA-2022:1389","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1389"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1390","reference_id":"RHSA-2022:1390","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1390"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1519","reference_id":"RHSA-2022:1519","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1519"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1520","reference_id":"RHSA-2022:1520","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1520"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4896","reference_id":"RHSA-2022:4896","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4896"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4899","reference_id":"RHSA-2022:4899","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4899"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4956","reference_id":"RHSA-2022:4956","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4956"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5326","reference_id":"RHSA-2022:5326","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5326"},{"reference_url":"https://usn.ubuntu.com/5328-1/","reference_id":"USN-5328-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5328-1/"},{"reference_url":"https://usn.ubuntu.com/5328-2/","reference_id":"USN-5328-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5328-2/"},{"reference_url":"https://usn.ubuntu.com/6457-1/","reference_id":"USN-6457-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6457-1/"},{"reference_url":"https://usn.ubuntu.com/7894-1/","reference_id":"USN-7894-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7894-1/"}],"fixed_packages":[],"aliases":["CVE-2022-0778","GHSA-x3mh-jvjw-3xwx"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gsbn-6t86-7kf9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80012?format=json","vulnerability_id":"VCID-m1fw-z29h-ubdn","summary":"kernel: use-after-free in RDMA listen()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4028.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4028.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4028","reference_id":"","reference_type":"","scores":[{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09528","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09828","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09649","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09522","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09752","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09729","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09763","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09542","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09592","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09505","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.0958","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09629","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09638","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09607","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09591","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09482","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09485","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09634","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09682","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4028"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4028","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4028"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2027201","reference_id":"2027201","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2027201"},{"reference_url":"https://security.archlinux.org/AVG-1741","reference_id":"AVG-1741","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1741"},{"reference_url":"https://security.archlinux.org/AVG-1879","reference_id":"AVG-1879","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1879"},{"reference_url":"https://security.archlinux.org/AVG-1880","reference_id":"AVG-1880","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1880"},{"reference_url":"https://security.archlinux.org/AVG-1881","reference_id":"AVG-1881","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1881"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0590","reference_id":"RHSA-2022:0590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0629","reference_id":"RHSA-2022:0629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0636","reference_id":"RHSA-2022:0636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0771","reference_id":"RHSA-2022:0771","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0771"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0772","reference_id":"RHSA-2022:0772","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0772"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0777","reference_id":"RHSA-2022:0777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0823","reference_id":"RHSA-2022:0823","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0823"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0851","reference_id":"RHSA-2022:0851","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0851"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0958","reference_id":"RHSA-2022:0958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1185","reference_id":"RHSA-2022:1185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1198","reference_id":"RHSA-2022:1198","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1198"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1199","reference_id":"RHSA-2022:1199","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1199"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1263","reference_id":"RHSA-2022:1263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1263"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1324","reference_id":"RHSA-2022:1324","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1324"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1373","reference_id":"RHSA-2022:1373","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1373"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1535","reference_id":"RHSA-2022:1535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1550","reference_id":"RHSA-2022:1550","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1550"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1555","reference_id":"RHSA-2022:1555","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1555"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:2186","reference_id":"RHSA-2022:2186","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:2186"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:2188","reference_id":"RHSA-2022:2188","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:2188"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:2189","reference_id":"RHSA-2022:2189","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:2189"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:2211","reference_id":"RHSA-2022:2211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:2211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4896","reference_id":"RHSA-2022:4896","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4896"}],"fixed_packages":[],"aliases":["CVE-2021-4028"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m1fw-z29h-ubdn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31413?format=json","vulnerability_id":"VCID-mddr-7zar-6kfn","summary":"Multiple vulnerabilities have been discovered in Expat, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-25236.