Zercurity data services
  • Summary
  • Applications (6)
  • Packages (0)
  • Vulnerabilities (46)

linux-modules-iwlwifi-5.15.0-1025-intel-iotg

Hashes
Linux kernel iwlwifi modules for version 5.15.0-1025 This package provides the Linux kernel iwlwifi modules for version 5.15.0-1025. You likely do not want to install this package directly. Instead, install the one of the linux-modules-iwlwifi-intel-iotg* meta-packages, which will ensure that upgrades work correctly, and that supporting packages are also installed.
  • SHA256: d51a3984a45ec88d373491600266a57b4284a0bd8b075e5db33d626b7258a844
  • SHA1: 06680a547a716dfe3231a3344b550fde4ef17227
  • MD5: 36adad94febcaacd6af640b056ee2def
Information
  • Version: 5.15.0-1025.30
  • Filename: linux-modules-iwlwifi-5.15.0-1025-intel-iotg_5.15.0-1025.30_amd64.deb
  • Size: 6306
  • Type: DEB
  • Source: linux-intel-iotg
  • Architecture: AMD64
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: linux-image-5.15.0-1025-intel-iotg | linux-image-unsigned-5.15.0-1025-intel-iotg

Applications

NameTypeArchSizeRisk
cfg80211.ko
/lib/modules/5.15.0-1025-intel-iotg/ubuntu/iwlwifi/cfg80211.ko
16054090
iwlwifi.ko
/lib/modules/5.15.0-1025-intel-iotg/ubuntu/iwlwifi/iwlwifi.ko
9489930
compat.ko
/lib/modules/5.15.0-1025-intel-iotg/ubuntu/iwlwifi/compat.ko
85290
mac80211.ko
/lib/modules/5.15.0-1025-intel-iotg/ubuntu/iwlwifi/mac80211.ko
20529530
iwlmvm.ko
/lib/modules/5.15.0-1025-intel-iotg/ubuntu/iwlwifi/iwlmvm.ko
12187370
iwlxvt.ko
/lib/modules/5.15.0-1025-intel-iotg/ubuntu/iwlwifi/iwlxvt.ko
1284730

Vulnerabilities

NameRiskSourceFixed
CVE-2022-316955USN
linux-intel-iotg-tools-host
5.15.0-1026.31
CVE-2022-475218USN
CVE-2022-33446USN
CVE-2022-316955USN
CVE-2022-343543USN
linux-intel-iotg-tools-host
5.15.0-1026.31
CVE-2023-04685USN
linux-intel-iotg-tools-host
5.15.0-1026.31
CVE-2022-352125USN
CVE-2022-475207USN
linux-intel-iotg-tools-host
5.15.0-1026.31
CVE-2022-458696USN
linux-intel-iotg-tools-host
5.15.0-1026.31
CVE-2023-01798USN
linux-intel-iotg-tools-host
5.15.0-1026.31
CVE-2022-475198USN
linux-intel-iotg-tools-host
5.15.0-1026.31
CVE-2022-352125USN
linux-intel-iotg-tools-host
5.15.0-1026.31
CVE-2022-423296USN
linux-intel-iotg-tools-host
5.15.0-1026.31
CVE-2023-266058USN
linux-intel-iotg-tools-host
5.15.0-1026.31
CVE-2022-475218USN
linux-intel-iotg-tools-host
5.15.0-1026.31
CVE-2023-04610USN
linux-intel-iotg-tools-host
5.15.0-1026.31
CVE-2022-354578USN
linux-intel-iotg-tools-host
5.15.0-1026.31
CVE-2022-423286USN
linux-intel-iotg-tools-host
5.15.0-1026.31
CVE-2022-41390USN
linux-intel-iotg-tools-host
5.15.0-1026.31
CVE-2022-423286USN
CVE-2022-354578USN
CVE-2022-33446USN
linux-intel-iotg-tools-host
5.15.0-1026.31
CVE-2023-266058USN
CVE-2022-475188USN
linux-intel-iotg-tools-host
5.15.0-1026.31
CVE-2022-43798USN
linux-intel-iotg-tools-host
5.15.0-1026.31
CVE-2022-475207USN
CVE-2023-01798USN
CVE-2022-343543USN
CVE-2022-475188USN
CVE-2022-423296USN
CVE-2022-43798USN
CVE-2022-458696USN
CVE-2022-41390USN
CVE-2023-04685USN
CVE-2023-04610USN
CVE-2022-475198USN
CVE-2023-266077USN
CVE-2023-13820USN
CVE-2023-11950USN
CVE-2023-266077USN
linux-intel-iotg-tools-host
5.15.0-1026.31
CVE-2023-11950USN
linux-intel-iotg-tools-host
5.15.0-1026.31
CVE-2023-13820USN
linux-intel-iotg-tools-host
5.15.0-1026.31
CVE-2023-20060USN
CVE-2023-21660USN
CVE-2023-21660USN
linux-intel-iotg-tools-host
5.15.0-1026.31
CVE-2023-20060USN
linux-intel-iotg-tools-host
5.15.0-1026.31

Raw Object

{
  "sha256": "d51a3984a45ec88d373491600266a57b4284a0bd8b075e5db33d626b7258a844",
  "sha1": "06680a547a716dfe3231a3344b550fde4ef17227",
  "md5": "36adad94febcaacd6af640b056ee2def",
  "type": "DEB",
  "arch": "AMD64",
  "name": "linux-modules-iwlwifi-5.15.0-1025-intel-iotg",
  "filename": "linux-modules-iwlwifi-5.15.0-1025-intel-iotg_5.15.0-1025.30_amd64.deb",
  "size": 6306,
  "description": "Linux kernel iwlwifi modules for version 5.15.0-1025\nThis package provides the Linux kernel iwlwifi modules for version\n5.15.0-1025.\n\nYou likely do not want to install this package directly. Instead, install the\none of the linux-modules-iwlwifi-intel-iotg* meta-packages,\nwhich will ensure that upgrades work correctly, and that supporting packages are\nalso installed.",
