| 0 |
| url |
VCID-192b-rfyw-nbdv |
| vulnerability_id |
VCID-192b-rfyw-nbdv |
| summary |
kernel: mm/sparsemem: fix race in accessing memory_section->usage |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52489 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00416 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00426 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00406 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00402 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.004 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00394 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00398 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00424 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00425 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00415 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00408 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00405 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52489 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
| 110 |
|
| 111 |
|
| 112 |
|
| 113 |
|
| 114 |
|
| 115 |
|
| 116 |
|
| 117 |
|
| 118 |
|
| 119 |
|
| 120 |
|
| 121 |
|
| 122 |
|
| 123 |
|
| 124 |
|
| 125 |
|
| 126 |
|
| 127 |
|
| 128 |
|
| 129 |
|
| 130 |
|
| 131 |
|
| 132 |
|
| 133 |
|
| 134 |
|
| 135 |
|
| 136 |
|
| 137 |
|
| 138 |
|
| 139 |
|
| 140 |
|
| 141 |
|
| 142 |
|
| 143 |
|
| 144 |
|
| 145 |
|
| 146 |
|
| 147 |
|
| 148 |
|
| 149 |
|
| 150 |
|
| 151 |
|
| 152 |
|
| 153 |
|
| 154 |
|
| 155 |
|
| 156 |
|
| 157 |
|
| 158 |
|
| 159 |
|
| 160 |
|
| 161 |
|
| 162 |
|
| 163 |
|
| 164 |
|
| 165 |
|
| 166 |
|
| 167 |
|
| 168 |
|
| 169 |
|
| 170 |
|
| 171 |
|
| 172 |
|
| 173 |
|
| 174 |
|
| 175 |
|
| 176 |
|
| 177 |
|
| 178 |
|
| 179 |
|
| 180 |
|
| 181 |
|
| 182 |
|
| 183 |
|
| 184 |
|
| 185 |
|
| 186 |
|
| 187 |
|
| 188 |
|
| 189 |
|
| 190 |
|
| 191 |
|
| 192 |
|
| 193 |
|
| 194 |
|
| 195 |
|
| 196 |
|
| 197 |
|
| 198 |
|
| 199 |
|
| 200 |
|
| 201 |
|
| 202 |
|
| 203 |
|
| 204 |
|
| 205 |
|
| 206 |
|
| 207 |
|
| 208 |
|
| 209 |
|
| 210 |
|
| 211 |
|
| 212 |
|
| 213 |
|
| 214 |
|
| 215 |
|
| 216 |
|
| 217 |
|
| 218 |
|
| 219 |
|
| 220 |
|
| 221 |
|
| 222 |
|
| 223 |
|
| 224 |
|
| 225 |
|
| 226 |
|
| 227 |
|
| 228 |
|
| 229 |
|
| 230 |
|
| 231 |
|
| 232 |
|
| 233 |
|
| 234 |
|
| 235 |
|
| 236 |
|
| 237 |
|
| 238 |
|
| 239 |
|
| 240 |
|
| 241 |
|
| 242 |
|
| 243 |
|
| 244 |
|
| 245 |
|
| 246 |
|
| 247 |
|
| 248 |
|
| 249 |
|
| 250 |
|
| 251 |
|
| 252 |
|
| 253 |
|
| 254 |
|
| 255 |
|
| 256 |
|
| 257 |
|
| 258 |
|
| 259 |
|
| 260 |
|
| 261 |
|
| 262 |
|
| 263 |
|
| 264 |
|
| 265 |
|
| 266 |
|
| 267 |
|
| 268 |
|
| 269 |
|
| 270 |
|
| 271 |
|
| 272 |
|
| 273 |
|
| 274 |
|
| 275 |
|
| 276 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-52489
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-192b-rfyw-nbdv |
|
| 1 |
| url |
VCID-1ae9-q8q5-2fex |
| vulnerability_id |
VCID-1ae9-q8q5-2fex |
| summary |
kernel: blk-mq: release crypto keyslot before reporting I/O complete |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53810 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14454 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14487 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14484 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14588 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14549 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14491 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14383 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14384 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53810 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53810
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1ae9-q8q5-2fex |
|
| 2 |
| url |
VCID-1ak6-9nnt-qufc |
| vulnerability_id |
VCID-1ak6-9nnt-qufc |
| summary |
kernel: bnxt_en: Avoid order-5 memory allocation for TPA data |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53134 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19772 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19824 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19546 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19626 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19679 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19683 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19634 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19575 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19553 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.1956 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19573 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19468 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19455 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53134 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53134
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1ak6-9nnt-qufc |
|
| 3 |
| url |
VCID-1bzf-phe4-a7bt |
| vulnerability_id |
VCID-1bzf-phe4-a7bt |
| summary |
kernel: bpf, cpumap: Handle skb as well when clean up ptr_ring |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53660 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03188 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03198 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03201 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03205 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03231 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03185 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03158 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03142 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03116 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03123 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03242 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03243 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03238 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53660 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53660
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1bzf-phe4-a7bt |
|
| 4 |
| url |
VCID-1fce-srce-hqfb |
| vulnerability_id |
VCID-1fce-srce-hqfb |
| summary |
kernel: opp: Fix use-after-free in lazy_opp_tables after probe deferral |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54026 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0739 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07372 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07427 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07451 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07437 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07346 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07456 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07417 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07424 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07413 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07341 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07329 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10017 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54026 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54026
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1fce-srce-hqfb |
|
| 5 |
| url |
VCID-1mpg-ccwc-xqhd |
| vulnerability_id |
VCID-1mpg-ccwc-xqhd |
| summary |
kernel: i2c: mlxbf: prevent stack overflow in mlxbf_i2c_smbus_start_transaction() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-48632 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05151 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05368 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05188 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05132 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05136 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05288 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05326 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.0518 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.052 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05233 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05251 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05219 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05202 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-48632 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-48632
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1mpg-ccwc-xqhd |
|
| 6 |
| url |
VCID-1n7q-7yme-1ket |
| vulnerability_id |
VCID-1n7q-7yme-1ket |
| summary |
kernel: cpufreq: qcom-hw: Fix memory leak in qcom_cpufreq_hw_read_lut() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50637 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07494 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07533 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07514 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07573 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07593 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10231 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10211 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10199 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10305 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10265 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10246 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10119 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10098 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50637 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50637
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1n7q-7yme-1ket |
|
| 7 |
| url |
VCID-1pt7-8yue-c3gk |
| vulnerability_id |
VCID-1pt7-8yue-c3gk |
| summary |
kernel: tls: race between async notify and socket close |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26583 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.07036 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06982 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.07067 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.07074 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.07063 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.07055 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06994 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06979 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.07112 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06947 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.07002 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07274 |
| published_at |
2026-04-26T12:55:00Z |
|
| 12 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07266 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26583 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-26583
|
| risk_score |
2.3 |
| exploitability |
0.5 |
| weighted_severity |
4.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1pt7-8yue-c3gk |
|
| 8 |
| url |
VCID-1vys-hjz5-vub2 |
| vulnerability_id |
VCID-1vys-hjz5-vub2 |
| summary |
kernel: drm/amdgpu: drop gfx_v11_0_cp_ecc_error_irq_funcs |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53628 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02737 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04764 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04779 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04812 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04825 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0479 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0477 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04723 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04731 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04912 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04951 |
| published_at |
2026-04-26T12:55:00Z |
|
| 11 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04741 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53628 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53628
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1vys-hjz5-vub2 |
|
| 9 |
| url |
VCID-1wkt-sn1p-jufn |
| vulnerability_id |
VCID-1wkt-sn1p-jufn |
| summary |
kernel: arm64/sme: Set new vector length before reallocating |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53184 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02778 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02792 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.028 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02802 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02823 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03812 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.0382 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03823 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.0375 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.0373 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03704 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03681 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03692 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53184 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53184
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1wkt-sn1p-jufn |
|
| 10 |
| url |
VCID-214g-9hfm-wqbk |
| vulnerability_id |
VCID-214g-9hfm-wqbk |
| summary |
kernel: Linux kernel: Denial of Service due to memory leak in mlx5e driver |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53999 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07747 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07792 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07749 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07809 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07826 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07821 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07684 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07837 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07808 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07794 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07708 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10479 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53999 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53999
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-214g-9hfm-wqbk |
|
| 11 |
| url |
VCID-253y-mvfx-rfbr |
| vulnerability_id |
VCID-253y-mvfx-rfbr |
| summary |
kernel: perf/x86/lbr: Filter vsyscall addresses |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52476 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0324 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03288 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03167 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03177 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03298 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0329 |
| published_at |
2026-04-24T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0325 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03257 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03263 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03284 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03242 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03215 |
| published_at |
2026-04-12T12:55:00Z |
|
| 12 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03194 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52476 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-52476
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-253y-mvfx-rfbr |
|
| 12 |
| url |
VCID-2de8-rys3-8fhr |
| vulnerability_id |
VCID-2de8-rys3-8fhr |
| summary |
kernel: netfilter: race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-42756 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00205 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00171 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00195 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00197 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00198 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00199 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00204 |
| published_at |
2026-04-26T12:55:00Z |
|
| 7 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00173 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0017 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-42756 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-42756
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2de8-rys3-8fhr |
|
| 13 |
| url |
VCID-2g9n-cup9-xke1 |
| vulnerability_id |
VCID-2g9n-cup9-xke1 |
| summary |
kernel: Linux kernel: Privilege escalation via out-of-bounds write in RDMA/siw |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50736 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14484 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50736 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50736
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2g9n-cup9-xke1 |
|
| 14 |
| url |
VCID-2gzz-t6b9-eqec |
| vulnerability_id |
VCID-2gzz-t6b9-eqec |
| summary |
kernel: drm/amdkfd: Add missing gfx11 MQD manager callbacks |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54261 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07747 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07792 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07749 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07809 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07826 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07821 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07808 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07794 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07708 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07684 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07837 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07761 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54261 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54261
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2gzz-t6b9-eqec |
|
| 15 |
| url |
VCID-2qm8-zzuj-hbd5 |
| vulnerability_id |
VCID-2qm8-zzuj-hbd5 |
| summary |
kernel: Linux kernel: Denial of Service via integer overflow in radeon_cs_parser_init |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53309 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02327 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02275 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02272 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02255 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02264 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02357 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02334 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02384 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02373 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02383 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02406 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02386 |
| published_at |
2026-04-08T12:55:00Z |
|
| 12 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02381 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53309 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53309
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2qm8-zzuj-hbd5 |
|
| 16 |
| url |
VCID-2r6a-aesf-zbej |
| vulnerability_id |
VCID-2r6a-aesf-zbej |
| summary |
kernel: Linux kernel: Denial of Service in Bluetooth HCI connection handling |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54038 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07747 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07792 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07749 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07809 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07826 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07821 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07684 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07837 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07808 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07794 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07708 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10479 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54038 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54038
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2r6a-aesf-zbej |
|
| 17 |
| url |
VCID-2rfc-1u9s-77bh |
| vulnerability_id |
VCID-2rfc-1u9s-77bh |
| summary |
kernel: TCP-spoofed ghost ACKs and leak leak initial sequence number |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52881 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01459 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01722 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01522 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01526 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01529 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01521 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01513 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01626 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01628 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0172 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01728 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01462 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52881 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-52881
|
| risk_score |
2.6 |
| exploitability |
0.5 |
| weighted_severity |
5.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2rfc-1u9s-77bh |
|
| 18 |
| url |
VCID-2tbb-89hb-rkh6 |
| vulnerability_id |
VCID-2tbb-89hb-rkh6 |
| summary |
kernel: skbuff: skb_segment, Call zero copy functions before using skbuff frags |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53354 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02951 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02937 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0296 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02975 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02965 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02973 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04185 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0403 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04019 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04031 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04154 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04166 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53354 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53354
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2tbb-89hb-rkh6 |
|
| 19 |
| url |
VCID-2tua-umaf-6uc6 |
| vulnerability_id |
VCID-2tua-umaf-6uc6 |
| summary |
kernel: lwt: Fix return values of BPF xmit ops |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53338 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03107 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0312 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03109 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0315 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03125 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03083 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04323 |
| published_at |
2026-04-26T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04186 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04156 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04164 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0429 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04303 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53338 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53338
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2tua-umaf-6uc6 |
|
| 20 |
| url |
VCID-2wfa-8pcm-gfe9 |
| vulnerability_id |
VCID-2wfa-8pcm-gfe9 |
| summary |
kernel: NULL pointer dereference vulnerability in io_uring_show_fdinfo |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-46862 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01338 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01344 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01355 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01359 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01358 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01347 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.0134 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01342 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01332 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01424 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01434 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01438 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-46862 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-46862
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2wfa-8pcm-gfe9 |
|
| 21 |
| url |
VCID-34km-p3dp-v7gp |
| vulnerability_id |
VCID-34km-p3dp-v7gp |
| summary |
kernel: ipmi_si: fix a memleak in try_smi_init() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53611 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02951 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02965 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02973 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02975 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0296 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02937 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02927 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02902 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02912 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03029 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03027 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03016 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53611 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53611
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-34km-p3dp-v7gp |
|
| 22 |
| url |
VCID-3545-g373-gfc8 |
| vulnerability_id |
VCID-3545-g373-gfc8 |
| summary |
kernel: misc: pci_endpoint_test: Free IRQs before removing the device |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54326 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10793 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54326 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54326
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3545-g373-gfc8 |
|
| 23 |
| url |
VCID-35wc-xgzx-pkh9 |
| vulnerability_id |
VCID-35wc-xgzx-pkh9 |
| summary |
kernel: ip_vti: fix potential slab-use-after-free in decode_session6 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53559 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03107 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0312 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03125 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0315 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03109 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03083 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0307 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03045 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03054 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03172 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03175 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03168 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53559 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53559
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-35wc-xgzx-pkh9 |
|
| 24 |
| url |
VCID-36n9-2h67-qyfg |
| vulnerability_id |
VCID-36n9-2h67-qyfg |
| summary |
kernel: gpiolib: cdev: fix NULL-pointer dereferences |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50453 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02895 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0291 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02919 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0292 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02945 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02915 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02887 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02868 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02879 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02998 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02992 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02979 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50453 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50453
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-36n9-2h67-qyfg |
|
| 25 |
| url |
VCID-3afh-2eps-zyad |
| vulnerability_id |
VCID-3afh-2eps-zyad |
| summary |
kernel: Revert "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54197 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.1533 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.154 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15203 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15291 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15341 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15303 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15264 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15199 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15113 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15121 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15177 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15217 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15215 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54197 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54197
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3afh-2eps-zyad |
|
| 26 |
| url |
VCID-3ejf-8txq-ffg6 |
| vulnerability_id |
VCID-3ejf-8txq-ffg6 |
| summary |
kernel: scsi: qla2xxx: Use raw_smp_processor_id() instead of smp_processor_id() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53530 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03188 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03198 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03201 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03205 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03231 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03185 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03158 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03142 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03116 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03123 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03242 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03243 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03238 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53530 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53530
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3ejf-8txq-ffg6 |
|
| 27 |
| url |
VCID-3evv-rmrt-9kea |
| vulnerability_id |
VCID-3evv-rmrt-9kea |
| summary |
kernel: netfilter: nf_tables: out-of-bounds access in nf_tables_newtable() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-6040 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0485 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04621 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04645 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04658 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04692 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04704 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04697 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0468 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04664 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04631 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04638 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04778 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04811 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-6040 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-6040
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
7.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3evv-rmrt-9kea |
|
| 28 |
| url |
VCID-3h89-dh3v-eye9 |
| vulnerability_id |
VCID-3h89-dh3v-eye9 |
| summary |
kernel: null-ptr-deref in alloc_workqueue |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52470 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05279 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05524 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.0537 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05393 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05362 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05351 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05341 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05288 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.0529 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05443 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05482 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05311 |
| published_at |
2026-04-04T12:55:00Z |
|
| 12 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05336 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52470 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-52470
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3h89-dh3v-eye9 |
|
| 29 |
| url |
VCID-3k4s-z6ym-tqh7 |
| vulnerability_id |
VCID-3k4s-z6ym-tqh7 |
| summary |
kernel: thunderbolt: Fix memory leak in tb_handle_dp_bandwidth_request() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53527 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04741 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04764 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04779 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04812 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04825 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0479 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0477 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04723 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04731 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04875 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04912 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04951 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53527 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53527