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-25236.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-25236","reference_id":"","reference_type":"","scores":[{"value":"0.07383","scoring_system":"epss","scoring_elements":"0.91729","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07383","scoring_system":"epss","scoring_elements":"0.91708","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07383","scoring_system":"epss","scoring_elements":"0.91721","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07383","scoring_system":"epss","scoring_elements":"0.91728","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07383","scoring_system":"epss","scoring_elements":"0.91731","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07383","scoring_system":"epss","scoring_elements":"0.91733","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07383","scoring_system":"epss","scoring_elements":"0.91749","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07383","scoring_system":"epss","scoring_elements":"0.91742","published_at":"2026-04-18T12:55:00Z"},{"value":"0.07383","scoring_system":"epss","scoring_elements":"0.91743","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07383","scoring_system":"epss","scoring_elements":"0.91746","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07383","scoring_system":"epss","scoring_elements":"0.91757","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07383","scoring_system":"epss","scoring_elements":"0.91769","published_at":"2026-05-07T12:55:00Z"},{"value":"0.07383","scoring_system":"epss","scoring_elements":"0.91779","published_at":"2026-05-09T12:55:00Z"},{"value":"0.07383","scoring_system":"epss","scoring_elements":"0.91778","published_at":"2026-05-11T12:55:00Z"},{"value":"0.07383","scoring_system":"epss","scoring_elements":"0.91786","published_at":"2026-05-12T12:55:00Z"},{"value":"0.08627","scoring_system":"epss","scoring_elements":"0.92513","published_at":"2026-05-14T12:55:00Z"},{"value":"0.09358","scoring_system":"epss","scoring_elements":"0.92757","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09358","scoring_system":"epss","scoring_elements":"0.92751","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-25236"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25314","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25314"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/02/19/1","reference_id":"1","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:40Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/02/19/1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1005895","reference_id":"1005895","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1005895"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2056370","reference_id":"2056370","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2056370"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/","reference_id":"3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/"},{"reference_url":"https://github.com/libexpat/libexpat/pull/561","reference_id":"561","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:40Z/"}],"url":"https://github.com/libexpat/libexpat/pull/561"},{"reference_url":"https://www.debian.org/security/2022/dsa-5085","reference_id":"dsa-5085","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:40Z/"}],"url":"https://www.debian.org/security/2022/dsa-5085"},{"reference_url":"https://security.gentoo.org/glsa/202209-24","reference_id":"GLSA-202209-24","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:40Z/"}],"url":"https://security.gentoo.org/glsa/202209-24"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html","reference_id":"msg00007.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:40Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220303-0008/","reference_id":"ntap-20220303-0008","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:40Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220303-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0815","reference_id":"RHSA-2022:0815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0815"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0816","reference_id":"RHSA-2022:0816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0817","reference_id":"RHSA-2022:0817","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0817"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0818","reference_id":"RHSA-2022:0818","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0818"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0824","reference_id":"RHSA-2022:0824","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0824"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0843","reference_id":"RHSA-2022:0843","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0843"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0845","reference_id":"RHSA-2022:0845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0847","reference_id":"RHSA-2022:0847","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0847"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0850","reference_id":"RHSA-2022:0850","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0850"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0853","reference_id":"RHSA-2022:0853","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0853"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0951","reference_id":"RHSA-2022:0951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1012","reference_id":"RHSA-2022:1012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1053","reference_id":"RHSA-2022:1053","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1053"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1068","reference_id":"RHSA-2022:1068","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1068"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1069","reference_id":"RHSA-2022:1069","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1069"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1070","reference_id":"RHSA-2022:1070","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1070"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1263","reference_id":"RHSA-2022:1263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1263"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1309","reference_id":"RHSA-2022:1309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7144","reference_id":"RHSA-2022:7144","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7144"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7811","reference_id":"RHSA-2022:7811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7811"},{"reference_url":"https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf","reference_id":"ssa-484086.