  "url": null,
  "version": "5.15.0-1025.30",
  "source": "linux-intel-iotg",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "linux-image-5.15.0-1025-intel-iotg | linux-image-unsigned-5.15.0-1025-intel-iotg",
  "applications": [
    {
      "path": "/lib/modules/5.15.0-1025-intel-iotg/ubuntu/iwlwifi/cfg80211.ko",
      "sha256": "8c473e69cfffd1ac069b689cdadbdcdb366dbd8563d97ba5e3ab7a0902a2d479",
      "sha1": "4f6bcbff20a98da85f376ddb6e9010f412e027d7",
      "md5": "a9fe44136048f1e02911a1afa36534fc",
      "name": "cfg80211.ko",
      "size": 1605409,
      "description": null,
      "package": 5147688,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-17T11:13:33+00:00",
      "updated_at": "2023-02-17T11:13:33+00:00",
      "deleted_at": null
    },
    {
      "path": "/lib/modules/5.15.0-1025-intel-iotg/ubuntu/iwlwifi/iwlwifi.ko",
      "sha256": "de2f704fad776c8be9b0c4743b7bb55e94591d41ef53ffb9a6fd64170ef686f7",
      "sha1": "ac13b65f1c3a490321ab770986fa2bf1c3c724c6",
      "md5": "2a3cd42f5f8694441806b7032e66eeea",
      "name": "iwlwifi.ko",
      "size": 948993,
      "description": null,
      "package": 5147688,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-17T11:13:33+00:00",
      "updated_at": "2023-02-17T11:13:33+00:00",
      "deleted_at": null
    },
    {
      "path": "/lib/modules/5.15.0-1025-intel-iotg/ubuntu/iwlwifi/compat.ko",
      "sha256": "13205c23581c600f9f5c8e61c75777f909e4b58513ebae3ea7f69469ce84984b",
      "sha1": "768b8a27aba682f240fa16ba2b0db16da34d5f10",
      "md5": "020e1eefeb7b3a55bfebb74ab9435e84",
      "name": "compat.ko",
      "size": 8529,
      "description": null,
      "package": 5147688,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-17T11:13:33+00:00",
      "updated_at": "2023-02-17T11:13:33+00:00",
      "deleted_at": null
    },
    {
      "path": "/lib/modules/5.15.0-1025-intel-iotg/ubuntu/iwlwifi/mac80211.ko",
      "sha256": "bbcda0c0d0276c7f9b88054cc0f888e89e9ba3305e0ddcb519ed7b1c3cf4b4f9",
      "sha1": "2008ba6af1af7aa7c2173c12430255b981566b97",
      "md5": "ecc2f1767a737c716feba151982c7292",
      "name": "mac80211.ko",
      "size": 2052953,
      "description": null,
      "package": 5147688,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-17T11:13:33+00:00",
      "updated_at": "2023-02-17T11:13:33+00:00",
      "deleted_at": null
    },
    {
      "path": "/lib/modules/5.15.0-1025-intel-iotg/ubuntu/iwlwifi/iwlmvm.ko",
      "sha256": "4a1aa2eb9797798e09c90d78b16aa81b61afe3ab16b6bbc13e6af5a7b79b676e",
      "sha1": "790e4b379047fdd549feaa17a3379121738f7d05",
      "md5": "7d63d9965e652ce2611aeebff60df61a",
      "name": "iwlmvm.ko",
      "size": 1218737,
      "description": null,
      "package": 5147688,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-17T11:13:33+00:00",
      "updated_at": "2023-02-17T11:13:33+00:00",
      "deleted_at": null
    },
    {
      "path": "/lib/modules/5.15.0-1025-intel-iotg/ubuntu/iwlwifi/iwlxvt.ko",
      "sha256": "0b1afc926eb50b4334c51dd309e566c8c32d398119f499ca69f4fdff831c411a",
      "sha1": "0962814d29ae2d3ade6fcd0956ebd92bd743bd59",
      "md5": "c46fb5ef21fa8075d13a044a1f0686d8",
      "name": "iwlxvt.ko",
      "size": 128473,
      "description": null,
      "package": 5147688,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-17T11:13:33+00:00",
      "updated_at": "2023-02-17T11:13:33+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2022-3169",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "aeca24ec4021910bf2aad006c67b1ddfad46689f4640a2e6ce8507e40fea595e",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1026.31",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1026.31_all.deb"
      },
      "created_at": "2023-03-17T11:11:40+00:00",
      "updated_at": "2023-03-17T11:11:40+00:00"
    },
    {
      "name": "CVE-2022-47521",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-18T10:25:36+00:00",
      "updated_at": "2023-03-18T10:25:36+00:00"
    },
    {
      "name": "CVE-2022-3344",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-18T10:26:35+00:00",
      "updated_at": "2023-03-18T10:26:35+00:00"
    },
    {