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3k4s-z6ym-tqh7 |
|
| 30 |
| url |
VCID-3ms7-4899-ukc9 |
| vulnerability_id |
VCID-3ms7-4899-ukc9 |
| summary |
kernel: net: fix possible store tearing in neigh_periodic_work() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52522 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00485 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00505 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00482 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0048 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00477 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00475 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00476 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00472 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00473 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00471 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00508 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00504 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52522 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-52522
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3ms7-4899-ukc9 |
|
| 31 |
| url |
VCID-3r27-df68-nkh6 |
| vulnerability_id |
VCID-3r27-df68-nkh6 |
| summary |
kernel: tls: handle backlogging of crypto requests |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26584 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09511 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09481 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09495 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09468 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09451 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09343 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09546 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09397 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09447 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09359 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09433 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26584 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-26584
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3r27-df68-nkh6 |
|
| 32 |
| url |
VCID-3reg-rcmu-x3ek |
| vulnerability_id |
VCID-3reg-rcmu-x3ek |
| summary |
kernel: Bluetooth: Fix possible deadlock in rfcomm_sk_state_change |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53016 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0322 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03267 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03263 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03193 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03172 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03145 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03155 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03275 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03269 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03228 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03236 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03242 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53016 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53016
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3reg-rcmu-x3ek |
|
| 33 |
| url |
VCID-3t7p-963j-s7cs |
| vulnerability_id |
VCID-3t7p-963j-s7cs |
| summary |
kernel: KVM: SVM: Get source vCPUs from source VM for SEV-ES intrahost migration |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54296 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06793 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0684 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06822 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06874 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06907 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.069 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06893 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06888 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0683 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06811 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06956 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06938 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06942 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54296 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54296
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3t7p-963j-s7cs |
|
| 34 |
| url |
VCID-3ufx-7ea9-vffv |
| vulnerability_id |
VCID-3ufx-7ea9-vffv |
| summary |
kernel: maple_tree: fix potential out-of-bounds access in mas_wr_end_piv() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54135 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07346 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0739 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07372 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07427 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07451 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07437 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07456 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07417 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07424 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07413 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07341 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07329 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10017 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54135 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54135
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3ufx-7ea9-vffv |
|
| 35 |
| url |
VCID-3vz8-8v9a-dfgn |
| vulnerability_id |
VCID-3vz8-8v9a-dfgn |
| summary |
kernel: Linux kernel KVM: Denial of Service in nested SVM due to TSC multiplier manipulation |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53208 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01826 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0184 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01838 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01843 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01857 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02186 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02204 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02203 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02197 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02281 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02261 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02252 |
| published_at |
2026-04-26T12:55:00Z |
|
| 12 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02215 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53208 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53208
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3vz8-8v9a-dfgn |
|
| 36 |
| url |
VCID-3zj3-q89s-4qc5 |
| vulnerability_id |
VCID-3zj3-q89s-4qc5 |
| summary |
kernel: hsr: Fix uninit-value access in fill_frame_info() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53462 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02895 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0291 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02919 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0292 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02945 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02915 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02887 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02868 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02879 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02998 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02992 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02979 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53462 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53462
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3zj3-q89s-4qc5 |
|
| 37 |
| url |
VCID-458y-5gut-eqe6 |
| vulnerability_id |
VCID-458y-5gut-eqe6 |
| summary |
kernel: ext4: don't allow journal inode to have encrypt flag |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50277 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00855 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00856 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00858 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00862 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00859 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00967 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00961 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00957 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00964 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.01019 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0102 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.01024 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50277 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50277
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-458y-5gut-eqe6 |
|
| 38 |
| url |
VCID-45vq-ugkk-1fa5 |
| vulnerability_id |
VCID-45vq-ugkk-1fa5 |
| summary |
kernel: Drivers: hv: vmbus: Don't dereference ACPI root object handle |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53647 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03188 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03198 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03201 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03205 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03231 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03185 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03158 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03142 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03116 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03123 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03242 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03243 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03238 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53647 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53647
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-45vq-ugkk-1fa5 |
|
| 39 |
| url |
VCID-47ud-gd2n-s3g1 |
| vulnerability_id |
VCID-47ud-gd2n-s3g1 |
| summary |
kernel: wifi: mac80211_hwsim: drop short frames |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53321 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02603 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02557 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02617 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02621 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02625 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02645 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02622 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02485 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02483 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02467 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02473 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.0258 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02568 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53321 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53321
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-47ud-gd2n-s3g1 |
|
| 40 |
| url |
VCID-4kmy-n2ts-hfa2 |
| vulnerability_id |
VCID-4kmy-n2ts-hfa2 |
| summary |
kernel: sched/membarrier: reduce the ability to hammer on sys_membarrier |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26602 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01307 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01228 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01235 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01237 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01214 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01217 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01209 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01222 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01295 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01301 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01215 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.0122 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26602 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
| 110 |
|
| 111 |
|
| 112 |
|
| 113 |
|
| 114 |
|
| 115 |
|
| 116 |
|
| 117 |
|
| 118 |
|
| 119 |
|
| 120 |
|
| 121 |
|
| 122 |
|
| 123 |
|
| 124 |
|
| 125 |
|
| 126 |
|
| 127 |
|
| 128 |
|
| 129 |
|
| 130 |
|
| 131 |
|
| 132 |
|
| 133 |
|
| 134 |
|
| 135 |
|
| 136 |
|
| 137 |
|
| 138 |
|
| 139 |
|
| 140 |
|
| 141 |
|
| 142 |
|
| 143 |
|
| 144 |
|
| 145 |
|
| 146 |
|
| 147 |
|
| 148 |
|
| 149 |
|
| 150 |
|
| 151 |
|
| 152 |
|
| 153 |
|
| 154 |
|
| 155 |
|
| 156 |
|
| 157 |
|
| 158 |
|
| 159 |
|
| 160 |
|
| 161 |
|
| 162 |
|
| 163 |
|
| 164 |
|
| 165 |
|
| 166 |
|
| 167 |
|
| 168 |
|
| 169 |
|
| 170 |
|
| 171 |
|
| 172 |
|
| 173 |
|
| 174 |
|
| 175 |
|
| 176 |
|
| 177 |
|
| 178 |
|
| 179 |
|
| 180 |
|
| 181 |
|
| 182 |
|
| 183 |
|
| 184 |
|
| 185 |
|
| 186 |
|
| 187 |
|
| 188 |
|
| 189 |
|
| 190 |
|
| 191 |
|
| 192 |
|
| 193 |
|
| 194 |
|
| 195 |
|
| 196 |
|
| 197 |
|
| 198 |
|
| 199 |
|
| 200 |
|
| 201 |
|
| 202 |
|
| 203 |
|
| 204 |
|
| 205 |
|
| 206 |
|
| 207 |
|
| 208 |
|
| 209 |
|
| 210 |
|
| 211 |
|
| 212 |
|
| 213 |
|
| 214 |
|
| 215 |
|
| 216 |
|
| 217 |
|
| 218 |
|
| 219 |
|
| 220 |
|
| 221 |
|
| 222 |
|
| 223 |
|
| 224 |
|
| 225 |
|
| 226 |
|
| 227 |
|
| 228 |
|
| 229 |
|
| 230 |
|
| 231 |
|
| 232 |
|
| 233 |
|
| 234 |
|
| 235 |
|
| 236 |
|
| 237 |
|
| 238 |
|
| 239 |
|
| 240 |
|
| 241 |
|
| 242 |
|
| 243 |
|
| 244 |
|
| 245 |
|
| 246 |
|
| 247 |
|
| 248 |
|
| 249 |
|
| 250 |
|
| 251 |
|
| 252 |
|
| 253 |
|
| 254 |
|
| 255 |
|
| 256 |
|
| 257 |
|
| 258 |
|
| 259 |
|
| 260 |
|
| 261 |
|
| 262 |
|
| 263 |
|
| 264 |
|
| 265 |
|
| 266 |
|
| 267 |
|
| 268 |
|
| 269 |
|
| 270 |
|
| 271 |
|
| 272 |
|
| 273 |
|
| 274 |
|
| 275 |
|
| 276 |
|
| 277 |
|
| 278 |
|
| 279 |
|
| 280 |
|
| 281 |
|
| 282 |
|
| 283 |
|
| 284 |
|
| 285 |
|
| 286 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-26602
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4kmy-n2ts-hfa2 |
|
| 41 |
| url |
VCID-4ttv-ypmj-h7fr |
| vulnerability_id |
VCID-4ttv-ypmj-h7fr |
| summary |
kernel: Linux kernel: Denial of Service due to PCI resource leak |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53743 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07372 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07427 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07346 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0739 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09883 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09858 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10007 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10037 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10017 |
| published_at |
2026-04-26T12:55:00Z |
|
| 9 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10049 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10071 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.1003 |
| published_at |
2026-04-12T12:55:00Z |
|
| 12 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10009 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53743 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53743
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4ttv-ypmj-h7fr |
|
| 42 |
| url |
VCID-4u8y-9b4g-vqfx |
| vulnerability_id |
VCID-4u8y-9b4g-vqfx |
| summary |
kernel: QXL: race condition leading to use-after-free in qxl_mode_dumb_create() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39198 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00728 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00703 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00685 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00679 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00726 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00699 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00702 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00701 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00692 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00686 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39198 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-39198
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4u8y-9b4g-vqfx |
|
| 43 |
| url |
VCID-4vd2-y8nz-gqgm |
| vulnerability_id |
VCID-4vd2-y8nz-gqgm |
| summary |
kernel: memcg does not limit the number of POSIX file locks allowing memory exhaustion |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0480 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.06007 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05938 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05971 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09839 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09789 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09861 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09914 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09919 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09882 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09866 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09748 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09721 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09768 |
| published_at |
2026-04-01T12:55:00Z |
|
| 13 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.0989 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0480 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-0480
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4vd2-y8nz-gqgm |
|
| 44 |
| url |
VCID-4why-73du-t3gx |
| vulnerability_id |
VCID-4why-73du-t3gx |
| summary |
kernel: scsi: qla2xxx: Fix memory leak in qla2x00_probe_one() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53696 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07817 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07863 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07818 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07901 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07888 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07875 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07862 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07778 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07754 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07907 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07868 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07836 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53696 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53696
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4why-73du-t3gx |
|
| 45 |
| url |
VCID-51s3-1h4v-2fd8 |
| vulnerability_id |
VCID-51s3-1h4v-2fd8 |
| summary |
kernel: Kernel: Denial of Service due to reference count leak |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50777 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14484 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50777 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50777
|
| risk_score |
1.8 |
| exploitability |
0.5 |
| weighted_severity |
3.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-51s3-1h4v-2fd8 |
|
| 46 |
| url |
VCID-53uc-g9rh-tfhu |
| vulnerability_id |
VCID-53uc-g9rh-tfhu |
| summary |
kernel: cpufreq: davinci: Fix clk use after free |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53544 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03458 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03471 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03484 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03487 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03509 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03464 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03436 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03411 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03387 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03399 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03516 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03522 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03527 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53544 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53544
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-53uc-g9rh-tfhu |
|
| 47 |
| url |
VCID-5461-4f69-ykah |
| vulnerability_id |
VCID-5461-4f69-ykah |
| summary |
kernel: vdpa: Add features attr to vdpa_nl_policy for nlattr length check |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53652 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01854 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01866 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01868 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01871 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01884 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0187 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01849 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0183 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01829 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01914 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01908 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01904 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53652 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53652
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5461-4f69-ykah |
|
| 48 |
| url |
VCID-54qr-x4vv-xfex |
| vulnerability_id |
VCID-54qr-x4vv-xfex |
| summary |
kernel: tty: n_gsm: fix deadlock and link starvation in outgoing data path |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50116 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02662 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02691 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02699 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02701 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02722 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02695 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.0268 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02677 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11295 |
| published_at |
2026-04-26T12:55:00Z |
|
| 9 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11269 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.1127 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11397 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11339 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50116 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50116
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-54qr-x4vv-xfex |
|
| 49 |
| url |
VCID-5655-r8sa-eufc |
| vulnerability_id |
VCID-5655-r8sa-eufc |
| summary |
kernel: powerpc/rtas_flash: allow user copy to flash block cache objects |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53487 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03107 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0312 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03125 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0315 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03109 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03083 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0307 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03045 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03054 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03172 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03175 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03168 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53487 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53487
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5655-r8sa-eufc |
|
| 50 |
| url |
VCID-5d5t-fdde-qkgd |
| vulnerability_id |
VCID-5d5t-fdde-qkgd |
| summary |
kernel: iommufd: Set end correctly when doing batch carry |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54060 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07747 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07792 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07749 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07809 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07826 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07821 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07684 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07837 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07808 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07794 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07708 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10479 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54060 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54060
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5d5t-fdde-qkgd |
|
| 51 |
| url |
VCID-5hmr-mnq5-7yhr |
| vulnerability_id |
VCID-5hmr-mnq5-7yhr |
| summary |
kernel: ipmi:ssif: Fix a memory leak when scanning for an adapter |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54064 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14484 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54064 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54064
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5hmr-mnq5-7yhr |
|
| 52 |
| url |
VCID-5my6-4bjq-3kbv |
| vulnerability_id |
VCID-5my6-4bjq-3kbv |
| summary |
kernel: Bluetooth: HCI: Fix global-out-of-bounds |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53057 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16289 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16351 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.1615 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16236 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16302 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16284 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16244 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16176 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16114 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16132 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.1617 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16059 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16057 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53057 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53057
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5my6-4bjq-3kbv |
|
| 53 |
| url |
VCID-5t86-ndjy-mkhj |
| vulnerability_id |
VCID-5t86-ndjy-mkhj |
| summary |
kernel: virtio_vdpa: build affinity masks conditionally |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54008 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0684 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06822 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06874 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06907 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.069 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06793 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06956 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06938 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06893 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06888 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0683 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06811 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09303 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54008 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54008
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5t86-ndjy-mkhj |
|
| 54 |
| url |
VCID-5wf1-v12t-gkcq |
| vulnerability_id |
VCID-5wf1-v12t-gkcq |
| summary |
kernel: usb: out-of-bounds read in read_descriptors |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-37453 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05555 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05801 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05592 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.0559 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05628 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05653 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05626 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05618 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05611 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05562 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05576 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05733 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05765 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-37453 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-37453
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5wf1-v12t-gkcq |
|
| 55 |
| url |
VCID-5yqp-43hw-cuhu |
| vulnerability_id |
VCID-5yqp-43hw-cuhu |
| summary |
kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-38096 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10537 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10463 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10604 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10633 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.106 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10576 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10445 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10427 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11039 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.10937 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.10892 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.10977 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.10851 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-38096 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-38096
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5yqp-43hw-cuhu |
|
| 56 |
| url |
VCID-5z11-6c3t-ckd3 |
| vulnerability_id |
VCID-5z11-6c3t-ckd3 |
| summary |
kernel: team: NULL pointer dereference when team device type is changed |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52574 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00433 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00444 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00432 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00424 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00421 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00423 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00418 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00416 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00412 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00415 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00442 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52574 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-52574
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5z11-6c3t-ckd3 |
|
| 57 |
| url |
VCID-61au-ujuc-g7ek |
| vulnerability_id |
VCID-61au-ujuc-g7ek |
| summary |
kernel: amdgpu: validate offset_in_bo of drm_amdgpu_gem_va |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53819 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14454 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14487 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14484 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14588 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14549 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14491 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14383 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14384 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53819 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53819
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-61au-ujuc-g7ek |
|
| 58 |
| url |
VCID-676c-3wrp-1ufr |
| vulnerability_id |
VCID-676c-3wrp-1ufr |
| summary |
kernel: RDMA/rxe: Fix incomplete state save in rxe_requester |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53539 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03188 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03198 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03201 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03205 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03231 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03185 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03158 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03142 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03116 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03123 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03242 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03243 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03238 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53539 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53539
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-676c-3wrp-1ufr |
|
| 59 |
| url |
VCID-67u4-sdzt-w7ep |
| vulnerability_id |
VCID-67u4-sdzt-w7ep |
| summary |