pdf","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:40Z/"}],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf"},{"reference_url":"https://usn.ubuntu.com/5288-1/","reference_id":"USN-5288-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5288-1/"},{"reference_url":"https://usn.ubuntu.com/8235-1/","reference_id":"USN-8235-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8235-1/"},{"reference_url":"https://usn.ubuntu.com/8240-1/","reference_id":"USN-8240-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8240-1/"},{"reference_url":"https://usn.ubuntu.com/8241-1/","reference_id":"USN-8241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8241-1/"},{"reference_url":"https://usn.ubuntu.com/USN-5455-1/","reference_id":"USN-USN-5455-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-5455-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/","reference_id":"Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/"},{"reference_url":"http://packetstormsecurity.com/files/167238/Zoom-XMPP-Stanza-Smuggling-Remote-Code-Execution.html","reference_id":"Zoom-XMPP-Stanza-Smuggling-Remote-Code-Execution.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:40Z/"}],"url":"http://packetstormsecurity.com/files/167238/Zoom-XMPP-Stanza-Smuggling-Remote-Code-Execution.html"}],"fixed_packages":[],"aliases":["CVE-2022-25236"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mddr-7zar-6kfn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79734?format=json","vulnerability_id":"VCID-ms42-54h5-2kfa","summary":"kernel: possible privileges escalation due to missing TLB flush","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0330.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0330.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-0330","reference_id":"","reference_type":"","scores":[{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11564","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.1169","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11733","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11518","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11605","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11665","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11678","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11642","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11616","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11477","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11479","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11603","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11559","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.1152","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11447","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11373","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11509","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.1156","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.1153","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11571","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11626","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-0330"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0847","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0847"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2042404","reference_id":"2042404","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2042404"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0592","reference_id":"RHSA-2022:0592","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0592"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0620","reference_id":"RHSA-2022:0620","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0620"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0622","reference_id":"RHSA-2022:0622","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0622"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0712","reference_id":"RHSA-2022:0712","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0712"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0718","reference_id":"RHSA-2022:0718","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0718"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0771","reference_id":"RHSA-2022:0771","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0771"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0772","reference_id":"RHSA-2022:0772","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0772"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0777","reference_id":"RHSA-2022:0777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0819","reference_id":"RHSA-2022:0819","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0819"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0820","reference_id":"RHSA-2022:0820","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0820"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0821","reference_id":"RHSA-2022:0821","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0821"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0823","reference_id":"RHSA-2022:0823","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0823"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0825","reference_id":"RHSA-2022:0825","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0825"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0841","reference_id":"RHSA-2022:0841","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0841"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0849","reference_id":"RHSA-2022:0849","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0849"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0851","reference_id":"RHSA-2022:0851","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0851"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0925","reference_id":"RHSA-2022:0925","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0925"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0958","reference_id":"RHSA-2022:0958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1103","reference_id":"RHSA-2022:1103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1104","reference_id":"RHSA-2022:1104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1106","reference_id":"RHSA-2022:1106","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1106"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1107","reference_id":"RHSA-2022:1107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1263","reference_id":"RHSA-2022:1263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1263"},{"reference_url":"https://usn.ubuntu.com/5278-1/","reference_id":"USN-5278-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5278-1/"},{"reference_url":"https://usn.ubuntu.com/5294-1/","reference_id":"USN-5294-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5294-1/"},{"reference_url":"https://usn.ubuntu.com/5294-2/","reference_id":"USN-5294-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5294-2/"},{"reference_url":"https://usn.ubuntu.com/5295-1/","reference_id":"USN-5295-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5295-1/"},{"reference_url":"https://usn.ubuntu.com/5295-2/","reference_id":"USN-5295-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5295-2/"},{"reference_url":"https://usn.ubuntu.com/5297-1/","reference_id":"USN-5297-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5297-1/"},{"reference_url":"https://usn.ubuntu.com/5298-1/","reference_id":"USN-5298-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5298-1/"},{"reference_url":"https://usn.ubuntu.com/5362-1/","reference_id":"USN-5362-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5362-1/"},{"reference_url":"https://usn.ubuntu.com/5505-1/","reference_id":"USN-5505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5505-1/"},{"reference_url":"https://usn.ubuntu.com/5513-1/","reference_id":"USN-5513-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5513-1/"}],"fixed_packages":[],"aliases":["CVE-2022-0330"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ms42-54h5-2kfa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31412?format=json","vulnerability_id":"VCID-nw7y-2xct-8fa5","summary":"Multiple