{"url":"http://public2.vulnerablecode.io/api/packages/99289?format=json","purl":"pkg:rpm/redhat/redhat-virtualization-host@4.4.10-202203101736_8?arch=5","type":"rpm","namespace":"redhat","name":"redhat-virtualization-host","version":"4.4.10-202203101736_8","qualifiers":{"arch":"5"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79607?format=json","vulnerability_id":"VCID-89bv-8sdp-9uah","summary":"kernel: improper initialization of the \"flags\" member of the new pipe_buffer","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0847.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0847.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-0847","reference_id":"","reference_type":"","scores":[{"value":"0.81211","scoring_system":"epss","scoring_elements":"0.99168","published_at":"2026-04-21T12:55:00Z"},{"value":"0.81633","scoring_system":"epss","scoring_elements":"0.99186","published_at":"2026-04-13T12:55:00Z"},{"value":"0.81633","scoring_system":"epss","scoring_elements":"0.99187","published_at":"2026-04-16T12:55:00Z"},{"value":"0.81633","scoring_system":"epss","scoring_elements":"0.99189","published_at":"2026-04-18T12:55:00Z"},{"value":"0.81875","scoring_system":"epss","scoring_elements":"0.99198","published_at":"2026-04-08T12:55:00Z"},{"value":"0.81875","scoring_system":"epss","scoring_elements":"0.99199","published_at":"2026-04-09T12:55:00Z"},{"value":"0.81875","scoring_system":"epss","scoring_elements":"0.99197","published_at":"2026-04-07T12:55:00Z"},{"value":"0.82337","scoring_system":"epss","scoring_elements":"0.99231","published_at":"2026-04-29T12:55:00Z"},{"value":"0.82683","scoring_system":"epss","scoring_elements":"0.99245","published_at":"2026-04-26T12:55:00Z"},{"value":"0.82683","scoring_system":"epss","scoring_elements":"0.99244","published_at":"2026-04-24T12:55:00Z"},{"value":"0.82687","scoring_system":"epss","scoring_elements":"0.99232","published_at":"2026-04-02T12:55:00Z"},{"value":"0.82687","scoring_system":"epss","scoring_elements":"0.9923","published_at":"2026-04-01T12:55:00Z"},{"value":"0.82687","scoring_system":"epss","scoring_elements":"0.99234","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-0847"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0847","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0847"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2060795","reference_id":"2060795","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T18:38:16Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2060795"},{"reference_url":"https://security.archlinux.org/AVG-2652","reference_id":"AVG-2652","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2652"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/50808.c","reference_id":"CVE-2022-0847","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/50808.c"},{"reference_url":"https://dirtypipe.cm4all.com/","reference_id":"dirtypipe.cm4all.com","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T18:38:16Z/"}],"url":"https://dirtypipe.cm4all.com/"},{"reference_url":"http://packetstormsecurity.com/files/166229/Dirty-Pipe-Linux-Privilege-Escalation.html","reference_id":"Dirty-Pipe-Linux-Privilege-Escalation.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T18:38:16Z/"}],"url":"http://packetstormsecurity.com/files/166229/Dirty-Pipe-Linux-Privilege-Escalation.html"},{"reference_url":"http://packetstormsecurity.com/files/166258/Dirty-Pipe-Local-Privilege-Escalation.html","reference_id":"Dirty-Pipe-Local-Privilege-Escalation.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T18:38:16Z/"}],"url":"http://packetstormsecurity.com/files/166258/Dirty-Pipe-Local-Privilege-Escalation.html"},{"reference_url":"http://packetstormsecurity.com/files/166230/Dirty-Pipe-SUID-Binary-Hijack-Privilege-Escalation.html","reference_id":"Dirty-Pipe-SUID-Binary-Hijack-Privilege-Escalation.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T18:38:16Z/"}],"url":"http://packetstormsecurity.com/files/166230/Dirty-Pipe-SUID-Binary-Hijack-Privilege-Escalation.html"},{"reference_url":"https://www.suse.com/support/kb/doc/?id=000020603","reference_id":"?id=000020603","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T18:38:16Z/"}],"url":"https://www.suse.com/support/kb/doc/?id=000020603"},{"reference_url":"http://packetstormsecurity.com/files/176534/Linux-4.20-KTLS-Read-Only-Write.html","reference_id":"Linux-4.20-KTLS-Read-Only-Write.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T18:38:16Z/"}],"url":"http://packetstormsecurity.com/files/176534/Linux-4.20-KTLS-Read-Only-Write.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220325-0005/","reference_id":"ntap-20220325-0005","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T18:38:16Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220325-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0819","reference_id":"RHSA-2022:0819","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0819"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0820","reference_id":"RHSA-2022:0820","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0820"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0821","reference_id":"RHSA-2022:0821","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0821"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0822","reference_id":"RHSA-2022:0822","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0822"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0823","reference_id":"RHSA-2022:0823","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0823"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0825","reference_id":"RHSA-2022:0825","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0825"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0831","reference_id":"RHSA-2022:0831","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0831"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0841","reference_id":"RHSA-2022:0841","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0841"},{"reference_url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0015","reference_id":"SNWLID-2022-0015","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T18:38:16Z/"}],"url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0015"},{"reference_url":"https://usn.ubuntu.com/5317-1/","reference_id":"USN-5317-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5317-1/"},{"reference_url":"https://usn.ubuntu.com/5362-1/","reference_id":"USN-5362-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5362-1/"}],"fixed_packages":[],"aliases":["CVE-2022-0847"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-89bv-8sdp-9uah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79875?format=json","vulnerability_id":"VCID-c2z7-n1cg-cufz","summary":"kernel: local privilege escalation by exploiting the fsconfig syscall parameter leads to container breakout","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4154.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4154.