kernel: i40e: Do not allow untrusted VF to remove administratively set MAC |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26830 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01877 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01873 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01874 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0189 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01876 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0186 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01855 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01838 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01837 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01861 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0342 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03412 |
| published_at |
2026-04-26T12:55:00Z |
|
| 12 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03406 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26830 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-26830
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-67u4-sdzt-w7ep |
|
| 60 |
| url |
VCID-6bzx-juq1-rben |
| vulnerability_id |
VCID-6bzx-juq1-rben |
| summary |
kernel: vdpa: Add queue index attr to vdpa_nl_policy for nlattr length check |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54031 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08081 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08125 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08076 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08137 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08159 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08152 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08163 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08119 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08132 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08115 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08023 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08007 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.1091 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54031 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54031
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6bzx-juq1-rben |
|
| 61 |
| url |
VCID-6cxe-5q6b-mye8 |
| vulnerability_id |
VCID-6cxe-5q6b-mye8 |
| summary |
kernel: sfc: fix crash when reading stats while NIC is resetting |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54156 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14484 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54156 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54156
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6cxe-5q6b-mye8 |
|
| 62 |
| url |
VCID-6rw9-fs2b-f7bd |
| vulnerability_id |
VCID-6rw9-fs2b-f7bd |
| summary |
kernel: Linux kernel: Denial of Service in RDMA/bnxt_re driver due to race condition during QP destruction |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54048 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07346 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0739 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07372 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07427 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07451 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07437 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07456 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07417 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07424 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07413 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07341 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07329 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10017 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54048 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54048
|
| risk_score |
2.6 |
| exploitability |
0.5 |
| weighted_severity |
5.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6rw9-fs2b-f7bd |
|
| 63 |
| url |
VCID-6we8-qvfc-57e3 |
| vulnerability_id |
VCID-6we8-qvfc-57e3 |
| summary |
kernel: tls: use-after-free with partial reads and async decrypt |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26582 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04332 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04192 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04161 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04169 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04296 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04312 |
| published_at |
2026-04-24T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04163 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04183 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.042 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04231 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04246 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0423 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04215 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26582 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-26582
|
| risk_score |
2.6 |
| exploitability |
0.5 |
| weighted_severity |
5.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6we8-qvfc-57e3 |
|
| 64 |
| url |
VCID-7232-r8q8-nkhb |
| vulnerability_id |
VCID-7232-r8q8-nkhb |
| summary |
kernel: GC's deletion of an SKB races with unix_stream_read_generic() leading to UAF |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-6531 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02135 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02122 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02099 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02074 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02088 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02175 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02144 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02127 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02123 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.0214 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02118 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02103 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-6531 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-6531
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7232-r8q8-nkhb |
|
| 65 |
| url |
VCID-73fa-zuvg-p3cu |
| vulnerability_id |
VCID-73fa-zuvg-p3cu |
| summary |
kernel: bpf, cpumap: Make sure kthread is running before map update returns |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53577 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03458 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03471 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03484 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03487 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03509 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03464 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03436 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03411 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03387 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03399 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03516 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03522 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03527 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53577 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53577
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-73fa-zuvg-p3cu |
|
| 66 |
| url |
VCID-7479-xf67-f7bd |
| vulnerability_id |
VCID-7479-xf67-f7bd |
| summary |
kernel: netlink: do not hard code device address lenth in fdb dumps |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53863 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.1533 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.154 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15203 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15291 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15341 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19753 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19648 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19642 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19866 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19821 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19764 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19739 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19741 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53863 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53863
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7479-xf67-f7bd |
|
| 67 |
| url |
VCID-74dk-5bz3-s3hc |
| vulnerability_id |
VCID-74dk-5bz3-s3hc |
| summary |
kernel: wifi: mac80211: don't return unset power in ieee80211_get_tx_power() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52832 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.23044 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.22727 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.23088 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.22877 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.2295 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.23002 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.2302 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.22983 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.22928 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.22943 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.22937 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.229 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.22732 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52832 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-52832
|
| risk_score |
3.6 |
| exploitability |
0.5 |
| weighted_severity |
7.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-74dk-5bz3-s3hc |
|
| 68 |
| url |
VCID-76q3-xw8m-xyds |
| vulnerability_id |
VCID-76q3-xw8m-xyds |
| summary |
kernel: mm: memcg: fix NULL pointer in mem_cgroup_track_foreign_dirty_slowpath() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52939 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.2241 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22099 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22302 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22318 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22312 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.2226 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22111 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22456 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22244 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22327 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22382 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22402 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22361 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52939 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-52939
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-76q3-xw8m-xyds |
|
| 69 |
| url |
VCID-76ww-azwg-sfg1 |
| vulnerability_id |
VCID-76ww-azwg-sfg1 |
| summary |
kernel: drm/ttm: Don't leak a resource on swapout move error |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53844 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07346 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0739 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07372 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07427 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07451 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10007 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10037 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10017 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10071 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.1003 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10009 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09883 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09858 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53844 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53844
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-76ww-azwg-sfg1 |
|
| 70 |
| url |
VCID-7b8b-jzma-4qc2 |
| vulnerability_id |
VCID-7b8b-jzma-4qc2 |
| summary |
kernel: smb: client: fix potential OOBs in smb2_parse_contexts() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52434 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.2638 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26077 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26317 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26271 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26213 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26218 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26194 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26156 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26081 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26421 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26195 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26262 |
| published_at |
2026-04-08T12:55:00Z |
|
| 12 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.2631 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52434 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
| 110 |
|
| 111 |
|
| 112 |
|
| 113 |
|
| 114 |
|
| 115 |
|
| 116 |
|
| 117 |
|
| 118 |
|
| 119 |
|
| 120 |
|
| 121 |
|
| 122 |
|
| 123 |
|
| 124 |
|
| 125 |
|
| 126 |
|
| 127 |
|
| 128 |
|
| 129 |
|
| 130 |
|
| 131 |
|
| 132 |
|
| 133 |
|
| 134 |
|
| 135 |
|
| 136 |
|
| 137 |
|
| 138 |
|
| 139 |
|
| 140 |
|
| 141 |
|
| 142 |
|
| 143 |
|
| 144 |
|
| 145 |
|
| 146 |
|
| 147 |
|
| 148 |
|
| 149 |
|
| 150 |
|
| 151 |
|
| 152 |
|
| 153 |
|
| 154 |
|
| 155 |
|
| 156 |
|
| 157 |
|
| 158 |
|
| 159 |
|
| 160 |
|
| 161 |
|
| 162 |
|
| 163 |
|
| 164 |
|
| 165 |
|
| 166 |
|
| 167 |
|
| 168 |
|
| 169 |
|
| 170 |
|
| 171 |
|
| 172 |
|
| 173 |
|
| 174 |
|
| 175 |
|
| 176 |
|
| 177 |
|
| 178 |
|
| 179 |
|
| 180 |
|
| 181 |
|
| 182 |
|
| 183 |
|
| 184 |
|
| 185 |
|
| 186 |
|
| 187 |
|
| 188 |
|
| 189 |
|
| 190 |
|
| 191 |
|
| 192 |
|
| 193 |
|
| 194 |
|
| 195 |
|
| 196 |
|
| 197 |
|
| 198 |
|
| 199 |
|
| 200 |
|
| 201 |
|
| 202 |
|
| 203 |
|
| 204 |
|
| 205 |
|
| 206 |
|
| 207 |
|
| 208 |
|
| 209 |
|
| 210 |
|
| 211 |
|
| 212 |
|
| 213 |
|
| 214 |
|
| 215 |
|
| 216 |
|
| 217 |
|
| 218 |
|
| 219 |
|
| 220 |
|
| 221 |
|
| 222 |
|
| 223 |
|
| 224 |
|
| 225 |
|
| 226 |
|
| 227 |
|
| 228 |
|
| 229 |
|
| 230 |
|
| 231 |
|
| 232 |
|
| 233 |
|
| 234 |
|
| 235 |
|
| 236 |
|
| 237 |
|
| 238 |
|
| 239 |
|
| 240 |
|
| 241 |
|
| 242 |
|
| 243 |
|
| 244 |
|
| 245 |
|
| 246 |
|
| 247 |
|
| 248 |
|
| 249 |
|
| 250 |
|
| 251 |
|
| 252 |
|
| 253 |
|
| 254 |
|
| 255 |
|
| 256 |
|
| 257 |
|
| 258 |
|
| 259 |
|
| 260 |
|
| 261 |
|
| 262 |
|
| 263 |
|
| 264 |
|
| 265 |
|
| 266 |
|
| 267 |
|
| 268 |
|
| 269 |
|
| 270 |
|
| 271 |
|
| 272 |
|
| 273 |
|
| 274 |
|
| 275 |
|
| 276 |
|
| 277 |
|
| 278 |
|
| 279 |
|
| 280 |
|
| 281 |
|
| 282 |
|
| 283 |
|
| 284 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-52434
|
| risk_score |
2.6 |
| exploitability |
0.5 |
| weighted_severity |
5.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7b8b-jzma-4qc2 |
|
| 71 |
| url |
VCID-7cwd-mns4-pqab |
| vulnerability_id |
VCID-7cwd-mns4-pqab |
| summary |
kernel: ext4: fix WARNING in mb_find_extent |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53317 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02476 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02455 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02488 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02491 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02512 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02489 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02392 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02376 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02381 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.0248 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02467 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53317 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53317
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7cwd-mns4-pqab |
|
| 72 |
| url |
VCID-7d25-jzag-jqg7 |
| vulnerability_id |
VCID-7d25-jzag-jqg7 |
| summary |
kernel: kernel: Denial of Service via memory leak in LRU hash maps |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54033 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07346 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0739 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07372 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07427 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07451 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07437 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07456 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07417 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07424 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07413 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07341 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07329 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10017 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54033 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54033
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7d25-jzag-jqg7 |
|
| 73 |
| url |
VCID-7dma-894v-3qbb |
| vulnerability_id |
VCID-7dma-894v-3qbb |
| summary |
kernel: net/mlx5e: Take RTNL lock when needed before calling xdp_set_features() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53632 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04741 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04764 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04779 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04812 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04825 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0479 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0477 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04723 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04731 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04875 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04912 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04951 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53632 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53632
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7dma-894v-3qbb |
|
| 74 |
| url |
VCID-7gfp-kd1q-w3eq |
| vulnerability_id |
VCID-7gfp-kd1q-w3eq |
| summary |
kernel: net: bridge: data races indata-races in br_handle_frame_finish() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52578 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00935 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00984 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00942 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00926 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00922 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00924 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0092 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00927 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00978 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0098 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00938 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52578 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-52578
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7gfp-kd1q-w3eq |
|
| 75 |
| url |
VCID-7qtt-szq5-huep |
| vulnerability_id |
VCID-7qtt-szq5-huep |
| summary |
kernel: ext4: fix use-after-free in ext4_orphan_cleanup |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50673 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14454 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14487 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14484 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14588 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14549 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14491 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14383 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14384 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50673 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50673
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7qtt-szq5-huep |
|
| 76 |
| url |
VCID-7rr7-7tmp-2fg9 |
| vulnerability_id |
VCID-7rr7-7tmp-2fg9 |
| summary |
kernel: ext4: add EXT4_IGET_BAD flag to prevent unexpected bad inode |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50485 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02951 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02965 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02973 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02975 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0296 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02937 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02927 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02902 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02912 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03029 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03027 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03016 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50485 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50485
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7rr7-7tmp-2fg9 |
|
| 77 |
| url |
VCID-87rc-z4be-5ffz |
| vulnerability_id |
VCID-87rc-z4be-5ffz |
| summary |
kernel: net: mdio: unexport __init-annotated mdio_bus_init() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49350 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10422 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.1049 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16498 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16483 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16444 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16383 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16323 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16344 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16379 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16273 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16268 |
| published_at |
2026-04-26T12:55:00Z |
|
| 11 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16352 |
| published_at |
2026-04-07T12:55:00Z |
|
| 12 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16439 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49350 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49350
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-87rc-z4be-5ffz |
|
| 78 |
| url |
VCID-89hc-cav3-6yf5 |
| vulnerability_id |
VCID-89hc-cav3-6yf5 |
| summary |
kernel: HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52478 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00356 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00357 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00358 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00346 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00343 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00344 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00342 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00341 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00338 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00332 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00336 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52478 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-52478
|
| risk_score |
2.7 |
| exploitability |
0.5 |
| weighted_severity |
5.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-89hc-cav3-6yf5 |
|
| 79 |
| url |
VCID-8cbr-x8vs-z7au |
| vulnerability_id |
VCID-8cbr-x8vs-z7au |
| summary |
kernel: SMB3: Add missing locks to protect deferred close file list |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53990 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07494 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07533 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07514 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07573 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07593 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.0759 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07608 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07569 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07576 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07564 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07488 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07476 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10199 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53990 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53990
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8cbr-x8vs-z7au |
|
| 80 |
| url |
VCID-8en8-usp9-gfgp |
| vulnerability_id |
VCID-8en8-usp9-gfgp |
| summary |
kernel: cpufreq: amd-pstate: fix global sysfs attribute type |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53550 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04741 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04764 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04779 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04812 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04825 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0479 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0477 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04723 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04731 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04875 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04912 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04951 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53550 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53550
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8en8-usp9-gfgp |
|
| 81 |
| url |
VCID-8h5v-srys-4fdr |
| vulnerability_id |
VCID-8h5v-srys-4fdr |
| summary |
kernel: ftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49977 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04953 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04988 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.0501 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05042 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05058 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05038 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.0502 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05002 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15677 |
| published_at |
2026-04-26T12:55:00Z |
|
| 9 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15574 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15584 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15634 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.1568 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49977 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49977
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8h5v-srys-4fdr |
|
| 82 |
| url |
VCID-8tnf-q5r9-67au |
| vulnerability_id |
VCID-8tnf-q5r9-67au |
| summary |
kernel: icmp6: Fix null-ptr-deref of ip6_null_entry->rt6i_idev in icmp6_dev() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53343 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02951 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02937 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0296 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02975 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02965 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02973 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04185 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0403 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04019 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04031 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04154 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04166 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53343 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53343
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8tnf-q5r9-67au |
|
| 83 |
| url |
VCID-8wmg-2x7c-xqbv |
| vulnerability_id |
VCID-8wmg-2x7c-xqbv |
| summary |
kernel: drm/nouveau/disp: fix use-after-free in error handling of nouveau_connector_create |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53263 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02778 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.028 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02792 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02802 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02823 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02793 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.0373 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03681 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03692 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03704 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03812 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.0382 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03823 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53263 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53263
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8wmg-2x7c-xqbv |
|
| 84 |
| url |
VCID-92em-1n2c-nyft |
| vulnerability_id |
VCID-92em-1n2c-nyft |
| summary |
kernel: drm/sched: Check scheduler work queue before calling timeout handling |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53351 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04741 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04812 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04764 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04779 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04825 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0479 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05236 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05388 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05427 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05469 |
| published_at |
2026-04-26T12:55:00Z |
|
| 10 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05288 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05235 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53351 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53351
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-92em-1n2c-nyft |
|
| 85 |
| url |
VCID-93ce-35w8-h7ef |
| vulnerability_id |
VCID-93ce-35w8-h7ef |
| summary |
kernel: nbd: fix incomplete validation of ioctl arg |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53513 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02143 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02149 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02144 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02162 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02139 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02124 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.0212 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02096 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02108 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02196 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02166 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02157 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53513 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53513
|
| risk_score |
3.3 |
| exploitability |
0.5 |
| weighted_severity |
6.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-93ce-35w8-h7ef |
|
| 86 |
| url |
VCID-95xe-xtqt-r3b8 |
| vulnerability_id |
VCID-95xe-xtqt-r3b8 |
| summary |
kernel: mlxsw: spectrum_acl_tcam: Fix stack corruption |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26586 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01251 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01175 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01168 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01171 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.0116 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01172 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01241 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01245 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01164 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.0117 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01183 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01189 |
| published_at |
2026-04-08T12:55:00Z |
|
| 12 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.0119 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26586 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-26586
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-95xe-xtqt-r3b8 |
|
| 87 |
| url |
VCID-9ucy-kbah-yyae |
| vulnerability_id |
VCID-9ucy-kbah-yyae |
| summary |
kernel: scsi: qedf: Fix NULL dereference in error handling |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54289 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10793 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54289 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54289
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9ucy-kbah-yyae |
|
| 88 |
| url |
VCID-9wmm-kn83-5kcy |
| vulnerability_id |
VCID-9wmm-kn83-5kcy |
| summary |
kernel: blk-cgroup: Reinit blkg_iostat_set after clearing in blkcg_reset_stats() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53421 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06121 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06194 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06203 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06208 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06216 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06178 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06152 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06135 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0737 |