vulnerabilities have been discovered in Expat, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-25235.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-25235.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-25235","reference_id":"","reference_type":"","scores":[{"value":"0.11914","scoring_system":"epss","scoring_elements":"0.93828","published_at":"2026-05-14T12:55:00Z"},{"value":"0.13322","scoring_system":"epss","scoring_elements":"0.94198","published_at":"2026-04-29T12:55:00Z"},{"value":"0.13322","scoring_system":"epss","scoring_elements":"0.94142","published_at":"2026-04-02T12:55:00Z"},{"value":"0.13322","scoring_system":"epss","scoring_elements":"0.94236","published_at":"2026-05-12T12:55:00Z"},{"value":"0.13322","scoring_system":"epss","scoring_elements":"0.9423","published_at":"2026-05-11T12:55:00Z"},{"value":"0.13322","scoring_system":"epss","scoring_elements":"0.94225","published_at":"2026-05-09T12:55:00Z"},{"value":"0.13322","scoring_system":"epss","scoring_elements":"0.94213","published_at":"2026-05-07T12:55:00Z"},{"value":"0.13322","scoring_system":"epss","scoring_elements":"0.94202","published_at":"2026-05-05T12:55:00Z"},{"value":"0.13322","scoring_system":"epss","scoring_elements":"0.94153","published_at":"2026-04-04T12:55:00Z"},{"value":"0.13322","scoring_system":"epss","scoring_elements":"0.94156","published_at":"2026-04-07T12:55:00Z"},{"value":"0.13322","scoring_system":"epss","scoring_elements":"0.94166","published_at":"2026-04-08T12:55:00Z"},{"value":"0.13322","scoring_system":"epss","scoring_elements":"0.9417","published_at":"2026-04-09T12:55:00Z"},{"value":"0.13322","scoring_system":"epss","scoring_elements":"0.94175","published_at":"2026-04-13T12:55:00Z"},{"value":"0.13322","scoring_system":"epss","scoring_elements":"0.94191","published_at":"2026-04-16T12:55:00Z"},{"value":"0.13322","scoring_system":"epss","scoring_elements":"0.94195","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-25235"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25314","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25314"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/02/19/1","reference_id":"1","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:39Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/02/19/1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1005894","reference_id":"1005894","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1005894"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2056366","reference_id":"2056366","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2056366"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/","reference_id":"3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:39Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/"},{"reference_url":"https://github.com/libexpat/libexpat/pull/562","reference_id":"562","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:39Z/"}],"url":"https://github.com/libexpat/libexpat/pull/562"},{"reference_url":"https://www.debian.org/security/2022/dsa-5085","reference_id":"dsa-5085","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:39Z/"}],"url":"https://www.debian.org/security/2022/dsa-5085"},{"reference_url":"https://security.gentoo.org/glsa/202209-24","reference_id":"GLSA-202209-24","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:39Z/"}],"url":"https://security.gentoo.org/glsa/202209-24"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html","reference_id":"msg00007.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:39Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220303-0008/","reference_id":"ntap-20220303-0008","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:39Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220303-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0815","reference_id":"RHSA-2022:0815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0815"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0816","reference_id":"RHSA-2022:0816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0817","reference_id":"RHSA-2022:0817","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0817"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0818","reference_id":"RHSA-2022:0818","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0818"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0824","reference_id":"RHSA-2022:0824","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0824"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0843","reference_id":"RHSA-2022:0843","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0843"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0845","reference_id":"RHSA-2022:0845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0847","reference_id":"RHSA-2022:0847","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0847"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0850","reference_id":"RHSA-2022:0850","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0850"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0853","reference_id":"RHSA-2022:0853","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0853"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0951","reference_id":"RHSA-2022:0951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1012","reference_id":"RHSA-2022:1012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1053","reference_id":"RHSA-2022:1053","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1053"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1068","reference_id":"RHSA-2022:1068","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1068"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1069","reference_id":"RHSA-2022:1069","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1069"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1070","reference_id":"RHSA-2022:1070","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1070"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1263","reference_id":"RHSA-2022:1263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1263"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1309","reference_id":"RHSA-2022:1309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