      "name": "CVE-2022-3169",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-18T10:27:51+00:00",
      "updated_at": "2023-03-18T10:27:51+00:00"
    },
    {
      "name": "CVE-2022-3435",
      "risk": 43,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "aeca24ec4021910bf2aad006c67b1ddfad46689f4640a2e6ce8507e40fea595e",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1026.31",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1026.31_all.deb"
      },
      "created_at": "2023-03-17T11:21:29+00:00",
      "updated_at": "2023-03-17T11:21:29+00:00"
    },
    {
      "name": "CVE-2023-0468",
      "risk": 5,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "aeca24ec4021910bf2aad006c67b1ddfad46689f4640a2e6ce8507e40fea595e",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1026.31",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1026.31_all.deb"
      },
      "created_at": "2023-03-17T11:21:41+00:00",
      "updated_at": "2023-03-17T11:21:41+00:00"
    },
    {
      "name": "CVE-2022-3521",
      "risk": 25,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-18T10:28:15+00:00",
      "updated_at": "2023-03-18T10:28:15+00:00"
    },
    {
      "name": "CVE-2022-47520",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "aeca24ec4021910bf2aad006c67b1ddfad46689f4640a2e6ce8507e40fea595e",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1026.31",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1026.31_all.deb"
      },
      "created_at": "2023-03-17T11:23:16+00:00",
      "updated_at": "2023-03-17T11:23:16+00:00"
    },
    {
      "name": "CVE-2022-45869",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "aeca24ec4021910bf2aad006c67b1ddfad46689f4640a2e6ce8507e40fea595e",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1026.31",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1026.31_all.deb"
      },
      "created_at": "2023-03-17T11:27:05+00:00",
      "updated_at": "2023-03-17T11:27:05+00:00"
    },
    {
      "name": "CVE-2023-0179",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "aeca24ec4021910bf2aad006c67b1ddfad46689f4640a2e6ce8507e40fea595e",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1026.31",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1026.31_all.deb"
      },
      "created_at": "2023-03-17T11:27:10+00:00",
      "updated_at": "2023-03-17T11:27:10+00:00"
    },
    {
      "name": "CVE-2022-47519",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "aeca24ec4021910bf2aad006c67b1ddfad46689f4640a2e6ce8507e40fea595e",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1026.31",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1026.31_all.deb"
      },
      "created_at": "2023-03-17T11:27:16+00:00",
      "updated_at": "2023-03-17T11:27:16+00:00"
    },
    {
      "name": "CVE-2022-3521",
      "risk": 25,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "aeca24ec4021910bf2aad006c67b1ddfad46689f4640a2e6ce8507e40fea595e",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1026.31",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1026.31_all.deb"
      },
      "created_at": "2023-03-17T11:28:08+00:00",
      "updated_at": "2023-03-17T11:28:08+00:00"
    },
    {
      "name": "CVE-2022-42329",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "aeca24ec4021910bf2aad006c67b1ddfad46689f4640a2e6ce8507e40fea595e",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1026.31",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1026.31_all.deb"
      },
      "created_at": "2023-03-17T11:28:21+00:00",
      "updated_at": "2023-03-17T11:28:21+00:00"
    },
    {
      "name": "CVE-2023-26605",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "aeca24ec4021910bf2aad006c67b1ddfad46689f4640a2e6ce8507e40fea595e",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1026.31",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1026.31_all.deb"
      },
      "created_at": "2023-03-17T11:28:43+00:00",
      "updated_at": "2023-03-17T11:28:43+00:00"
    },
    {
      "name": "CVE-2022-47521",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "aeca24ec4021910bf2aad006c67b1ddfad46689f4640a2e6ce8507e40fea595e",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1026.31",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1026.31_all.deb"