| published_at |
2026-04-26T12:55:00Z |
|
| 9 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07285 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07363 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08352 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08189 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53421 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53421
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9wmm-kn83-5kcy |
|
| 89 |
| url |
VCID-a3c1-b1ef-5beb |
| vulnerability_id |
VCID-a3c1-b1ef-5beb |
| summary |
kernel: ovl: fix tmpfile leak |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53004 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.2241 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22456 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22244 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22327 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22382 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22402 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22361 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22302 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22318 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22312 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.2226 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22111 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22099 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53004 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53004
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-a3c1-b1ef-5beb |
|
| 90 |
| url |
VCID-a3f2-zg7s-9ucw |
| vulnerability_id |
VCID-a3f2-zg7s-9ucw |
| summary |
kernel: tls: race between tx work scheduling and socket close |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26585 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09837 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09766 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09891 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09896 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.0986 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09844 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09727 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09698 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09848 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09817 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09867 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10201 |
| published_at |
2026-04-26T12:55:00Z |
|
| 12 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10213 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26585 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-26585
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-a3f2-zg7s-9ucw |
|
| 91 |
| url |
VCID-a67m-rg36-aqgw |
| vulnerability_id |
VCID-a67m-rg36-aqgw |
| summary |
kernel: scsi: target: Fix multiple LUN_RESET handling |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53586 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03055 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03068 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03073 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03098 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0306 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03036 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03025 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03002 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03011 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03131 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03137 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03126 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53586 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53586
|
| risk_score |
2.3 |
| exploitability |
0.5 |
| weighted_severity |
4.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-a67m-rg36-aqgw |
|
| 92 |
| url |
VCID-aawx-4bwq-5ubw |
| vulnerability_id |
VCID-aawx-4bwq-5ubw |
| summary |
kernel: Linux kernel Bluetooth: Denial of Service due to use-after-free in connection handling |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53762 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0684 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06822 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06874 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06793 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09152 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09144 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09299 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09349 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09297 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09303 |
| published_at |
2026-04-26T12:55:00Z |
|
| 10 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09273 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09259 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53762 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53762
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-aawx-4bwq-5ubw |
|
| 93 |
| url |
VCID-acs7-w3pn-eybs |
| vulnerability_id |
VCID-acs7-w3pn-eybs |
| summary |
kernel: Bluetooth: L2CAP: Fix u8 overflow |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-48947 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00445 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00459 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00444 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00436 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00433 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00435 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00431 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0043 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00427 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00432 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00461 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-48947 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-48947
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-acs7-w3pn-eybs |
|
| 94 |
| url |
VCID-ae8w-75md-m7eh |
| vulnerability_id |
VCID-ae8w-75md-m7eh |
| summary |
kernel: net/sched: taprio: Limit TCA_TAPRIO_ATTR_SCHED_CYCLE_TIME to INT_MAX |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54251 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07346 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0739 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07372 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07427 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07451 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07437 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07424 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07413 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07341 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07329 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07456 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07417 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07408 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54251 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54251
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ae8w-75md-m7eh |
|
| 95 |
| url |
VCID-afjw-vxu1-3ydg |
| vulnerability_id |
VCID-afjw-vxu1-3ydg |
| summary |
kernel: arm64: sme: Use STR P to clear FFR context field in streaming SVE mode |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53713 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07817 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07863 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07818 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07901 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07888 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07875 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07862 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07778 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07754 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07907 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07868 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07836 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53713 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53713
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-afjw-vxu1-3ydg |
|
| 96 |
| url |
VCID-ajp8-kr6j-nyhv |
| vulnerability_id |
VCID-ajp8-kr6j-nyhv |
| summary |
kernel: integer overflow in l2cap_config_req() in net/bluetooth/l2cap_core.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-45934 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00409 |
| scoring_system |
epss |
| scoring_elements |
0.61193 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00409 |
| scoring_system |
epss |
| scoring_elements |
0.61268 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00409 |
| scoring_system |
epss |
| scoring_elements |
0.61221 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00409 |
| scoring_system |
epss |
| scoring_elements |
0.61188 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00409 |
| scoring_system |
epss |
| scoring_elements |
0.61235 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00409 |
| scoring_system |
epss |
| scoring_elements |
0.6125 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00409 |
| scoring_system |
epss |
| scoring_elements |
0.6127 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00409 |
| scoring_system |
epss |
| scoring_elements |
0.61256 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00409 |
| scoring_system |
epss |
| scoring_elements |
0.61238 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00409 |
| scoring_system |
epss |
| scoring_elements |
0.61277 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00409 |
| scoring_system |
epss |
| scoring_elements |
0.61282 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00409 |
| scoring_system |
epss |
| scoring_elements |
0.61263 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00409 |
| scoring_system |
epss |
| scoring_elements |
0.61252 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-45934 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-45934
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
7.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ajp8-kr6j-nyhv |
|
| 97 |
| url |
VCID-asgh-162t-dfh8 |
| vulnerability_id |
VCID-asgh-162t-dfh8 |
| summary |
kernel: i2c: i801: Fix block process call transactions |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26593 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02493 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.0248 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02492 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02496 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02516 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02481 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02479 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02463 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06412 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06563 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06579 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06596 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26593 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
| 110 |
|
| 111 |
|
| 112 |
|
| 113 |
|
| 114 |
|
| 115 |
|
| 116 |
|
| 117 |
|
| 118 |
|
| 119 |
|
| 120 |
|
| 121 |
|
| 122 |
|
| 123 |
|
| 124 |
|
| 125 |
|
| 126 |
|
| 127 |
|
| 128 |
|
| 129 |
|
| 130 |
|
| 131 |
|
| 132 |
|
| 133 |
|
| 134 |
|
| 135 |
|
| 136 |
|
| 137 |
|
| 138 |
|
| 139 |
|
| 140 |
|
| 141 |
|
| 142 |
|
| 143 |
|
| 144 |
|
| 145 |
|
| 146 |
|
| 147 |
|
| 148 |
|
| 149 |
|
| 150 |
|
| 151 |
|
| 152 |
|
| 153 |
|
| 154 |
|
| 155 |
|
| 156 |
|
| 157 |
|
| 158 |
|
| 159 |
|
| 160 |
|
| 161 |
|
| 162 |
|
| 163 |
|
| 164 |
|
| 165 |
|
| 166 |
|
| 167 |
|
| 168 |
|
| 169 |
|
| 170 |
|
| 171 |
|
| 172 |
|
| 173 |
|
| 174 |
|
| 175 |
|
| 176 |
|
| 177 |
|
| 178 |
|
| 179 |
|
| 180 |
|
| 181 |
|
| 182 |
|
| 183 |
|
| 184 |
|
| 185 |
|
| 186 |
|
| 187 |
|
| 188 |
|
| 189 |
|
| 190 |
|
| 191 |
|
| 192 |
|
| 193 |
|
| 194 |
|
| 195 |
|
| 196 |
|
| 197 |
|
| 198 |
|
| 199 |
|
| 200 |
|
| 201 |
|
| 202 |
|
| 203 |
|
| 204 |
|
| 205 |
|
| 206 |
|
| 207 |
|
| 208 |
|
| 209 |
|
| 210 |
|
| 211 |
|
| 212 |
|
| 213 |
|
| 214 |
|
| 215 |
|
| 216 |
|
| 217 |
|
| 218 |
|
| 219 |
|
| 220 |
|
| 221 |
|
| 222 |
|
| 223 |
|
| 224 |
|
| 225 |
|
| 226 |
|
| 227 |
|
| 228 |
|
| 229 |
|
| 230 |
|
| 231 |
|
| 232 |
|
| 233 |
|
| 234 |
|
| 235 |
|
| 236 |
|
| 237 |
|
| 238 |
|
| 239 |
|
| 240 |
|
| 241 |
|
| 242 |
|
| 243 |
|
| 244 |
|
| 245 |
|
| 246 |
|
| 247 |
|
| 248 |
|
| 249 |
|
| 250 |
|
| 251 |
|
| 252 |
|
| 253 |
|
| 254 |
|
| 255 |
|
| 256 |
|
| 257 |
|
| 258 |
|
| 259 |
|
| 260 |
|
| 261 |
|
| 262 |
|
| 263 |
|
| 264 |
|
| 265 |
|
| 266 |
|
| 267 |
|
| 268 |
|
| 269 |
|
| 270 |
|
| 271 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-26593
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-asgh-162t-dfh8 |
|
| 98 |
| url |
VCID-awhh-d1hb-y7ak |
| vulnerability_id |
VCID-awhh-d1hb-y7ak |
| summary |
kernel: ice: Block switchdev mode when ADQ is active and vice versa |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53442 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01826 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01838 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0184 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01843 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01857 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01844 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01829 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01824 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02252 |
| published_at |
2026-04-26T12:55:00Z |
|
| 9 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02186 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02197 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02281 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02261 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53442 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53442
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-awhh-d1hb-y7ak |
|
| 99 |
| url |
VCID-b4ct-fnbp-43a3 |
| vulnerability_id |
VCID-b4ct-fnbp-43a3 |
| summary |
kernel: cxgb4: use-after-free in ch_flower_stats_cb() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-4133 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.0139 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01294 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01288 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01376 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01385 |
| published_at |
2026-04-24T12:55:00Z |
|
| 5 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01298 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.0131 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01315 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01318 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01302 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01296 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01299 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-4133 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-4133
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-b4ct-fnbp-43a3 |
|
| 100 |
| url |
VCID-b4j7-s2wg-qfcb |
| vulnerability_id |
VCID-b4j7-s2wg-qfcb |
| summary |
kernel: scsi: qla2xxx: Fix deletion race condition |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53615 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0147 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01473 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01479 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01484 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01486 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01478 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01471 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01472 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01462 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01476 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01565 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01573 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0157 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53615 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53615
|
| risk_score |
2.7 |
| exploitability |
0.5 |
| weighted_severity |
5.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-b4j7-s2wg-qfcb |
|
| 101 |
| url |
VCID-b4ws-zzyy-yfdd |
| vulnerability_id |
VCID-b4ws-zzyy-yfdd |
| summary |
kernel: arm64: ftrace: consistently handle PLTs. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49721 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13382 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13447 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24694 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24708 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24667 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.2461 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24623 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24613 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24591 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24534 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24521 |
| published_at |
2026-04-26T12:55:00Z |
|
| 11 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24577 |
| published_at |
2026-04-07T12:55:00Z |
|
| 12 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24646 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49721 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49721
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-b4ws-zzyy-yfdd |
|
| 102 |
| url |
VCID-b5ve-8bn6-vbav |
| vulnerability_id |
VCID-b5ve-8bn6-vbav |
| summary |
kernel: untrusted VMM can trigger int80 syscall handling |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-25744 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14814 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14872 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14813 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.1471 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14717 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14777 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14924 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.15001 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14805 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14895 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14946 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.1491 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-25744 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-25744
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
7.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-b5ve-8bn6-vbav |
|
| 103 |
| url |
VCID-b7n5-8tg9-dygf |
| vulnerability_id |
VCID-b7n5-8tg9-dygf |
| summary |
kernel: ASoC: codecs: wcd-mbhc-v2: fix resource leaks on component remove |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53842 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07346 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0739 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07372 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07427 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07451 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10007 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10037 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10017 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10071 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.1003 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10009 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09883 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09858 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53842 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53842
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-b7n5-8tg9-dygf |
|
| 104 |
| url |
VCID-bdew-rk4n-wkcf |
| vulnerability_id |
VCID-bdew-rk4n-wkcf |
| summary |
kernel: null pointer dereference vulnerability in nft_dynset_init() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-6622 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01401 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01405 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01411 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01416 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01417 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.0141 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01402 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01404 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01395 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01408 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01496 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01503 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-6622 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-6622
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bdew-rk4n-wkcf |
|
| 105 |
| url |
VCID-bgyu-226f-zyca |
| vulnerability_id |
VCID-bgyu-226f-zyca |
| summary |
kernel: Linux kernel: Denial of Service via memory leak in mlx5e_init_rep_rx |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54106 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06793 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0684 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06822 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06874 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06907 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.069 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06956 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06938 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06893 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06888 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0683 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06811 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09303 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54106 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54106
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bgyu-226f-zyca |
|
| 106 |
| url |
VCID-bh8m-pcw7-c3h5 |
| vulnerability_id |
VCID-bh8m-pcw7-c3h5 |
| summary |
kernel: Linux kernel: RDMA/core GID entry leak causes Denial of Service |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54003 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14484 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54003 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54003
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bh8m-pcw7-c3h5 |
|
| 107 |
| url |
VCID-bkxu-zjjm-w3gc |
| vulnerability_id |
VCID-bkxu-zjjm-w3gc |
| summary |
kernel: usb: typec: altmodes/displayport: fix pin_assignment_show |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54186 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10793 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54186 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54186
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bkxu-zjjm-w3gc |
|
| 108 |
| url |
VCID-bmp4-mwxe-wub7 |
| vulnerability_id |
VCID-bmp4-mwxe-wub7 |
| summary |
kernel: cifs: fix DFS traversal oops without CONFIG_CIFS_DFS_UPCALL |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53246 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04319 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0424 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04261 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04272 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04303 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06245 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06239 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06229 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06187 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06199 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.0846 |
| published_at |
2026-04-26T12:55:00Z |
|
| 11 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08502 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08496 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53246 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53246
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bmp4-mwxe-wub7 |
|
| 109 |
| url |
VCID-bp25-h13e-3kbw |
| vulnerability_id |
VCID-bp25-h13e-3kbw |
| summary |
kernel: ext4: fix bug_on in __es_tree_search caused by bad quota inode |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50782 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14484 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50782 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50782
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bp25-h13e-3kbw |
|
| 110 |
| url |
VCID-bquq-cmn8-5kbr |
| vulnerability_id |
VCID-bquq-cmn8-5kbr |
| summary |
kernel: idpf: fix null-ptr-deref in idpf_features_check |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-38053 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04693 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04734 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04751 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04784 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04796 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04788 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04768 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15161 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15058 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15068 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15119 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15157 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-38053 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-38053
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bquq-cmn8-5kbr |
|
| 111 |
| url |
VCID-brz8-6j8x-aqep |
| vulnerability_id |
VCID-brz8-6j8x-aqep |
| summary |
kernel: tty: n_gsm: add sanity check for gsm->receive in gsm_receive_buf() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49940 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06468 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.0652 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.0651 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.0656 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06602 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06596 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06588 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06579 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.19964 |
| published_at |
2026-04-26T12:55:00Z |
|
| 9 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20082 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20086 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20084 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.19968 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49940 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49940
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-brz8-6j8x-aqep |
|
| 112 |
| url |
VCID-bss4-njk5-8uhv |
| vulnerability_id |
VCID-bss4-njk5-8uhv |
| summary |
kernel: net/mlx5: DR, fix memory leak in mlx5dr_cmd_create_reformat_ctx |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53546 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02951 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02965 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02973 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02975 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0296 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02937 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02927 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02902 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02912 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03029 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03027 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03016 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53546 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53546
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bss4-njk5-8uhv |
|
| 113 |
| url |
VCID-btxx-agn2-mye2 |
| vulnerability_id |
VCID-btxx-agn2-mye2 |
| summary |
kernel: net/core: kernel crash in ETH_P_1588 flow dissector |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52580 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0078 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00814 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00768 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00762 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00763 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00812 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00813 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00781 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00775 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52580 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-52580
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-btxx-agn2-mye2 |
|
| 114 |
| url |
VCID-buyh-2d37-rqb1 |
| vulnerability_id |
VCID-buyh-2d37-rqb1 |
| summary |
kernel: bpf: bpf_sk_storage: Fix invalid wait context lockdep report |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53857 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07747 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07792 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07749 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07809 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07826 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10496 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10481 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10479 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10572 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10539 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10517 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10384 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10368 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53857 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53857
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-buyh-2d37-rqb1 |
|
| 115 |
| url |
VCID-bzf3-bpyy-2bh3 |
| vulnerability_id |
VCID-bzf3-bpyy-2bh3 |
| summary |
kernel: drm/amdgpu: fix memory leak in mes self test |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53370 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01826 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0184 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01838 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01843 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01857 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01844 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01829 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01824 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02197 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02261 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02252 |
| published_at |
2026-04-26T12:55:00Z |
|
| 11 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02186 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02281 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53370 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53370
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bzf3-bpyy-2bh3 |
|
| 116 |
| url |
VCID-c2mu-8323-1ydz |
| vulnerability_id |
VCID-c2mu-8323-1ydz |
| summary |
kernel: md/raid5-cache: fix null-ptr-deref for r5l_flush_stripe_to_raid() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53210 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03188 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03198 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03201 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03205 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03231 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04227 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04397 |
| published_at |
2026-04-26T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04292 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04278 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04256 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04236 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04362 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04377 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53210 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53210
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-c2mu-8323-1ydz |
|
| 117 |
| url |
VCID-c4d2-twee-nuft |
| vulnerability_id |
VCID-c4d2-twee-nuft |
| summary |