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4154","reference_id":"","reference_type":"","scores":[{"value":"0.00838","scoring_system":"epss","scoring_elements":"0.7464","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00838","scoring_system":"epss","scoring_elements":"0.74643","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00838","scoring_system":"epss","scoring_elements":"0.7467","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00838","scoring_system":"epss","scoring_elements":"0.74644","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00838","scoring_system":"epss","scoring_elements":"0.74676","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00838","scoring_system":"epss","scoring_elements":"0.74691","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00838","scoring_system":"epss","scoring_elements":"0.74714","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00838","scoring_system":"epss","scoring_elements":"0.74694","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00838","scoring_system":"epss","scoring_elements":"0.74685","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00838","scoring_system":"epss","scoring_elements":"0.74723","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00838","scoring_system":"epss","scoring_elements":"0.7473","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00838","scoring_system":"epss","scoring_elements":"0.74721","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00838","scoring_system":"epss","scoring_elements":"0.74757","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00838","scoring_system":"epss","scoring_elements":"0.74763","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00838","scoring_system":"epss","scoring_elements":"0.74766","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4154"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4154","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4154"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034514","reference_id":"2034514","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034514"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0186","reference_id":"RHSA-2022:0186","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0186"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0187","reference_id":"RHSA-2022:0187","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0187"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0231","reference_id":"RHSA-2022:0231","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0231"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0819","reference_id":"RHSA-2022:0819","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0819"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0825","reference_id":"RHSA-2022:0825","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0825"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0841","reference_id":"RHSA-2022:0841","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0841"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0849","reference_id":"RHSA-2022:0849","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0849"}],"fixed_packages":[],"aliases":["CVE-2021-4154"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c2z7-n1cg-cufz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79734?format=json","vulnerability_id":"VCID-ms42-54h5-2kfa","summary":"kernel: possible privileges escalation due to missing TLB flush","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0330.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0330.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-0330","reference_id":"","reference_type":"","scores":[{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11564","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.1169","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11733","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11518","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11605","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11665","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11678","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11642","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11616","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11477","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11479","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11603","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11559","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.1152","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11447","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-0330"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0847","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0847"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2042404","reference_id":"2042404","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2042404"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0592","reference_id":"RHSA-2022:0592","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0592"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0620","reference_id":"RHSA-2022:0620","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0620"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0622","reference_id":"RHSA-2022:0622","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0622"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0712","reference_id":"RHSA-2022:0712","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0712"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0718","reference_id":"RHSA-2022:0718","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0718"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0771","reference_id":"RHSA-2022:0771","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0771"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0772","reference_id":"RHSA-2022:0772","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0772"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0777","reference_id":"RHSA-2022:0777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0819","reference_id":"RHSA-2022:0819","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0819"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0820","reference_id":"RHSA-2022:0820","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0820"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0821","reference_id":"RHSA-2022:0821","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0821"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0823","reference_id":"RHSA-2022:0823","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0823"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0825","reference_id":"RHSA-2022:0825","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0825"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0841","reference_id":"RHSA-2022:0841","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0841"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0849","reference_id":"RHSA-2022:0849","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0849"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0851","reference_id":"RHSA-2022:0851","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0851"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0925","reference_id":"RHSA-2022:0925","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0925"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0958","reference_id":"RHSA-2022:0958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1103","reference_id":"RHSA-2022:1103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1104","reference_id":"RHSA-2022:1104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1106","reference_id":"RHSA-2022:1106","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1106"