      },
      "created_at": "2023-03-17T11:29:03+00:00",
      "updated_at": "2023-03-17T11:29:03+00:00"
    },
    {
      "name": "CVE-2023-0461",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "aeca24ec4021910bf2aad006c67b1ddfad46689f4640a2e6ce8507e40fea595e",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1026.31",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1026.31_all.deb"
      },
      "created_at": "2023-03-17T11:29:16+00:00",
      "updated_at": "2023-03-17T11:29:16+00:00"
    },
    {
      "name": "CVE-2022-3545",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "aeca24ec4021910bf2aad006c67b1ddfad46689f4640a2e6ce8507e40fea595e",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1026.31",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1026.31_all.deb"
      },
      "created_at": "2023-03-17T11:29:32+00:00",
      "updated_at": "2023-03-17T11:29:32+00:00"
    },
    {
      "name": "CVE-2022-42328",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "aeca24ec4021910bf2aad006c67b1ddfad46689f4640a2e6ce8507e40fea595e",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1026.31",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1026.31_all.deb"
      },
      "created_at": "2023-03-17T11:29:48+00:00",
      "updated_at": "2023-03-17T11:29:48+00:00"
    },
    {
      "name": "CVE-2022-4139",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "aeca24ec4021910bf2aad006c67b1ddfad46689f4640a2e6ce8507e40fea595e",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1026.31",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1026.31_all.deb"
      },
      "created_at": "2023-03-17T11:31:48+00:00",
      "updated_at": "2023-03-17T11:31:48+00:00"
    },
    {
      "name": "CVE-2022-42328",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-18T10:31:10+00:00",
      "updated_at": "2023-03-18T10:31:10+00:00"
    },
    {
      "name": "CVE-2022-3545",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-18T10:43:57+00:00",
      "updated_at": "2023-03-18T10:43:57+00:00"
    },
    {
      "name": "CVE-2022-3344",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "aeca24ec4021910bf2aad006c67b1ddfad46689f4640a2e6ce8507e40fea595e",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1026.31",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1026.31_all.deb"
      },
      "created_at": "2023-03-17T11:33:01+00:00",
      "updated_at": "2023-03-17T11:33:01+00:00"
    },
    {
      "name": "CVE-2023-26605",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-18T10:44:49+00:00",
      "updated_at": "2023-03-18T10:44:49+00:00"
    },
    {
      "name": "CVE-2022-47518",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "aeca24ec4021910bf2aad006c67b1ddfad46689f4640a2e6ce8507e40fea595e",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1026.31",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1026.31_all.deb"
      },
      "created_at": "2023-03-17T11:34:23+00:00",
      "updated_at": "2023-03-17T11:34:23+00:00"
    },
    {
      "name": "CVE-2022-4379",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "aeca24ec4021910bf2aad006c67b1ddfad46689f4640a2e6ce8507e40fea595e",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1026.31",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1026.31_all.deb"
      },
      "created_at": "2023-03-17T11:34:43+00:00",
      "updated_at": "2023-03-17T11:34:43+00:00"
    },
    {
      "name": "CVE-2022-47520",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-18T10:24:35+00:00",
      "updated_at": "2023-03-18T10:24:35+00:00"
    },
    {
      "name": "CVE-2023-0179",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-18T10:33:35+00:00",
      "updated_at": "2023-03-18T10:33:35+00:00"
    },
    {
      "name": "CVE-2022-3435",
      "risk": 43,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-18T10:33:56+00:00",
      "updated_at": "2023-03-18T10:33:56+00:00"
    },
    {
      "name": "CVE-2022-47518",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-18T10:34:18+00:00",
      "updated_at": "2023-03-18T10:34:18+00:00"
    },
    {