kernel: bnxt: avoid overflow in bnxt_get_nvram_directory() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53661 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03188 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03198 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03201 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03205 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03231 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03185 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03158 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03142 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03116 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03123 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03242 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03243 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03238 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53661 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53661
|
| risk_score |
2.7 |
| exploitability |
0.5 |
| weighted_severity |
5.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-c4d2-twee-nuft |
|
| 118 |
| url |
VCID-c73y-chjd-g7a4 |
| vulnerability_id |
VCID-c73y-chjd-g7a4 |
| summary |
kernel: drm/tests: helpers: Avoid a driver uaf |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53235 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04774 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04846 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04797 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04812 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04857 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05544 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05716 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05749 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05558 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05786 |
| published_at |
2026-04-26T12:55:00Z |
|
| 10 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.0561 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05601 |
| published_at |
2026-04-12T12:55:00Z |
|
| 12 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05594 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53235 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53235
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-c73y-chjd-g7a4 |
|
| 119 |
| url |
VCID-c7ed-rzgn-aue3 |
| vulnerability_id |
VCID-c7ed-rzgn-aue3 |
| summary |
kernel: blk-iocost: use spin_lock_irqsave in adjust_inuse_and_calc_cost |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53730 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12252 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12297 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12095 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12177 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12228 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12236 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12199 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12163 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12033 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12035 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.1215 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12126 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12092 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53730 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53730
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-c7ed-rzgn-aue3 |
|
| 120 |
| url |
VCID-cavt-1v84-uqgt |
| vulnerability_id |
VCID-cavt-1v84-uqgt |
| summary |
kernel: GSM multiplexing race condition leads to privilege escalation |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-6546 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55796 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55818 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55798 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55849 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55852 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55861 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55841 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55822 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55859 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55862 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00337 |
| scoring_system |
epss |
| scoring_elements |
0.56543 |
| published_at |
2026-04-26T12:55:00Z |
|
| 11 |
| value |
0.00337 |
| scoring_system |
epss |
| scoring_elements |
0.56589 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00337 |
| scoring_system |
epss |
| scoring_elements |
0.56524 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-6546 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-6546
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cavt-1v84-uqgt |
|
| 121 |
| url |
VCID-cdk9-g2mt-tue1 |
| vulnerability_id |
VCID-cdk9-g2mt-tue1 |
| summary |
kernel: scsi: qla2xxx: Array index may go out of bound |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54179 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10793 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54179 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54179
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cdk9-g2mt-tue1 |
|
| 122 |
| url |
VCID-ckwt-aphw-dyd8 |
| vulnerability_id |
VCID-ckwt-aphw-dyd8 |
| summary |
kernel: ext4: set goal start correctly in ext4_mb_normalize_request |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54021 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14484 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54021 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54021
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ckwt-aphw-dyd8 |
|
| 123 |
| url |
VCID-cryk-ra8u-7ug1 |
| vulnerability_id |
VCID-cryk-ra8u-7ug1 |
| summary |
kernel: efi: fix potential NULL deref in efi_mem_reserve_persistent |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52976 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06832 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0699 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06881 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06865 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0692 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06951 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06949 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06942 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06938 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06873 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06856 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06999 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06987 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52976 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-52976
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cryk-ra8u-7ug1 |
|
| 124 |
| url |
VCID-d2f8-dt9k-37bv |
| vulnerability_id |
VCID-d2f8-dt9k-37bv |
| summary |
kernel: Linux kernel (soundwire): Memory corruption due to incorrect device enumeration completion |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54096 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07494 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07533 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07514 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07573 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07593 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.0759 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07608 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07569 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07576 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07564 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07488 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07476 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10199 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54096 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54096
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-d2f8-dt9k-37bv |
|
| 125 |
| url |
VCID-d7du-rdej-nbh8 |
| vulnerability_id |
VCID-d7du-rdej-nbh8 |
| summary |
kernel: bpf: Fix memleak due to fentry attach failure |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53221 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05261 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05294 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05319 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05353 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05376 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06105 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06078 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06068 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06268 |
| published_at |
2026-04-26T12:55:00Z |
|
| 9 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06118 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06113 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06225 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06239 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53221 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53221
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-d7du-rdej-nbh8 |
|
| 126 |
| url |
VCID-d99a-jth3-hba2 |
| vulnerability_id |
VCID-d99a-jth3-hba2 |
| summary |
kernel: Linux kernel Bluetooth: Denial of Service via race condition in hidp_session_thread |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54120 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14484 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54120 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54120
|
| risk_score |
2.6 |
| exploitability |
0.5 |
| weighted_severity |
5.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-d99a-jth3-hba2 |
|
| 127 |
| url |
VCID-dcwa-n32k-73cm |
| vulnerability_id |
VCID-dcwa-n32k-73cm |
| summary |
kernel: Bluetooth: hci_event: call disconnect callback before deleting conn |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53673 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00517 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0051 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00507 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00505 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00503 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00504 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00501 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.005 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00535 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00531 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00533 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53673 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53673
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
7.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dcwa-n32k-73cm |
|
| 128 |
| url |
VCID-desr-8n89-9qev |
| vulnerability_id |
VCID-desr-8n89-9qev |
| summary |
kernel: net: mdio: validate parameter addr in mdiobus_get_phy() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53019 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.20097 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.20154 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19884 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19963 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.20017 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.20036 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19991 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19934 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19917 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19921 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19918 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19811 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19806 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53019 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53019
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-desr-8n89-9qev |
|
| 129 |
| url |
VCID-dhnq-vhr2-sbhh |
| vulnerability_id |
VCID-dhnq-vhr2-sbhh |
| summary |
kernel: ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53275 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02476 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02455 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02488 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02491 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02512 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02489 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02392 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02376 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02381 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.0248 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02467 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53275 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53275
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dhnq-vhr2-sbhh |
|
| 130 |
| url |
VCID-djh8-dv3c-63d7 |
| vulnerability_id |
VCID-djh8-dv3c-63d7 |
| summary |
kernel: platform/chrome: cros_ec_typec: zero out stale pointers |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50642 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07346 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0739 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07372 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07427 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07451 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10007 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10037 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10017 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10071 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.1003 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10009 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09883 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09858 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50642 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50642
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-djh8-dv3c-63d7 |
|
| 131 |
| url |
VCID-djyp-77yw-cfh2 |
| vulnerability_id |
VCID-djyp-77yw-cfh2 |
| summary |
kernel: scsi: qla2xxx: Wait for io return on terminate rport |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53322 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02603 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02557 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02617 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02621 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02625 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02645 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02622 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02485 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02483 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02467 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02473 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.0258 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02568 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53322 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53322
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-djyp-77yw-cfh2 |
|
| 132 |
| url |
VCID-dmr7-td91-f3dt |
| vulnerability_id |
VCID-dmr7-td91-f3dt |
| summary |
kernel: scsi: qedi: Fix use after free bug in qedi_remove() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54100 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14484 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54100 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54100
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dmr7-td91-f3dt |
|
| 133 |
|
| 134 |
| url |
VCID-dr9r-y9kb-fqbx |
| vulnerability_id |
VCID-dr9r-y9kb-fqbx |
| summary |
kernel: NFS: Fix a potential data corruption |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53711 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08409 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08461 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08382 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08453 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08471 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08465 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08445 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.0843 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08323 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08306 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08433 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08397 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53711 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53711
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dr9r-y9kb-fqbx |
|
| 135 |
| url |
VCID-dueh-j4qj-2qby |
| vulnerability_id |
VCID-dueh-j4qj-2qby |
| summary |
kernel: clk: imx93: fix memory leak and missing unwind goto in imx93_clocks_probe |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54221 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07346 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0739 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07372 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07427 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07451 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07437 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07424 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07413 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07341 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07329 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07456 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07417 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07408 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54221 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54221
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dueh-j4qj-2qby |
|
| 136 |
| url |
VCID-dws2-fd38-kfe7 |
| vulnerability_id |
VCID-dws2-fd38-kfe7 |
| summary |
kernel: md: raid1: fix potential OOB in raid1_remove_disk() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53722 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12252 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12297 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12095 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12177 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12228 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12236 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12199 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12163 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12033 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12035 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.1215 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12126 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12092 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53722 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53722
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dws2-fd38-kfe7 |
|
| 137 |
| url |
VCID-dxta-w9za-abb6 |
| vulnerability_id |
VCID-dxta-w9za-abb6 |
| summary |
kernel: tty: serial: fsl_lpuart: fix race on RX DMA shutdown |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53094 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15108 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15176 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.1498 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15068 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.1512 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15087 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15049 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.14988 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.14886 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.14893 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.14948 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.14986 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.14989 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53094 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53094
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dxta-w9za-abb6 |
|
| 138 |
| url |
VCID-dy3b-zf22-dua6 |
| vulnerability_id |
VCID-dy3b-zf22-dua6 |
| summary |
kernel: Kernel: Denial of Service due to memory leak in PCI/DOE |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53993 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06793 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0684 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06822 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06874 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06907 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.069 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06956 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06938 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06893 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06888 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0683 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06811 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09303 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53993 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53993
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dy3b-zf22-dua6 |
|
| 139 |
| url |
VCID-dzcg-vtsb-1kh6 |
| vulnerability_id |
VCID-dzcg-vtsb-1kh6 |
| summary |
kernel: dma-buf/dma-resv: Stop leaking on krealloc() failure |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53181 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01826 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01838 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0184 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01843 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01857 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02281 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02261 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02252 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02215 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02204 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02203 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02186 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02197 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53181 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53181
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dzcg-vtsb-1kh6 |
|
| 140 |
| url |
VCID-e6ad-c4m8-ukc8 |
| vulnerability_id |
VCID-e6ad-c4m8-ukc8 |
| summary |
kernel: tracing: Fix sleeping function called from invalid context on RT kernel |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49322 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05887 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05919 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.1147 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11476 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11443 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11414 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11277 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11278 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11404 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11348 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11304 |
| published_at |
2026-04-26T12:55:00Z |
|
| 11 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11329 |
| published_at |
2026-04-07T12:55:00Z |
|
| 12 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11411 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49322 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49322
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-e6ad-c4m8-ukc8 |
|
| 141 |
| url |
VCID-e8sx-z6ar-fbhd |
| vulnerability_id |
VCID-e8sx-z6ar-fbhd |
| summary |
kernel: bpf: Disable preemption in bpf_event_output |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54173 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07494 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07533 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07514 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07573 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07593 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.0759 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07576 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07564 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07488 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07476 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07608 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07569 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07549 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54173 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54173
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-e8sx-z6ar-fbhd |
|
| 142 |
| url |
VCID-ec5z-jgdb-wyh5 |
| vulnerability_id |
VCID-ec5z-jgdb-wyh5 |
| summary |
kernel: Kernel: Denial of Service via resource leak in drm/ttm |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54254 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07346 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0739 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07372 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07427 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07451 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07437 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07424 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07413 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07341 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07329 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07456 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07417 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07408 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54254 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54254
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ec5z-jgdb-wyh5 |
|
| 143 |
| url |
VCID-eevk-57mt-7qc1 |
| vulnerability_id |
VCID-eevk-57mt-7qc1 |
| summary |
kernel: arm64: dts: imx8mm-verdin: Do not power down eth-phy |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52985 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08345 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08398 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08319 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08383 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.084 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08391 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08373 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08356 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.0825 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08233 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08395 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08367 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08332 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52985 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-52985
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-eevk-57mt-7qc1 |
|
| 144 |
| url |
VCID-emge-avzn-mkgz |
| vulnerability_id |
VCID-emge-avzn-mkgz |
| summary |
kernel: Null Pointer Dereference vulnerability in ida_free in lib/idr.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-6915 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01459 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01359 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01368 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01362 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01355 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01447 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01455 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01364 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01374 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01379 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-6915 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-6915
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-emge-avzn-mkgz |
|
| 145 |
| url |
VCID-enhw-t1e8-mqgs |
| vulnerability_id |
VCID-enhw-t1e8-mqgs |
| summary |
kernel: drm/amdgpu/gfx: disable gfx9 cp_ecc_error_irq only when enabling legacy gfx ras |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53471 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03107 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0312 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03125 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0315 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03109 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03083 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0307 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03045 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03054 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03172 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03175 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03168 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53471 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53471
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-enhw-t1e8-mqgs |
|
| 146 |
| url |
VCID-er3h-4pqj-dqah |
| vulnerability_id |
VCID-er3h-4pqj-dqah |
| summary |
kernel: xfrm: out-of-bounds read in __xfrm_state_filter_match() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39194 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00827 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00828 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00833 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0083 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00819 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00813 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00815 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00814 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.01018 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.01019 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.01023 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39194 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-39194
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-er3h-4pqj-dqah |
|
| 147 |
| url |
VCID-etbt-qgzf-8yff |
| vulnerability_id |
VCID-etbt-qgzf-8yff |
| summary |
kernel: HID: hyperv: avoid struct memcpy overrun warning |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53553 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04741 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04764 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04779 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04812 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04825 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0479 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0477 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04723 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04731 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04875 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04912 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04951 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53553 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53553
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-etbt-qgzf-8yff |
|
| 148 |
| url |
VCID-ewv6-exh4-qyan |
| vulnerability_id |
VCID-ewv6-exh4-qyan |
| summary |
kernel: usb-storage: alauda: Fix uninit-value in alauda_check_media() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53847 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14454 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14487 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14484 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14588 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14549 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14491 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14383 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14384 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53847 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53847
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ewv6-exh4-qyan |
|
| 149 |
| url |
VCID-exju-d57q-5bbz |
| vulnerability_id |
VCID-exju-d57q-5bbz |
| summary |
kernel: Linux kernel: Memory leak in ath12k Wi-Fi driver can lead to denial of service |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54016 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07747 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07792 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07749 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07809 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07826 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07821 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07684 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07837 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07808 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07794 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07708 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10479 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54016 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54016
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-exju-d57q-5bbz |
|
| 150 |
| url |
VCID-eyjm-c1cp-euhs |
| vulnerability_id |
VCID-eyjm-c1cp-euhs |
| summary |