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1107","reference_id":"RHSA-2022:1107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1263","reference_id":"RHSA-2022:1263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1263"},{"reference_url":"https://usn.ubuntu.com/5278-1/","reference_id":"USN-5278-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5278-1/"},{"reference_url":"https://usn.ubuntu.com/5294-1/","reference_id":"USN-5294-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5294-1/"},{"reference_url":"https://usn.ubuntu.com/5294-2/","reference_id":"USN-5294-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5294-2/"},{"reference_url":"https://usn.ubuntu.com/5295-1/","reference_id":"USN-5295-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5295-1/"},{"reference_url":"https://usn.ubuntu.com/5295-2/","reference_id":"USN-5295-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5295-2/"},{"reference_url":"https://usn.ubuntu.com/5297-1/","reference_id":"USN-5297-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5297-1/"},{"reference_url":"https://usn.ubuntu.com/5298-1/","reference_id":"USN-5298-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5298-1/"},{"reference_url":"https://usn.ubuntu.com/5362-1/","reference_id":"USN-5362-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5362-1/"},{"reference_url":"https://usn.ubuntu.com/5505-1/","reference_id":"USN-5505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5505-1/"},{"reference_url":"https://usn.ubuntu.com/5513-1/","reference_id":"USN-5513-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5513-1/"}],"fixed_packages":[],"aliases":["CVE-2022-0330"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ms42-54h5-2kfa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79693?format=json","vulnerability_id":"VCID-rwk5-nah5-sfat","summary":"kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0435.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0435.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-0435","reference_id":"","reference_type":"","scores":[{"value":"0.50256","scoring_system":"epss","scoring_elements":"0.97848","published_at":"2026-04-29T12:55:00Z"},{"value":"0.50256","scoring_system":"epss","scoring_elements":"0.97845","published_at":"2026-04-21T12:55:00Z"},{"value":"0.50256","scoring_system":"epss","scoring_elements":"0.97843","published_at":"2026-04-24T12:55:00Z"},{"value":"0.50256","scoring_system":"epss","scoring_elements":"0.97844","published_at":"2026-04-26T12:55:00Z"},{"value":"0.54322","scoring_system":"epss","scoring_elements":"0.98011","published_at":"2026-04-04T12:55:00Z"},{"value":"0.54322","scoring_system":"epss","scoring_elements":"0.98018","published_at":"2026-04-08T12:55:00Z"},{"value":"0.54322","scoring_system":"epss","scoring_elements":"0.98019","published_at":"2026-04-09T12:55:00Z"},{"value":"0.54322","scoring_system":"epss","scoring_elements":"0.98023","published_at":"2026-04-13T12:55:00Z"},{"value":"0.54322","scoring_system":"epss","scoring_elements":"0.9803","published_at":"2026-04-18T12:55:00Z"},{"value":"0.54322","scoring_system":"epss","scoring_elements":"0.98004","published_at":"2026-04-01T12:55:00Z"},{"value":"0.54322","scoring_system":"epss","scoring_elements":"0.98013","published_at":"2026-04-07T12:55:00Z"},{"value":"0.54322","scoring_system":"epss","scoring_elements":"0.98009","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-0435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0847","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0847"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2048738","reference_id":"2048738","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2048738"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0771","reference_id":"RHSA-2022:0771","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0771"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0772","reference_id":"RHSA-2022:0772","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0772"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0777","reference_id":"RHSA-2022:0777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0819","reference_id":"RHSA-2022:0819","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0819"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0825","reference_id":"RHSA-2022:0825","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0825"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0841","reference_id":"RHSA-2022:0841","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0841"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0849","reference_id":"RHSA-2022:0849","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0849"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1186","reference_id":"RHSA-2022:1186","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1186"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1209","reference_id":"RHSA-2022:1209","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1209"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1213","reference_id":"RHSA-2022:1213","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1213"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1589","reference_id":"RHSA-2022:1589","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1589"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1619","reference_id":"RHSA-2022:1619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1619"},{"reference_url":"https://usn.ubuntu.com/5302-1/","reference_id":"USN-5302-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5302-1/"},{"reference_url":"https://usn.ubuntu.com/5337-1/","reference_id":"USN-5337-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5337-1/"},{"reference_url":"https://usn.ubuntu.com/5338-1/","reference_id":"USN-5338-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5338-1/"},{"reference_url":"https://usn.ubuntu.com/5339-1/","reference_id":"USN-5339-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5339-1/"},{"reference_url":"https://usn.ubuntu.com/5362-1/","reference_id":"USN-5362-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5362-1/"},{"reference_url":"https://usn.ubuntu.com/5368-1/","reference_id":"USN-5368-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5368-1/"},{"reference_url":"https://usn.ubuntu.com/5377-1/","reference_id":"USN-5377-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5377-1/"}],"fixed_packages":[],"aliases":["CVE-2022-0435"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rwk5-nah5-sfat"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79720?format=json","vulnerability_id":"VCID-tqsm-2e4k-aycp","summary":"kernel: failing usercopy allows for use-after-free exploitation","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22942.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22942.