1539","reference_id":"RHSA-2022:1539","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1539"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1540","reference_id":"RHSA-2022:1540","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1540"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1643","reference_id":"RHSA-2022:1643","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1643"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1644","reference_id":"RHSA-2022:1644","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1644"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7144","reference_id":"RHSA-2022:7144","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7144"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7811","reference_id":"RHSA-2022:7811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7811"},{"reference_url":"https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf","reference_id":"ssa-484086.pdf","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:39Z/"}],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf"},{"reference_url":"https://usn.ubuntu.com/5288-1/","reference_id":"USN-5288-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5288-1/"},{"reference_url":"https://usn.ubuntu.com/8235-1/","reference_id":"USN-8235-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8235-1/"},{"reference_url":"https://usn.ubuntu.com/8240-1/","reference_id":"USN-8240-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8240-1/"},{"reference_url":"https://usn.ubuntu.com/8241-1/","reference_id":"USN-8241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8241-1/"},{"reference_url":"https://usn.ubuntu.com/USN-5455-1/","reference_id":"USN-USN-5455-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-5455-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/","reference_id":"Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:39Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/"}],"fixed_packages":[],"aliases":["CVE-2022-25235"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nw7y-2xct-8fa5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79720?format=json","vulnerability_id":"VCID-tqsm-2e4k-aycp","summary":"kernel: failing usercopy allows for use-after-free exploitation","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22942.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22942.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22942","reference_id":"","reference_type":"","scores":[{"value":"0.13534","scoring_system":"epss","scoring_elements":"0.94191","published_at":"2026-04-02T12:55:00Z"},{"value":"0.13534","scoring_system":"epss","scoring_elements":"0.94204","published_at":"2026-04-04T12:55:00Z"},{"value":"0.13534","scoring_system":"epss","scoring_elements":"0.94205","published_at":"2026-04-07T12:55:00Z"},{"value":"0.13534","scoring_system":"epss","scoring_elements":"0.94215","published_at":"2026-04-08T12:55:00Z"},{"value":"0.13534","scoring_system":"epss","scoring_elements":"0.94219","published_at":"2026-04-09T12:55:00Z"},{"value":"0.13534","scoring_system":"epss","scoring_elements":"0.94223","published_at":"2026-04-12T12:55:00Z"},{"value":"0.13534","scoring_system":"epss","scoring_elements":"0.94224","published_at":"2026-04-13T12:55:00Z"},{"value":"0.13534","scoring_system":"epss","scoring_elements":"0.94239","published_at":"2026-04-16T12:55:00Z"},{"value":"0.13534","scoring_system":"epss","scoring_elements":"0.94244","published_at":"2026-04-21T12:55:00Z"},{"value":"0.13534","scoring_system":"epss","scoring_elements":"0.94248","published_at":"2026-04-29T12:55:00Z"},{"value":"0.13534","scoring_system":"epss","scoring_elements":"0.94252","published_at":"2026-05-05T12:55:00Z"},{"value":"0.13534","scoring_system":"epss","scoring_elements":"0.94263","published_at":"2026-05-07T12:55:00Z"},{"value":"0.13534","scoring_system":"epss","scoring_elements":"0.94274","published_at":"2026-05-09T12:55:00Z"},{"value":"0.13534","scoring_system":"epss","scoring_elements":"0.94279","published_at":"2026-05-11T12:55:00Z"},{"value":"0.13534","scoring_system":"epss","scoring_elements":"0.94286","published_at":"2026-05-12T12:55:00Z"},{"value":"0.13534","scoring_system":"epss","scoring_elements":"0.943","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22942"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0847","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0847"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2044809","reference_id":"2044809","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2044809"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0592","reference_id":"RHSA-2022:0592","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0592"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0620","reference_id":"RHSA-2022:0620","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0620"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0622","reference_id":"RHSA-2022:0622","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0622"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0771","reference_id":"RHSA-2022:0771","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0771"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0772","reference_id":"RHSA-2022:0772","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0772"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0777","reference_id":"RHSA-2022:0777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0819","reference_id":"RHSA-2022:0819","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0819"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0820","reference_id":"RHSA-2022:0820","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0820"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0821","reference_id":"RHSA-2022:0821","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0821"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0823","reference_id":"RHSA-2022:0823","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0823"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0825","reference_id":"RHSA-2022:0825","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0825"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0841","reference_id":"RHSA-2022:0841","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0841"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0849","reference_id":"RHSA-2022:0849","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0849"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0851","reference_id":"RHSA-2022:0851","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0851"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0925","reference_id":"RHSA-2022:0925","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0925"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0958","reference_id":"RHSA-2022:0958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1103","reference_id":"RHSA-2022:1103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1107","reference_id":"RHSA-2022:1107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1263","reference_id":"RHSA-2022:1263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1263"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