kernel: Bluetooth: Fix a buffer overflow in mgmt_mesh_add() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49754 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23257 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.22928 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23141 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23158 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.2315 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23112 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.22935 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23301 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.2309 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23164 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23215 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23237 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23199 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49754 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49754
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-eyjm-c1cp-euhs |
|
| 151 |
| url |
VCID-f8jk-dpun-tfgc |
| vulnerability_id |
VCID-f8jk-dpun-tfgc |
| summary |
kernel: perf trace: Really free the evsel->priv area |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53649 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03188 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03198 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03201 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03205 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03231 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03185 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03158 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03142 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03116 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03123 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03242 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03243 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03238 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53649 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53649
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-f8jk-dpun-tfgc |
|
| 152 |
| url |
VCID-ffyb-7dwm-cfbd |
| vulnerability_id |
VCID-ffyb-7dwm-cfbd |
| summary |
kernel: refscale: Fix uninitalized use of wait_queue_head_t |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54316 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10793 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54316 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54316
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ffyb-7dwm-cfbd |
|
| 153 |
| url |
VCID-fm9q-u17m-dqbu |
| vulnerability_id |
VCID-fm9q-u17m-dqbu |
| summary |
kernel: ice: Don't tx before switchdev is fully configured |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53657 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01826 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01838 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0184 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01843 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01857 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01844 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01829 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01824 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01807 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01806 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01887 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0188 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01876 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53657 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53657
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fm9q-u17m-dqbu |
|
| 154 |
| url |
VCID-fvpt-g7a9-puab |
| vulnerability_id |
VCID-fvpt-g7a9-puab |
| summary |
kernel: virtio-vdpa: Fix cpumask memory leak in virtio_vdpa_find_vqs() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54215 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07747 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07792 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07749 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07809 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07826 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07821 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07808 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07794 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07708 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07684 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07837 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07761 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54215 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54215
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fvpt-g7a9-puab |
|
| 155 |
| url |
VCID-g5xk-qhrt-yygt |
| vulnerability_id |
VCID-g5xk-qhrt-yygt |
| summary |
kernel: net/sched: act_ct: fix skb leak and crash on ooo frags |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52610 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00839 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00882 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00842 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00831 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00826 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00827 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00876 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00878 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00841 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00845 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52610 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-52610
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-g5xk-qhrt-yygt |
|
| 156 |
| url |
VCID-g6yc-cmf7-kbhf |
| vulnerability_id |
VCID-g6yc-cmf7-kbhf |
| summary |
kernel: use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-51043 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02372 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02434 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02369 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02354 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02359 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02458 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02446 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02383 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.0238 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02385 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02405 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02382 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.0237 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-51043 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-51043
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-g6yc-cmf7-kbhf |
|
| 157 |
| url |
VCID-g9pf-dmax-ffa9 |
| vulnerability_id |
VCID-g9pf-dmax-ffa9 |
| summary |
kernel: USB: Gadget: core: Help prevent panic during UVC unconfigure |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53580 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01007 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01008 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01016 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01021 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01019 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01004 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.00999 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.00994 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01003 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01059 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01062 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53580 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53580
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-g9pf-dmax-ffa9 |
|
| 158 |
| url |
VCID-gasf-8pz8-3ubw |
| vulnerability_id |
VCID-gasf-8pz8-3ubw |
| summary |
kernel: drm/amdgpu: drop redundant sched job cleanup when cs is aborted |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53228 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03188 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03198 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03201 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03205 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03231 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04256 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04236 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04227 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04397 |
| published_at |
2026-04-26T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04292 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04278 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04362 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04377 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53228 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53228
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gasf-8pz8-3ubw |
|
| 159 |
| url |
VCID-gfcn-m7gp-2qh7 |
| vulnerability_id |
VCID-gfcn-m7gp-2qh7 |
| summary |
kernel: local dos vulnerability in scatterwalk_copychunks |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-6176 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01071 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01013 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01011 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01006 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.00999 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01009 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01067 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01015 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01023 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01028 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01026 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-6176 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-6176
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gfcn-m7gp-2qh7 |
|
| 160 |
| url |
VCID-gfzy-amh8-cbd3 |
| vulnerability_id |
VCID-gfzy-amh8-cbd3 |
| summary |
kernel: scsi: qla2xxx: Pointer may be dereferenced |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53150 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03051 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03065 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03066 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03069 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03094 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02922 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02902 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02895 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02875 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02885 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03004 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02998 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02987 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53150 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53150
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gfzy-amh8-cbd3 |
|
| 161 |
| url |
VCID-gkfg-bhw5-5ydn |
| vulnerability_id |
VCID-gkfg-bhw5-5ydn |
| summary |
kernel: cifs: fix use-after-free bug in refresh_cache_worker() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53052 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23257 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23301 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.2309 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23164 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23215 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23237 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23199 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23141 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23158 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.2315 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23112 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.22935 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.22928 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53052 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53052
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gkfg-bhw5-5ydn |
|
| 162 |
| url |
VCID-gumy-u2pm-w7hu |
| vulnerability_id |
VCID-gumy-u2pm-w7hu |
| summary |
kernel: Linux kernel: Denial of Service due to memory leak in drm_client_target_cloned function |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54091 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14484 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54091 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54091
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gumy-u2pm-w7hu |
|
| 163 |
| url |
VCID-gve7-2b5f-3qa8 |
| vulnerability_id |
VCID-gve7-2b5f-3qa8 |
| summary |
kernel: wifi: ath12k: Avoid NULL pointer access during management transmit cleanup |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53180 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04741 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04764 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04779 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04812 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04825 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05388 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05427 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05469 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.0531 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05299 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05288 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05235 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05236 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53180 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53180
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gve7-2b5f-3qa8 |
|
| 164 |
| url |
VCID-gyfy-ptzk-dbe2 |
| vulnerability_id |
VCID-gyfy-ptzk-dbe2 |
| summary |
kernel: Bluetooth: L2CAP: Fix potential user-after-free |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54214 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10793 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54214 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54214
|
| risk_score |
2.6 |
| exploitability |
0.5 |
| weighted_severity |
5.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gyfy-ptzk-dbe2 |
|
| 165 |
| url |
VCID-h6rc-a42b-4yhq |
| vulnerability_id |
VCID-h6rc-a42b-4yhq |
| summary |
kernel: drm/i915: Fix NULL ptr deref by checking new_crtc_state |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53833 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06793 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0684 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06822 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06874 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06907 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09299 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09349 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09303 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09273 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09259 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09152 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09144 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53833 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53833
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-h6rc-a42b-4yhq |
|
| 166 |
| url |
VCID-hctp-1qet-vqdp |
| vulnerability_id |
VCID-hctp-1qet-vqdp |
| summary |
kernel: keys: Fix linking a duplicate key to a keyring's assoc_array |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54170 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10793 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54170 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54170
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hctp-1qet-vqdp |
|
| 167 |
| url |
VCID-hdb2-8zaq-u7c2 |
| vulnerability_id |
VCID-hdb2-8zaq-u7c2 |
| summary |
kernel: wifi: mac80211_hwsim: Fix possible NULL dereference |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53209 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03121 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0303 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02971 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02948 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02939 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02915 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02925 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03044 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03041 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03134 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03136 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0314 |
| published_at |
2026-04-08T12:55:00Z |
|
| 12 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03165 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53209 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53209
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hdb2-8zaq-u7c2 |
|
| 168 |
| url |
VCID-hjsx-4kcj-j3ev |
| vulnerability_id |
VCID-hjsx-4kcj-j3ev |
| summary |
kernel: af_unix: Fix data-races around user->unix_inflight |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53204 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0147 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01473 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01479 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01484 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01486 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02229 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02208 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02198 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02173 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02159 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02156 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02132 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02144 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53204 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53204
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hjsx-4kcj-j3ev |
|
| 169 |
| url |
VCID-hm59-t1bg-d3h3 |
| vulnerability_id |
VCID-hm59-t1bg-d3h3 |
| summary |
kernel: Bluetooth: L2CAP: fix "bad unlock balance" in l2cap_disconnect_rsp |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53297 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02476 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02455 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02488 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02491 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02512 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02489 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02392 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02376 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02381 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.0248 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02467 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53297 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53297
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hm59-t1bg-d3h3 |
|
| 170 |
| url |
VCID-hvt9-ysn6-pfeq |
| vulnerability_id |
VCID-hvt9-ysn6-pfeq |
| summary |
kernel: net: phy: dp83822: Fix null pointer access on DP83825/DP83826 devices |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52984 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07095 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.072 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07144 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0712 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07173 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07204 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07202 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07191 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07181 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07118 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0722 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52984 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-52984
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hvt9-ysn6-pfeq |
|
| 171 |
| url |
VCID-hvwv-k9qk-gfar |
| vulnerability_id |
VCID-hvwv-k9qk-gfar |
| summary |
kernel: ip6_vti: fix slab-use-after-free in decode_session6 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53821 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14454 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14487 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14484 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14588 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14549 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14491 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14383 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14384 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53821 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53821
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hvwv-k9qk-gfar |
|
| 172 |
| url |
VCID-hwfn-tg8r-ayf4 |
| vulnerability_id |
VCID-hwfn-tg8r-ayf4 |
| summary |
kernel: samples/bpf: Fix buffer overflow in tcp_basertt |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54312 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.1395 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.14006 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13809 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13892 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13945 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13901 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13865 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13816 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13725 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.1372 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13795 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13817 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13786 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54312 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54312
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hwfn-tg8r-ayf4 |
|
| 173 |
| url |
VCID-hwkx-sg81-sfey |
| vulnerability_id |
VCID-hwkx-sg81-sfey |
| summary |
kernel: iommufd: IOMMUFD_DESTROY should not increase the refcount |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53795 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07747 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07792 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07749 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07809 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07826 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10496 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10481 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10479 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10572 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10539 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10517 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10384 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10368 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53795 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53795
|
| risk_score |
2.6 |
| exploitability |
0.5 |
| weighted_severity |
5.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hwkx-sg81-sfey |
|
| 174 |
| url |
VCID-j1et-eghs-mfdx |
| vulnerability_id |
VCID-j1et-eghs-mfdx |
| summary |
kernel: net/mlx5e: Move representor neigh cleanup to profile cleanup_tx |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54148 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06793 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0684 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06822 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06874 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06907 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.069 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06956 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06938 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06893 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06888 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0683 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06811 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09303 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54148 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54148
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-j1et-eghs-mfdx |
|
| 175 |
| url |
VCID-j6kj-8t9f-gkfj |
| vulnerability_id |
VCID-j6kj-8t9f-gkfj |
| summary |
kernel: gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52448 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00923 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00974 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00926 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00915 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0091 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00912 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00908 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00916 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00967 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0097 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00927 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0093 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52448 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-52448
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-j6kj-8t9f-gkfj |
|
| 176 |
| url |
VCID-j8v6-gx44-67ge |
| vulnerability_id |
VCID-j8v6-gx44-67ge |
| summary |
kernel: Linux kernel: Denial of Service due to memory leak in IP address deletion |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53995 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14484 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53995 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53995
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-j8v6-gx44-67ge |
|
| 177 |
| url |
VCID-jcv1-jyqc-17au |
| vulnerability_id |
VCID-jcv1-jyqc-17au |
| summary |
kernel: wifi: fix registration of 6Ghz-only phy without the full channel range |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54229 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07494 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07533 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07514 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07573 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07593 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.0759 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07576 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07564 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07488 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07476 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07608 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07569 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07549 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54229 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54229
|
| risk_score |
1.8 |
| exploitability |
0.5 |
| weighted_severity |
3.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jcv1-jyqc-17au |
|
| 178 |
| url |
VCID-jfv8-6bqt-gkb1 |
| vulnerability_id |
VCID-jfv8-6bqt-gkb1 |
| summary |
kernel: Linux kernel: Information disclosure in VFIO Type1 module via uninitialized stack memory |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54137 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14484 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54137 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54137
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jfv8-6bqt-gkb1 |
|
| 179 |
| url |
VCID-jfzw-5qnz-kqg4 |
| vulnerability_id |
VCID-jfzw-5qnz-kqg4 |
| summary |
kernel: Bluetooth: HCI: global out-of-bounds access in net/bluetooth/hci_sync.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28866 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07574 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.0759 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07616 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07649 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07667 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07668 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07654 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.0764 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.08948 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09143 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09088 |
| published_at |
2026-04-26T12:55:00Z |
|
| 11 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.08969 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09101 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28866 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-28866
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jfzw-5qnz-kqg4 |
|
| 180 |
| url |
VCID-jjh6-3jy7-sucy |
| vulnerability_id |
VCID-jjh6-3jy7-sucy |
| summary |
kernel: md/raid5-cache: fix a deadlock in r5l_exit_log() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53848 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07346 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0739 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07372 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07427 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07451 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10007 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10037 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10017 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10071 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.1003 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10009 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09883 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09858 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53848 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53848
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jjh6-3jy7-sucy |
|
| 181 |
| url |
VCID-jw26-mazb-afag |
| vulnerability_id |
VCID-jw26-mazb-afag |
| summary |
kernel: netfilter: nf_tables: disallow timeout for anonymous sets |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52620 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00874 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00924 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00875 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00877 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00881 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00879 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00868 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00861 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00863 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00862 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00916 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00919 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52620 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
| 110 |
|
| 111 |
|
| 112 |
|
| 113 |
|
| 114 |
|
| 115 |
|
| 116 |
|
| 117 |
|
| 118 |
|
| 119 |
|
| 120 |
|
| 121 |
|
| 122 |
|
| 123 |
|
| 124 |
|
| 125 |
|
| 126 |
|
| 127 |
|
| 128 |
|
| 129 |
|
| 130 |
|
| 131 |
|
| 132 |
|
| 133 |
|
| 134 |
|
| 135 |
|
| 136 |
|
| 137 |
|
| 138 |
|
| 139 |
|
| 140 |
|
| 141 |
|
| 142 |
|
| 143 |
|
| 144 |
|
| 145 |
|
| 146 |
|
| 147 |
|
| 148 |
|
| 149 |
|
| 150 |
|
| 151 |
|
| 152 |
|
| 153 |
|
| 154 |
|
| 155 |
|
| 156 |
|
| 157 |
|
| 158 |
|
| 159 |
|
| 160 |
|
| 161 |
|
| 162 |
|
| 163 |
|
| 164 |
|
| 165 |
|
| 166 |
|
| 167 |
|
| 168 |
|
| 169 |
|
| 170 |
|
| 171 |
|
| 172 |
|
| 173 |
|
| 174 |
|
| 175 |
|
| 176 |
|
| 177 |
|
| 178 |
|
| 179 |
|
| 180 |
|
| 181 |
|
| 182 |
|
| 183 |
|
| 184 |
|
| 185 |
|
| 186 |
|
| 187 |
|
| 188 |
|
| 189 |
|
| 190 |
|
| 191 |
|
| 192 |
|
| 193 |
|
| 194 |
|
| 195 |
|
| 196 |
|
| 197 |
|
| 198 |
|
| 199 |
|
| 200 |
|
| 201 |
|
| 202 |
|
| 203 |
|
| 204 |
|
| 205 |
|
| 206 |
|
| 207 |
|
| 208 |
|
| 209 |
|
| 210 |
|
| 211 |
|
| 212 |
|
| 213 |
|
| 214 |
|
| 215 |
|
| 216 |
|
| 217 |
|
| 218 |
|
| 219 |
|
| 220 |
|
| 221 |
|
| 222 |
|
| 223 |
|
| 224 |
|
| 225 |
|
| 226 |
|
| 227 |
|
| 228 |
|
| 229 |
|
| 230 |
|
| 231 |
|
| 232 |
|
| 233 |
|
| 234 |
|
| 235 |
|
| 236 |
|
| 237 |
|
| 238 |
|
| 239 |
|
| 240 |
|
| 241 |
|
| 242 |
|
| 243 |
|
| 244 |
|
| 245 |
|
| 246 |
|
| 247 |
|
| 248 |
|
| 249 |
|
| 250 |
|
| 251 |
|
| 252 |
|
| 253 |
|
| 254 |
|
| 255 |
|
| 256 |
|
| 257 |
|
| 258 |
|
| 259 |
|
| 260 |
|
| 261 |
|
| 262 |
|
| 263 |
|
| 264 |
|
| 265 |
|
| 266 |
|
| 267 |
|
| 268 |
|
| 269 |
|
| 270 |
|
| 271 |
|
| 272 |
|
| 273 |
|
| 274 |
|
| 275 |
|
| 276 |
|
| 277 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-52620
|
| risk_score |
1.7 |
| exploitability |
0.5 |
| weighted_severity |
3.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jw26-mazb-afag |
|
| 182 |
| url |
VCID-jzfn-k82f-s3fw |
| vulnerability_id |
VCID-jzfn-k82f-s3fw |
| summary |