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22942","reference_id":"","reference_type":"","scores":[{"value":"0.13534","scoring_system":"epss","scoring_elements":"0.94191","published_at":"2026-04-02T12:55:00Z"},{"value":"0.13534","scoring_system":"epss","scoring_elements":"0.94204","published_at":"2026-04-04T12:55:00Z"},{"value":"0.13534","scoring_system":"epss","scoring_elements":"0.94205","published_at":"2026-04-07T12:55:00Z"},{"value":"0.13534","scoring_system":"epss","scoring_elements":"0.94215","published_at":"2026-04-08T12:55:00Z"},{"value":"0.13534","scoring_system":"epss","scoring_elements":"0.94219","published_at":"2026-04-09T12:55:00Z"},{"value":"0.13534","scoring_system":"epss","scoring_elements":"0.94223","published_at":"2026-04-12T12:55:00Z"},{"value":"0.13534","scoring_system":"epss","scoring_elements":"0.94224","published_at":"2026-04-13T12:55:00Z"},{"value":"0.13534","scoring_system":"epss","scoring_elements":"0.94239","published_at":"2026-04-16T12:55:00Z"},{"value":"0.13534","scoring_system":"epss","scoring_elements":"0.94244","published_at":"2026-04-21T12:55:00Z"},{"value":"0.13534","scoring_system":"epss","scoring_elements":"0.94248","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22942"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0847","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0847"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2044809","reference_id":"2044809","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2044809"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0592","reference_id":"RHSA-2022:0592","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0592"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0620","reference_id":"RHSA-2022:0620","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0620"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0622","reference_id":"RHSA-2022:0622","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0622"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0771","reference_id":"RHSA-2022:0771","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0771"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0772","reference_id":"RHSA-2022:0772","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0772"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0777","reference_id":"RHSA-2022:0777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0819","reference_id":"RHSA-2022:0819","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0819"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0820","reference_id":"RHSA-2022:0820","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0820"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0821","reference_id":"RHSA-2022:0821","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0821"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0823","reference_id":"RHSA-2022:0823","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0823"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0825","reference_id":"RHSA-2022:0825","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0825"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0841","reference_id":"RHSA-2022:0841","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0841"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0849","reference_id":"RHSA-2022:0849","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0849"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0851","reference_id":"RHSA-2022:0851","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0851"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0925","reference_id":"RHSA-2022:0925","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0925"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0958","reference_id":"RHSA-2022:0958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1103","reference_id":"RHSA-2022:1103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1107","reference_id":"RHSA-2022:1107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1263","reference_id":"RHSA-2022:1263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1263"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1324","reference_id":"RHSA-2022:1324","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1324"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1373","reference_id":"RHSA-2022:1373","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1373"},{"reference_url":"https://usn.ubuntu.com/5278-1/","reference_id":"USN-5278-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5278-1/"},{"reference_url":"https://usn.ubuntu.com/5294-1/","reference_id":"USN-5294-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5294-1/"},{"reference_url":"https://usn.ubuntu.com/5294-2/","reference_id":"USN-5294-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5294-2/"},{"reference_url":"https://usn.ubuntu.com/5295-1/","reference_id":"USN-5295-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5295-1/"},{"reference_url":"https://usn.ubuntu.com/5295-2/","reference_id":"USN-5295-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5295-2/"},{"reference_url":"https://usn.ubuntu.com/5297-1/","reference_id":"USN-5297-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5297-1/"},{"reference_url":"https://usn.ubuntu.com/5298-1/","reference_id":"USN-5298-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5298-1/"},{"reference_url":"https://usn.ubuntu.com/5362-1/","reference_id":"USN-5362-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5362-1/"}],"fixed_packages":[],"aliases":["CVE-2022-22942"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tqsm-2e4k-aycp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80127?format=json","vulnerability_id":"VCID-txgc-kd7n-ekc6","summary":"kernel: Use After Free in unix_gc() which could result in a local privilege escalation","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0920.json","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0920.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-0920","reference_id":"","reference_type":"","scores":[{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75852","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75765","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75789","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75771","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75803","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75806","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75792","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75831","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75841","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00933","scoring_system":"epss","scoring_elements":"0.76122","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00933","scoring_system":"epss","scoring_elements":"0.76074","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00933","scoring_system":"epss","scoring_elements":"0.76078","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00933","scoring_system":"epss","scoring_elements":"0.7611","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00933","scoring_system":"epss","scoring_elements":"0.76089","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-0920"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0920","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0920"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://source.android.com/security/bulletin/2021-11-01","reference_id":"2021-11-01","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-06T16:18:51Z/"}],"url":"https://source.android.com/security/bulletin/2021-11-01"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2031930","reference_id":"2031930","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2031930"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html","reference_id":"msg00012.html","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-06T16:18:51Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