1324","reference_id":"RHSA-2022:1324","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1324"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1373","reference_id":"RHSA-2022:1373","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1373"},{"reference_url":"https://usn.ubuntu.com/5278-1/","reference_id":"USN-5278-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5278-1/"},{"reference_url":"https://usn.ubuntu.com/5294-1/","reference_id":"USN-5294-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5294-1/"},{"reference_url":"https://usn.ubuntu.com/5294-2/","reference_id":"USN-5294-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5294-2/"},{"reference_url":"https://usn.ubuntu.com/5295-1/","reference_id":"USN-5295-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5295-1/"},{"reference_url":"https://usn.ubuntu.com/5295-2/","reference_id":"USN-5295-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5295-2/"},{"reference_url":"https://usn.ubuntu.com/5297-1/","reference_id":"USN-5297-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5297-1/"},{"reference_url":"https://usn.ubuntu.com/5298-1/","reference_id":"USN-5298-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5298-1/"},{"reference_url":"https://usn.ubuntu.com/5362-1/","reference_id":"USN-5362-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5362-1/"}],"fixed_packages":[],"aliases":["CVE-2022-22942"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tqsm-2e4k-aycp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80127?format=json","vulnerability_id":"VCID-txgc-kd7n-ekc6","summary":"kernel: Use After Free in unix_gc() which could result in a local privilege escalation","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0920.json","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0920.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-0920","reference_id":"","reference_type":"","scores":[{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75771","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75803","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75806","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75792","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75831","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75841","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75852","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.7586","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75889","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75915","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.759","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75914","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75765","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75789","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00933","scoring_system":"epss","scoring_elements":"0.7611","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00933","scoring_system":"epss","scoring_elements":"0.76078","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00933","scoring_system":"epss","scoring_elements":"0.76074","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00933","scoring_system":"epss","scoring_elements":"0.76122","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00933","scoring_system":"epss","scoring_elements":"0.76089","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76453","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-0920"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0920","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0920"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://source.android.com/security/bulletin/2021-11-01","reference_id":"2021-11-01","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-06T16:18:51Z/"}],"url":"https://source.android.com/security/bulletin/2021-11-01"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2031930","reference_id":"2031930","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2031930"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html","reference_id":"msg00012.html","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-06T16:18:51Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0590","reference_id":"RHSA-2022:0590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0592","reference_id":"RHSA-2022:0592","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0592"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0620","reference_id":"RHSA-2022:0620","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0620"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0622","reference_id":"RHSA-2022:0622","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0622"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0629","reference_id":"RHSA-2022:0629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0636","reference_id":"RHSA-2022:0636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0771","reference_id":"RHSA-2022:0771","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0771"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0772","reference_id":"RHSA-2022:0772","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0772"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0777","reference_id":"RHSA-2022:0777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0819","reference_id":"RHSA-2022:0819","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0819"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0823","reference_id":"RHSA-2022:0823","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0823"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0825","reference_id":"RHSA-2022:0825","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0825"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0841","reference_id":"RHSA-2022:0841","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0841"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0849","reference_id":"RHSA-2022:0849","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0849"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0851","reference_id":"RHSA-2022:0851","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0851"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0958","reference_id":"RHSA-2022:0958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1103","reference_id":"RHSA-2022:1103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1104","reference_id":"RHSA-2022:1104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1106","reference_id":"RHSA-2022:1106","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1106"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1107","reference_id":"RHSA-2022:1107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1263","reference_id":"RHSA-2022:1263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1263"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1324","reference_id":"RHSA-2022:1324","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1324"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1373","reference_id":"RHSA-2022:1373","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1373"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1417","reference_id":"RHSA-2022:1417","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1417"},{"reference_url":"https://usn.ubuntu.com/5361-1/","reference_id":"USN-5361-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5361-1/"},{"reference_url":"https://usn.ubuntu.com/7720-1/","reference_id":"USN-7720-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7720-1/"}],"fixed_packages":[],"aliases":["CVE-2021-0920"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-txgc-kd7n-ekc6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79891?format=json","vulnerability_id":"VCID-u4gb-1hyn-m7g4","summary":"kernel: fget: check that the fd still exists after getting a ref to it","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4083.json","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4083.