kernel: race condition between HCIUARTSETPROTO and HCIUARTGETPROTO in hci_uart_tty_ioctl |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-31083 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00428 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00427 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0042 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00416 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00418 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00414 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00412 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00407 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00437 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00438 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-31083 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-31083
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jzfn-k82f-s3fw |
|
| 183 |
| url |
VCID-k21p-aq3s-dbfu |
| vulnerability_id |
VCID-k21p-aq3s-dbfu |
| summary |
kernel: Linux kernel: Denial of service or memory corruption due to a data race in ALSA PCM memory allocation |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54072 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14484 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54072 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54072
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k21p-aq3s-dbfu |
|
| 184 |
| url |
VCID-k2me-am4h-rqfm |
| vulnerability_id |
VCID-k2me-am4h-rqfm |
| summary |
kernel: ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26633 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05302 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05333 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.1052 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10553 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10524 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.1046 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10387 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10498 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15617 |
| published_at |
2026-04-26T12:55:00Z |
|
| 9 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15515 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15525 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15576 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15618 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26633 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-26633
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k2me-am4h-rqfm |
|
| 185 |
| url |
VCID-k4c9-qra5-efgy |
| vulnerability_id |
VCID-k4c9-qra5-efgy |
| summary |
kernel: drm/ttm: fix bulk_move corruption when adding a entry |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53444 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01826 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01838 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0184 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01843 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01857 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01844 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01829 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01824 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02252 |
| published_at |
2026-04-26T12:55:00Z |
|
| 9 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02186 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02197 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02281 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02261 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53444 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53444
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k4c9-qra5-efgy |
|
| 186 |
| url |
VCID-k7ag-ncz2-rfbn |
| vulnerability_id |
VCID-k7ag-ncz2-rfbn |
| summary |
kernel: ext4: fix delayed allocation bug in ext4_clu_mapped for bigalloc + inline |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50286 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02476 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02488 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02491 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02512 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02402 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02392 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02376 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02381 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.0248 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02467 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02455 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50286 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50286
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k7ag-ncz2-rfbn |
|
| 187 |
| url |
VCID-k9ux-pe12-87h5 |
| vulnerability_id |
VCID-k9ux-pe12-87h5 |
| summary |
kernel: USB: dwc3: fix memory leak with using debugfs_lookup() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53415 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04053 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0405 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04092 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04111 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04096 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04083 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04057 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03899 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0391 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04031 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04041 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04072 |
| published_at |
2026-04-04T12:55:00Z |
|
| 12 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04087 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53415 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53415
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k9ux-pe12-87h5 |
|
| 188 |
| url |
VCID-kcdp-wfbc-tkbu |
| vulnerability_id |
VCID-kcdp-wfbc-tkbu |
| summary |
kernel: RDMA/irdma: Fix data race on CQP request done |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54292 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07346 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0739 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07372 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07427 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07451 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07437 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07424 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07413 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07341 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07329 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07456 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07417 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07408 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54292 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54292
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kcdp-wfbc-tkbu |
|
| 189 |
| url |
VCID-kg1f-schr-8fh4 |
| vulnerability_id |
VCID-kg1f-schr-8fh4 |
| summary |
kernel: null pointer when load rlc firmware |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26649 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03288 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03167 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03177 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03298 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0329 |
| published_at |
2026-04-24T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0324 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0325 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03257 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03263 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03284 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03242 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03215 |
| published_at |
2026-04-12T12:55:00Z |
|
| 12 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03194 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26649 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-26649
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kg1f-schr-8fh4 |
|
| 190 |
| url |
VCID-kt61-914s-3fe1 |
| vulnerability_id |
VCID-kt61-914s-3fe1 |
| summary |
kernel: net: openvswitch: reject negative ifindex |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53843 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06793 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0684 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06822 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06874 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06907 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09299 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09349 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09303 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09273 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09259 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09152 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09144 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53843 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53843
|
| risk_score |
2.3 |
| exploitability |
0.5 |
| weighted_severity |
4.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kt61-914s-3fe1 |
|
| 191 |
| url |
VCID-m42w-gypj-1ug9 |
| vulnerability_id |
VCID-m42w-gypj-1ug9 |
| summary |
kernel: md: don't dereference mddev after export_rdev() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53665 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04741 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04764 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04779 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04812 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04825 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0479 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0477 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04723 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04731 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04875 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04912 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04951 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53665 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53665
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-m42w-gypj-1ug9 |
|
| 192 |
| url |
VCID-m5xk-6r4q-mbdh |
| vulnerability_id |
VCID-m5xk-6r4q-mbdh |
| summary |
kernel: mptcp: fix disconnect vs accept race |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53490 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01007 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01008 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01016 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01021 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01019 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01004 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.00999 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.00994 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01003 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01059 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01062 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53490 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53490
|
| risk_score |
2.7 |
| exploitability |
0.5 |
| weighted_severity |
5.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-m5xk-6r4q-mbdh |
|
| 193 |
| url |
VCID-mbng-7v9u-53bu |
| vulnerability_id |
VCID-mbng-7v9u-53bu |
| summary |
kernel: md/raid10: fix null-ptr-deref of mreplace in raid10_sync_request |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53380 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02951 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02927 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02937 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0296 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02975 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02965 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02973 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04185 |
| published_at |
2026-04-26T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04019 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04031 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04154 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04166 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53380 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53380
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mbng-7v9u-53bu |
|
| 194 |
| url |
VCID-me26-pr45-tfeg |
| vulnerability_id |
VCID-me26-pr45-tfeg |
| summary |
kernel: use-after-free in kv_parse_power_table |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52469 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02273 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02322 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02274 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02299 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.0228 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02268 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02265 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02247 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02257 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02351 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02329 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02277 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52469 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-52469
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-me26-pr45-tfeg |
|
| 195 |
| url |
VCID-myf8-auba-aqe1 |
| vulnerability_id |
VCID-myf8-auba-aqe1 |
| summary |
kernel: use-after-free in IPv4 IGMP |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-6932 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17843 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17896 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17599 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17687 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17749 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17767 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17721 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.1767 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17615 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17623 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.1766 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.1757 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17546 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-6932 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-6932
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-myf8-auba-aqe1 |
|
| 196 |
| url |
VCID-n1w6-27yz-dfer |
| vulnerability_id |
VCID-n1w6-27yz-dfer |
| summary |
kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-51779 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28149 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28056 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28192 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.27988 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28098 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28105 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28062 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28004 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31893 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31866 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31914 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.0013 |
| scoring_system |
epss |
| scoring_elements |
0.32099 |
| published_at |
2026-04-26T12:55:00Z |
|
| 12 |
| value |
0.0013 |
| scoring_system |
epss |
| scoring_elements |
0.3222 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-51779 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-51779
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-n1w6-27yz-dfer |
|
| 197 |
| url |
VCID-n21r-funt-2faf |
| vulnerability_id |
VCID-n21r-funt-2faf |
| summary |
kernel: netfilter: nf_tables: memory leak when more than 255 elements expired |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52581 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00825 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00864 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00826 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00831 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00828 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00817 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00811 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00812 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00816 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00862 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00863 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52581 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-52581
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-n21r-funt-2faf |
|
| 198 |
| url |
VCID-n4c6-4174-5fhz |
| vulnerability_id |
VCID-n4c6-4174-5fhz |
| summary |
kernel: KVM: s390: fix setting of fpc register |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52597 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05503 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05746 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05538 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05537 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05575 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05599 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05571 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05559 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05553 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05501 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05511 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05675 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.0571 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52597 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
| 110 |
|
| 111 |
|
| 112 |
|
| 113 |
|
| 114 |
|
| 115 |
|
| 116 |
|
| 117 |
|
| 118 |
|
| 119 |
|
| 120 |
|
| 121 |
|
| 122 |
|
| 123 |
|
| 124 |
|
| 125 |
|
| 126 |
|
| 127 |
|
| 128 |
|
| 129 |
|
| 130 |
|
| 131 |
|
| 132 |
|
| 133 |
|
| 134 |
|
| 135 |
|
| 136 |
|
| 137 |
|
| 138 |
|
| 139 |
|
| 140 |
|
| 141 |
|
| 142 |
|
| 143 |
|
| 144 |
|
| 145 |
|
| 146 |
|
| 147 |
|
| 148 |
|
| 149 |
|
| 150 |
|
| 151 |
|
| 152 |
|
| 153 |
|
| 154 |
|
| 155 |
|
| 156 |
|
| 157 |
|
| 158 |
|
| 159 |
|
| 160 |
|
| 161 |
|
| 162 |
|
| 163 |
|
| 164 |
|
| 165 |
|
| 166 |
|
| 167 |
|
| 168 |
|
| 169 |
|
| 170 |
|
| 171 |
|
| 172 |
|
| 173 |
|
| 174 |
|
| 175 |
|
| 176 |
|
| 177 |
|
| 178 |
|
| 179 |
|
| 180 |
|
| 181 |
|
| 182 |
|
| 183 |
|
| 184 |
|
| 185 |
|
| 186 |
|
| 187 |
|
| 188 |
|
| 189 |
|
| 190 |
|
| 191 |
|
| 192 |
|
| 193 |
|
| 194 |
|
| 195 |
|
| 196 |
|
| 197 |
|
| 198 |
|
| 199 |
|
| 200 |
|
| 201 |
|
| 202 |
|
| 203 |
|
| 204 |
|
| 205 |
|
| 206 |
|
| 207 |
|
| 208 |
|
| 209 |
|
| 210 |
|
| 211 |
|
| 212 |
|
| 213 |
|
| 214 |
|
| 215 |
|
| 216 |
|
| 217 |
|
| 218 |
|
| 219 |
|
| 220 |
|
| 221 |
|
| 222 |
|
| 223 |
|
| 224 |
|
| 225 |
|
| 226 |
|
| 227 |
|
| 228 |
|
| 229 |
|
| 230 |
|
| 231 |
|
| 232 |
|
| 233 |
|
| 234 |
|
| 235 |
|
| 236 |
|
| 237 |
|
| 238 |
|
| 239 |
|
| 240 |
|
| 241 |
|
| 242 |
|
| 243 |
|
| 244 |
|
| 245 |
|
| 246 |
|
| 247 |
|
| 248 |
|
| 249 |
|
| 250 |
|
| 251 |
|
| 252 |
|
| 253 |
|
| 254 |
|
| 255 |
|
| 256 |
|
| 257 |
|
| 258 |
|
| 259 |
|
| 260 |
|
| 261 |
|
| 262 |
|
| 263 |
|
| 264 |
|
| 265 |
|
| 266 |
|
| 267 |
|
| 268 |
|
| 269 |
|
| 270 |
|
| 271 |
|
| 272 |
|
| 273 |
|
| 274 |
|
| 275 |
|
| 276 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-52597
|
| risk_score |
1.8 |
| exploitability |
0.5 |
| weighted_severity |
3.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-n4c6-4174-5fhz |
|
| 199 |
| url |
VCID-nc4u-q2z2-nue5 |
| vulnerability_id |
VCID-nc4u-q2z2-nue5 |
| summary |
kernel: cpufreq: amd-pstate-ut: Fix kernel panic when loading the driver |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53563 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03188 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03198 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03201 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03205 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03231 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03185 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03158 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03142 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03116 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03123 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03242 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03243 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03238 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53563 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53563
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nc4u-q2z2-nue5 |
|
| 200 |
|
| 201 |
| url |
VCID-ngut-28y7-fbbq |
| vulnerability_id |
VCID-ngut-28y7-fbbq |
| summary |
kernel: lib/kobject.c vulnerable to fill_kobj_path out-of-bounds write |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-45863 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.0116 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01166 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01179 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01185 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01186 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.0117 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01167 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01155 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01237 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01163 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01516 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01515 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-45863 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-45863
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ngut-28y7-fbbq |
|
| 202 |
| url |
VCID-nnau-p81c-4khc |
| vulnerability_id |
VCID-nnau-p81c-4khc |
| summary |
kernel: PCI/DOE: Fix destroy_work_on_stack() race |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54235 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07346 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0739 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07372 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07427 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07451 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07437 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07424 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07413 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07341 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07329 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07456 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07417 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07408 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54235 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54235
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nnau-p81c-4khc |
|
| 203 |
| url |
VCID-nnck-829f-e3gm |
| vulnerability_id |
VCID-nnck-829f-e3gm |
| summary |
Kernel: double free in hci_conn_cleanup of the bluetooth subsystem |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28464 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03439 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03452 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03465 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03467 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.0349 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03446 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03419 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03394 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03371 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04642 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05361 |
| published_at |
2026-04-26T12:55:00Z |
|
| 11 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05283 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.0532 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28464 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-28464
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
7.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nnck-829f-e3gm |
|
| 204 |
| url |
VCID-nt4s-u8z2-73d7 |
| vulnerability_id |
VCID-nt4s-u8z2-73d7 |
| summary |
kernel: RDMA/efa: Fix wrong resources deallocation order |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54201 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07346 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0739 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07372 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07427 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07451 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07437 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07424 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07413 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07341 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07329 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07456 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07417 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07408 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54201 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54201
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nt4s-u8z2-73d7 |
|
| 205 |
| url |
VCID-nucn-gzzn-cufx |
| vulnerability_id |
VCID-nucn-gzzn-cufx |
| summary |
kernel: Linux kernel ALSA USB audio: Denial of Service due to memory leaks in MIDI 2.0 / UMP device handling |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54022 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07747 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07792 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07749 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07809 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07826 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07821 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07684 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07837 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07808 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07794 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07708 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10479 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54022 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54022
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nucn-gzzn-cufx |
|
| 206 |
| url |
VCID-nukc-v8yh-wqdc |
| vulnerability_id |
VCID-nukc-v8yh-wqdc |
| summary |
kernel: perf/x86/intel/uncore: Fix reference count leak in hswep_has_limit_sbox() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50318 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02951 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02965 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02973 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02975 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04154 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04166 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04185 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04067 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04056 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0403 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04019 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04031 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50318 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50318
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nukc-v8yh-wqdc |
|
| 207 |
| url |
VCID-nv6q-r1kv-c7e3 |
| vulnerability_id |
VCID-nv6q-r1kv-c7e3 |
| summary |
kernel: net/mlx5e: xsk: Fix crash on regular rq reactivation |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53394 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04741 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04812 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04764 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04779 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04825 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0479 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0477 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05236 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05388 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05427 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05469 |
| published_at |
2026-04-26T12:55:00Z |
|
| 11 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05235 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53394 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53394
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nv6q-r1kv-c7e3 |
|
| 208 |
| url |
VCID-nwjz-2g6n-5bhc |
| vulnerability_id |
VCID-nwjz-2g6n-5bhc |
| summary |
kernel: RDMA/cxgb4: Fix potential null-ptr-deref in pass_establish() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53335 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03188 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03198 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03201 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03205 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03231 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03185 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03158 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04397 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04362 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04377 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04256 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04227 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04236 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53335 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53335
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nwjz-2g6n-5bhc |
|
| 209 |
| url |
VCID-nxkh-as3r-cufe |
| vulnerability_id |
VCID-nxkh-as3r-cufe |
| summary |
kernel: net/mlx5e: Check for NOT_READY flag state after locking |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53581 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0145 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01453 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0146 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01465 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01467 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01454 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01443 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01457 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01544 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01552 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0155 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53581 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53581
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nxkh-as3r-cufe |
|
| 210 |
| url |
VCID-p2zm-56uv-kqa9 |
| vulnerability_id |
VCID-p2zm-56uv-kqa9 |
| summary |
kernel: iommu/amd/iommu_v2: Fix pasid_state refcount dec hit 0 warning on pasid unbind |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53501 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02895 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0291 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02919 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0292 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02945 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02915 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02887 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02868 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02879 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02998 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02992 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02979 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53501 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53501
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-p2zm-56uv-kqa9 |
|
| 211 |
| url |
VCID-p7n2-tzd3-buhk |
| vulnerability_id |
VCID-p7n2-tzd3-buhk |
| summary |
kernel: netfilter: nftables: exthdr: fix 4-byte stack OOB write |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52628 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00548 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00565 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00539 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00536 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00531 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00532 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0053 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00528 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00567 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00562 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0054 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52628 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-52628
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-p7n2-tzd3-buhk |
|
| 212 |
| url |
VCID-pfrk-zevm-auf4 |
| vulnerability_id |
VCID-pfrk-zevm-auf4 |
| summary |