0590","reference_id":"RHSA-2022:0590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0592","reference_id":"RHSA-2022:0592","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0592"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0620","reference_id":"RHSA-2022:0620","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0620"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0622","reference_id":"RHSA-2022:0622","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0622"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0629","reference_id":"RHSA-2022:0629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0636","reference_id":"RHSA-2022:0636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0771","reference_id":"RHSA-2022:0771","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0771"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0772","reference_id":"RHSA-2022:0772","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0772"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0777","reference_id":"RHSA-2022:0777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0819","reference_id":"RHSA-2022:0819","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0819"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0823","reference_id":"RHSA-2022:0823","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0823"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0825","reference_id":"RHSA-2022:0825","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0825"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0841","reference_id":"RHSA-2022:0841","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0841"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0849","reference_id":"RHSA-2022:0849","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0849"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0851","reference_id":"RHSA-2022:0851","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0851"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0958","reference_id":"RHSA-2022:0958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1103","reference_id":"RHSA-2022:1103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1104","reference_id":"RHSA-2022:1104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1106","reference_id":"RHSA-2022:1106","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1106"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1107","reference_id":"RHSA-2022:1107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1263","reference_id":"RHSA-2022:1263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1263"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1324","reference_id":"RHSA-2022:1324","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1324"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1373","reference_id":"RHSA-2022:1373","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1373"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1417","reference_id":"RHSA-2022:1417","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1417"},{"reference_url":"https://usn.ubuntu.com/5361-1/","reference_id":"USN-5361-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5361-1/"},{"reference_url":"https://usn.ubuntu.com/7720-1/","reference_id":"USN-7720-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7720-1/"}],"fixed_packages":[],"aliases":["CVE-2021-0920"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-txgc-kd7n-ekc6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/13044?format=json","vulnerability_id":"VCID-ukce-7qpu-c7cm","summary":"Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nIn Cyrus SASL 2.1.17 through 2.1.27 before 2.1.28, plugins/sql.c does not escape the password for a SQL INSERT or UPDATE statement.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24407.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24407.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-24407","reference_id":"","reference_type":"","scores":[{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62637","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62582","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62623","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.6263","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62612","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62624","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.6264","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62616","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62605","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67134","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67157","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67132","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67182","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67195","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-24407"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst"},{"reference_url":"https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28","reference_id":"","reference_type":"","scores":[],"url":"https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28"},{"reference_url":"https://www.debian.org/security/2022/dsa-5087","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2022/dsa-5087"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/02/23/4","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2022/02/23/4"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2055326","reference_id":"2055326","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2055326"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24407","reference_id":"CVE-2022-24407","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24407"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0658","reference_id":"RHSA-2022:0658","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0658"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0666","reference_id":"RHSA-2022:0666","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0666"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0668","reference_id":"RHSA-2022:0668","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0668"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0730","reference_id":"RHSA-2022:0730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0731","reference_id":"RHSA-2022:0731","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0731"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0780","reference_id":"RHSA-2022:0780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0841","reference_id":"RHSA-2022:0841","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0841"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1029","reference_id":"RHSA-2022:1029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1263","reference_id":"RHSA-2022:1263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1263"},{"reference_url":"https://usn.ubuntu.com/5301-1/","reference_id":"USN-5301-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5301-1/"},{"reference_url":"https://usn.ubuntu.com/5301-2/","reference_id":"USN-5301-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5301-2/"}],"fixed_packages":[],"aliases":["CVE-2022-24407"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ukce-7qpu-c7cm"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/redhat-virtualization-host@4.4.10-202203101736_8%3Farch=5"}