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4083","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01551","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01564","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01568","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01571","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01574","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01581","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01563","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01562","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01566","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01654","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01663","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0166","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01682","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01662","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01656","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01653","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01647","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4083"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2029923","reference_id":"2029923","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2029923"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0820","reference_id":"RHSA-2022:0820","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0820"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0821","reference_id":"RHSA-2022:0821","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0821"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0823","reference_id":"RHSA-2022:0823","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0823"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0851","reference_id":"RHSA-2022:0851","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0851"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0925","reference_id":"RHSA-2022:0925","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0925"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0958","reference_id":"RHSA-2022:0958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1103","reference_id":"RHSA-2022:1103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1104","reference_id":"RHSA-2022:1104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1107","reference_id":"RHSA-2022:1107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1185","reference_id":"RHSA-2022:1185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1198","reference_id":"RHSA-2022:1198","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1198"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1199","reference_id":"RHSA-2022:1199","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1199"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1263","reference_id":"RHSA-2022:1263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1263"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1324","reference_id":"RHSA-2022:1324","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1324"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1373","reference_id":"RHSA-2022:1373","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1373"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1413","reference_id":"RHSA-2022:1413","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1413"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1418","reference_id":"RHSA-2022:1418","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1418"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1455","reference_id":"RHSA-2022:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1975","reference_id":"RHSA-2022:1975","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1975"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1988","reference_id":"RHSA-2022:1988","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1988"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:2189","reference_id":"RHSA-2022:2189","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:2189"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4896","reference_id":"RHSA-2022:4896","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4896"},{"reference_url":"https://usn.ubuntu.com/5278-1/","reference_id":"USN-5278-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5278-1/"},{"reference_url":"https://usn.ubuntu.com/5294-1/","reference_id":"USN-5294-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5294-1/"},{"reference_url":"https://usn.ubuntu.com/5294-2/","reference_id":"USN-5294-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5294-2/"},{"reference_url":"https://usn.ubuntu.com/5295-1/","reference_id":"USN-5295-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5295-1/"},{"reference_url":"https://usn.ubuntu.com/5295-2/","reference_id":"USN-5295-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5295-2/"},{"reference_url":"https://usn.ubuntu.com/5297-1/","reference_id":"USN-5297-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5297-1/"},{"reference_url":"https://usn.ubuntu.com/5298-1/","reference_id":"USN-5298-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5298-1/"},{"reference_url":"https://usn.ubuntu.com/5361-1/","reference_id":"USN-5361-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5361-1/"},{"reference_url":"https://usn.ubuntu.com/5362-1/","reference_id":"USN-5362-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5362-1/"}],"fixed_packages":[],"aliases":["CVE-2021-4083"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u4gb-1hyn-m7g4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/13044?format=json","vulnerability_id":"VCID-ukce-7qpu-c7cm","summary":"Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nIn Cyrus SASL 2.1.17 through 2.1.27 before 2.1.28, plugins/sql.c does not escape the password for a SQL INSERT or UPDATE statement.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24407.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24407.