      "name": "CVE-2022-42329",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-18T10:34:28+00:00",
      "updated_at": "2023-03-18T10:34:28+00:00"
    },
    {
      "name": "CVE-2022-4379",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-18T10:35:07+00:00",
      "updated_at": "2023-03-18T10:35:07+00:00"
    },
    {
      "name": "CVE-2022-45869",
      "risk": 6,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-18T10:36:47+00:00",
      "updated_at": "2023-03-18T10:36:47+00:00"
    },
    {
      "name": "CVE-2022-4139",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-18T10:36:55+00:00",
      "updated_at": "2023-03-18T10:36:55+00:00"
    },
    {
      "name": "CVE-2023-0468",
      "risk": 5,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-18T10:36:59+00:00",
      "updated_at": "2023-03-18T10:36:59+00:00"
    },
    {
      "name": "CVE-2023-0461",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-18T10:41:09+00:00",
      "updated_at": "2023-03-18T10:41:09+00:00"
    },
    {
      "name": "CVE-2022-47519",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-18T10:48:09+00:00",
      "updated_at": "2023-03-18T10:48:09+00:00"
    },
    {
      "name": "CVE-2023-26607",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-21T09:25:14+00:00",
      "updated_at": "2023-04-21T09:25:14+00:00"
    },
    {
      "name": "CVE-2023-1382",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-21T09:29:30+00:00",
      "updated_at": "2023-04-21T09:29:30+00:00"
    },
    {
      "name": "CVE-2023-1195",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-04-21T09:35:58+00:00",
      "updated_at": "2023-04-21T09:35:58+00:00"
    },
    {
      "name": "CVE-2023-26607",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "aeca24ec4021910bf2aad006c67b1ddfad46689f4640a2e6ce8507e40fea595e",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1026.31",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1026.31_all.deb"
      },
      "created_at": "2023-04-22T09:30:20+00:00",
      "updated_at": "2023-04-22T09:30:20+00:00"
    },
    {
      "name": "CVE-2023-1195",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "aeca24ec4021910bf2aad006c67b1ddfad46689f4640a2e6ce8507e40fea595e",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1026.31",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1026.31_all.deb"
      },
      "created_at": "2023-04-22T09:31:36+00:00",
      "updated_at": "2023-04-22T09:31:36+00:00"
    },
    {
      "name": "CVE-2023-1382",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "aeca24ec4021910bf2aad006c67b1ddfad46689f4640a2e6ce8507e40fea595e",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1026.31",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1026.31_all.deb"
      },
      "created_at": "2023-04-22T09:35:39+00:00",
      "updated_at": "2023-04-22T09:35:39+00:00"
    },
    {
      "name": "CVE-2023-2006",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-05-13T12:12:42+00:00",
      "updated_at": "2023-05-13T12:12:42+00:00"
    },
    {
      "name": "CVE-2023-2166",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-05-13T13:32:19+00:00",
      "updated_at": "2023-05-13T13:32:19+00:00"
    },
    {
      "name": "CVE-2023-2166",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "aeca24ec4021910bf2aad006c67b1ddfad46689f4640a2e6ce8507e40fea595e",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1026.31",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1026.31_all.deb"
      },
      "created_at": "2023-06-17T12:57:04+00:00",
      "updated_at": "2023-06-17T12:57:04+00:00"
    },
    {
      "name": "CVE-2023-2006",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "aeca24ec4021910bf2aad006c67b1ddfad46689f4640a2e6ce8507e40fea595e",
        "name": "linux-intel-iotg-tools-host",
        "version": "5.15.0-1026.31",
        "filename": "linux-intel-iotg-tools-host_5.15.0-1026.31_all.deb"
      },
      "created_at": "2023-06-17T13:27:48+00:00",
      "updated_at": "2023-06-17T13:27:48+00:00"
    }
  ],
  "risk": 78,
  "vulnerable": 78,
  "outdated": 78,
  "malicious": 0,
  "created_at": "2023-01-24T15:28:15+00:00",
  "updated_at": "2023-02-17T11:13:33+00:00",
  "deleted_at": null
}