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-24407","reference_id":"","reference_type":"","scores":[{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62729","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62637","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62587","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62635","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62686","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62646","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62672","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62616","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62605","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62582","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62623","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.6263","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62612","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62624","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.6264","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67134","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67157","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67132","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67182","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67195","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-24407"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst"},{"reference_url":"https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28","reference_id":"","reference_type":"","scores":[],"url":"https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28"},{"reference_url":"https://www.debian.org/security/2022/dsa-5087","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2022/dsa-5087"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/02/23/4","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2022/02/23/4"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2055326","reference_id":"2055326","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2055326"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24407","reference_id":"CVE-2022-24407","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24407"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0658","reference_id":"RHSA-2022:0658","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0658"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0666","reference_id":"RHSA-2022:0666","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0666"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0668","reference_id":"RHSA-2022:0668","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0668"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0730","reference_id":"RHSA-2022:0730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0731","reference_id":"RHSA-2022:0731","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0731"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0780","reference_id":"RHSA-2022:0780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0841","reference_id":"RHSA-2022:0841","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0841"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1029","reference_id":"RHSA-2022:1029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1263","reference_id":"RHSA-2022:1263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1263"},{"reference_url":"https://usn.ubuntu.com/5301-1/","reference_id":"USN-5301-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5301-1/"},{"reference_url":"https://usn.ubuntu.com/5301-2/","reference_id":"USN-5301-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5301-2/"}],"fixed_packages":[],"aliases":["CVE-2022-24407"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ukce-7qpu-c7cm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31862?format=json","vulnerability_id":"VCID-y5u5-dgk3-u3da","summary":"A vulnerability has been found in AIDE which can lead to root privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45417.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45417.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45417","reference_id":"","reference_type":"","scores":[{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11285","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11425","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11484","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11272","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11354","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11412","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11419","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11387","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11357","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11216","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11219","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11347","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11288","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11248","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11187","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11119","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11249","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11308","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11276","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11317","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1137","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45417"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45417","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45417"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041489","reference_id":"2041489","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041489"},{"reference_url":"https://security.gentoo.org/glsa/202311-07","reference_id":"GLSA-202311-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202311-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0440","reference_id":"RHSA-2022:0440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0441","reference_id":"RHSA-2022:0441","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0441"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0456","reference_id":"RHSA-2022:0456","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0456"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0464","reference_id":"RHSA-2022:0464","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0464"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0472","reference_id":"RHSA-2022:0472","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0472"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0473","reference_id":"RHSA-2022:0473","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0473"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0540","reference_id":"RHSA-2022:0540","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0540"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1263","reference_id":"RHSA-2022:1263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1263"},{"reference_url":"https://usn.ubuntu.com/5243-1/","reference_id":"USN-5243-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5243-1/"},{"reference_url":"https://usn.ubuntu.com/5243-2/","reference_id":"USN-5243-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5243-2/"}],"fixed_packages":[],"aliases":["CVE-2021-45417"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y5u5-dgk3-u3da"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/redhat-virtualization-host@4.3.22-20220330.1%3Farch=el7_9"}