kernel: Bluetooth: hci_sync: fix memory leak in hci_update_adv_data() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53017 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08345 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08332 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08356 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.0825 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08233 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08395 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08367 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08398 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08319 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08383 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.084 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08391 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08373 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53017 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53017
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pfrk-zevm-auf4 |
|
| 213 |
| url |
VCID-pjd2-pgsp-u3be |
| vulnerability_id |
VCID-pjd2-pgsp-u3be |
| summary |
kernel: Linux kernel: Denial of Service in ARM FF-A due to duplicate device names during logical partition registration. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53256 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03602 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03618 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03626 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03628 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.0365 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04678 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04905 |
| published_at |
2026-04-26T12:55:00Z |
|
| 7 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04747 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04728 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04712 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04688 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0483 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04866 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53256 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53256
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pjd2-pgsp-u3be |
|
| 214 |
| url |
VCID-pr45-ju6y-7ya4 |
| vulnerability_id |
VCID-pr45-ju6y-7ya4 |
| summary |
kernel: PM: hibernate: defer device probing when resuming from hibernation |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50202 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04953 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04988 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.0501 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05042 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05058 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05038 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.0502 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05002 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15677 |
| published_at |
2026-04-26T12:55:00Z |
|
| 9 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15574 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15584 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15634 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.1568 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50202 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50202
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pr45-ju6y-7ya4 |
|
| 215 |
| url |
VCID-prcx-49m8-cyft |
| vulnerability_id |
VCID-prcx-49m8-cyft |
| summary |
kernel: cifs: Fix lost destroy smbd connection when MR allocate failed |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54260 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10793 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54260 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54260
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-prcx-49m8-cyft |
|
| 216 |
| url |
VCID-punv-whvx-7ydr |
| vulnerability_id |
VCID-punv-whvx-7ydr |
| summary |
kernel: ipv4: NULL pointer dereference in ipv4_send_dest_unreach() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-42754 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01072 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01075 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01082 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01087 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01071 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01065 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01066 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01059 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01068 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01132 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01133 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01139 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-42754 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-42754
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-punv-whvx-7ydr |
|
| 217 |
| url |
VCID-pxt2-nr7c-5kcz |
| vulnerability_id |
VCID-pxt2-nr7c-5kcz |
| summary |
kernel: Bluetooth Forward and Future Secrecy Attacks and Defenses |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-24023 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42394 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42256 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42418 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42441 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42405 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42375 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42398 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42261 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42424 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42362 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.4241 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00208 |
| scoring_system |
epss |
| scoring_elements |
0.43218 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-24023 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-24023
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pxt2-nr7c-5kcz |
|
| 218 |
| url |
VCID-q2kz-nxke-13d4 |
| vulnerability_id |
VCID-q2kz-nxke-13d4 |
| summary |
kernel: soundwire: qcom: fix storing port config out-of-bounds |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53465 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03458 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03471 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03484 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03487 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03509 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03464 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03436 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03411 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03387 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03399 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03516 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03522 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03527 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53465 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53465
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-q2kz-nxke-13d4 |
|
| 219 |
| url |
VCID-q5ke-8q3r-qycu |
| vulnerability_id |
VCID-q5ke-8q3r-qycu |
| summary |
kernel: ext4: add bounds checking in get_max_inline_xattr_value_size() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53285 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02285 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02225 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02291 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02289 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02292 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02313 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02297 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02181 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02177 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02155 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02166 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02252 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02233 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53285 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53285
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-q5ke-8q3r-qycu |
|
| 220 |
| url |
VCID-qdd1-rxsn-ruan |
| vulnerability_id |
VCID-qdd1-rxsn-ruan |
| summary |
kernel: erofs: fix order >= MAX_ORDER warning due to crafted negative i_size |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50313 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02951 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02965 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02973 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02975 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04154 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04166 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04185 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04067 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04056 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0403 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04019 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04031 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50313 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50313
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qdd1-rxsn-ruan |
|
| 221 |
| url |
VCID-qhpj-sbnc-t3af |
| vulnerability_id |
VCID-qhpj-sbnc-t3af |
| summary |
kernel: x86/platform/uv: Use alternate source for socket to node data |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53496 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04741 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04764 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04779 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04812 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04825 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0479 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0477 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04723 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04731 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04875 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04912 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04951 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53496 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53496
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qhpj-sbnc-t3af |
|
| 222 |
| url |
VCID-qkq7-ws9x-43f7 |
| vulnerability_id |
VCID-qkq7-ws9x-43f7 |
| summary |
kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-1086 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.85405 |
| scoring_system |
epss |
| scoring_elements |
0.99369 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.85405 |
| scoring_system |
epss |
| scoring_elements |
0.99367 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.85405 |
| scoring_system |
epss |
| scoring_elements |
0.99364 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.85405 |
| scoring_system |
epss |
| scoring_elements |
0.99366 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.85405 |
| scoring_system |
epss |
| scoring_elements |
0.99365 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.85911 |
| scoring_system |
epss |
| scoring_elements |
0.99383 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.86034 |
| scoring_system |
epss |
| scoring_elements |
0.99397 |
| published_at |
2026-04-26T12:55:00Z |
|
| 7 |
| value |
0.86056 |
| scoring_system |
epss |
| scoring_elements |
0.99389 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.86753 |
| scoring_system |
epss |
| scoring_elements |
0.99429 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.86753 |
| scoring_system |
epss |
| scoring_elements |
0.99427 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-1086 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
| reference_url |
https://pwning.tech/nftables/ |
| reference_id |
nftables |
| reference_type |
|
| scores |
| 0 |
| value |
7.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
Attend |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/ |
|
|
| url |
https://pwning.tech/nftables/ |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-1086
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
7.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qkq7-ws9x-43f7 |
|
| 223 |
| url |
VCID-qp3j-9gdq-r7af |
| vulnerability_id |
VCID-qp3j-9gdq-r7af |
| summary |
kernel: Linux kernel (amdgpu): Denial of Service via incorrect interrupt handling |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53237 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03188 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03198 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03201 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03205 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03231 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04227 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04397 |
| published_at |
2026-04-26T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04292 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04278 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04256 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04236 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04362 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04377 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53237 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53237
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qp3j-9gdq-r7af |
|
| 224 |
| url |
VCID-qp7s-fafn-a3fe |
| vulnerability_id |
VCID-qp7s-fafn-a3fe |
| summary |
kernel: ixgbe: Fix panic during XDP_TX with > 64 CPUs |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54090 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07346 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0739 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07372 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07427 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07451 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07437 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07456 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07417 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07424 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07413 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07341 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07329 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10017 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54090 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54090
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qp7s-fafn-a3fe |
|
| 225 |
| url |
VCID-qpq9-r7ew-qbg3 |
| vulnerability_id |
VCID-qpq9-r7ew-qbg3 |
| summary |
kernel: drm/i915: mark requests for GuC virtual engines to avoid use-after-free |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53552 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.01923 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.01937 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.01936 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.0195 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.01935 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.01919 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.01914 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.01895 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.01893 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.01981 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.01967 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.01964 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53552 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53552
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qpq9-r7ew-qbg3 |
|
| 226 |
| url |
VCID-qpvw-4fhp-v7fn |
| vulnerability_id |
VCID-qpvw-4fhp-v7fn |
| summary |
kernel: Bluetooth: hci_conn: Fix memory leaks |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53018 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08345 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08332 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08356 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.0825 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08233 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08395 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08367 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08398 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08319 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08383 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.084 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08391 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08373 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53018 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53018
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qpvw-4fhp-v7fn |
|
| 227 |
| url |
VCID-qqz8-a63y-jydg |
| vulnerability_id |
VCID-qqz8-a63y-jydg |
| summary |
kernel: drm/client: Fix memory leak in drm_client_modeset_probe |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53288 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02476 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02455 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02488 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02491 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02512 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02489 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02392 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02376 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02381 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.0248 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02467 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53288 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53288
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qqz8-a63y-jydg |
|
| 228 |
| url |
VCID-qtm2-45az-qygz |
| vulnerability_id |
VCID-qtm2-45az-qygz |
| summary |
kernel: Linux kernel: Out-of-bounds write in VXLAN due to incorrect nexthop hash size leading to denial of service |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53192 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03059 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03062 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03087 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03045 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0413 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04252 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04264 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04283 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04195 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04178 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04153 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04123 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53192 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53192
|
| risk_score |
2.7 |
| exploitability |
0.5 |
| weighted_severity |
5.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qtm2-45az-qygz |
|
| 229 |
| url |
VCID-qtv9-fm5u-7bbg |
| vulnerability_id |
VCID-qtv9-fm5u-7bbg |
| summary |
kernel: scsi: qla2xxx: Check valid rport returned by fc_bsg_to_rport() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54014 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14484 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54014 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54014
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qtv9-fm5u-7bbg |
|
| 230 |
| url |
VCID-qwzq-jrtt-7yhk |
| vulnerability_id |
VCID-qwzq-jrtt-7yhk |
| summary |
kernel: net/mlx5e: fix memory leak in mlx5e_ptp_open |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54169 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07346 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0739 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07372 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07427 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07451 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07437 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07424 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07413 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07341 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07329 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07456 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07417 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07408 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54169 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54169
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qwzq-jrtt-7yhk |
|
| 231 |
| url |
VCID-r9jb-uuk1-dkgj |
| vulnerability_id |
VCID-r9jb-uuk1-dkgj |
| summary |
kernel: md: fix warning for holder mismatch from export_rdev() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53791 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07747 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07792 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07749 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07809 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07826 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10496 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10481 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10479 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10572 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10539 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10517 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10384 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10368 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53791 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53791
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-r9jb-uuk1-dkgj |
|
| 232 |
| url |
VCID-raem-h5nr-g7cq |
| vulnerability_id |
VCID-raem-h5nr-g7cq |
| summary |
kernel: nf_tables: use-after-free vulnerability in the nft_setelem_catchall_deactivate() function |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-1085 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.14143 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.14166 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.14057 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.14056 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.14133 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.14167 |
| published_at |
2026-04-24T12:55:00Z |
|
| 6 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.14308 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.14371 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.14178 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.14261 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.14314 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.14223 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-1085 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-1085
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-raem-h5nr-g7cq |
|
| 233 |
| url |
VCID-rbua-nn9a-kfb9 |
| vulnerability_id |
VCID-rbua-nn9a-kfb9 |
| summary |
kernel: drm/nouveau/kms/nv50-: init hpd_irq_lock for PIOR DP |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54263 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07747 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07792 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07749 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07809 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07826 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07821 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07808 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07794 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07708 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07684 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07837 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07761 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54263 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54263
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rbua-nn9a-kfb9 |
|
| 234 |
| url |
VCID-rekt-2vyj-z7g8 |
| vulnerability_id |
VCID-rekt-2vyj-z7g8 |
| summary |
kernel: dm: fix a race condition in retrieve_deps |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54324 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06793 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0684 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06822 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06874 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06907 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.069 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06893 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06888 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0683 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06811 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06956 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06938 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06942 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54324 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54324
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rekt-2vyj-z7g8 |
|
| 235 |
| url |
VCID-repn-7xqs-23fy |
| vulnerability_id |
VCID-repn-7xqs-23fy |
| summary |
kernel: powerpc/iommu: fix memory leak with using debugfs_lookup() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53097 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00096 |
| scoring_system |
epss |
| scoring_elements |
0.26686 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00096 |
| scoring_system |
epss |
| scoring_elements |
0.26728 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00096 |
| scoring_system |
epss |
| scoring_elements |
0.26513 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00096 |
| scoring_system |
epss |
| scoring_elements |
0.26581 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00096 |
| scoring_system |
epss |
| scoring_elements |
0.2663 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00096 |
| scoring_system |
epss |
| scoring_elements |
0.26635 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00096 |
| scoring_system |
epss |
| scoring_elements |
0.2659 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00096 |
| scoring_system |
epss |
| scoring_elements |
0.26532 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00096 |
| scoring_system |
epss |
| scoring_elements |
0.2654 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00096 |
| scoring_system |
epss |
| scoring_elements |
0.26474 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00096 |
| scoring_system |
epss |
| scoring_elements |
0.26413 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00096 |
| scoring_system |
epss |
| scoring_elements |
0.26407 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53097 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53097
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-repn-7xqs-23fy |
|
| 236 |
| url |
VCID-rez4-mgqw-8yes |
| vulnerability_id |
VCID-rez4-mgqw-8yes |
| summary |
kernel: wifi: mwifiex: avoid possible NULL skb pointer dereference |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53384 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.0259 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02593 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02595 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02609 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02631 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02611 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02603 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02606 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.0372 |
| published_at |
2026-04-26T12:55:00Z |
|
| 9 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03575 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03588 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03713 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03717 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53384 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53384
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rez4-mgqw-8yes |
|
| 237 |
| url |
VCID-rgfq-8pjg-wkf3 |
| vulnerability_id |
VCID-rgfq-8pjg-wkf3 |
| summary |
kernel: Kernel: Denial of Service in amdgpu driver due to improper interrupt handling |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53193 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03188 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03198 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03201 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03205 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03231 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04362 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04377 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04397 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04292 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04278 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04256 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04227 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04236 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53193 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53193
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rgfq-8pjg-wkf3 |
|
| 238 |
| url |
VCID-rhh5-xhu4-vfbr |
| vulnerability_id |
VCID-rhh5-xhu4-vfbr |
| summary |
kernel: ext4: fix rbtree traversal bug in ext4_mb_use_preallocated |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53813 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07747 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07792 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07749 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07809 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07826 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10496 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10481 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10479 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10572 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10539 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10517 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10384 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10368 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53813 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53813
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rhh5-xhu4-vfbr |
|
| 239 |
| url |
VCID-rn4q-b4yc-9bar |
| vulnerability_id |
VCID-rn4q-b4yc-9bar |
| summary |
kernel: ext4: fix invalid free tracking in ext4_xattr_move_to_block() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54062 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.1533 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.154 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15203 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15291 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15341 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15303 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15177 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15217 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15264 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15199 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15113 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15121 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19642 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54062 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54062
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rn4q-b4yc-9bar |
|
| 240 |
| url |
VCID-rp4r-rkvb-pfe3 |
| vulnerability_id |
VCID-rp4r-rkvb-pfe3 |
| summary |
kernel: objtool: Fix SEGFAULT |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50879 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10793 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50879 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50879
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rp4r-rkvb-pfe3 |
|
| 241 |
| url |
VCID-rtyz-f5p8-aqc2 |
| vulnerability_id |
VCID-rtyz-f5p8-aqc2 |
| summary |
kernel: arm64: csum: Fix OoB access in IP checksum code for negative lengths |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53726 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11997 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.12041 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11843 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11926 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11978 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11986 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11949 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11923 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11793 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14751 |
| published_at |
2026-04-26T12:55:00Z |
|
| 10 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14661 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14721 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14752 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53726 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53726
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rtyz-f5p8-aqc2 |
|
| 242 |
| url |
VCID-rw4x-nvsd-8ucb |
| vulnerability_id |
VCID-rw4x-nvsd-8ucb |
| summary |
kernel: hugetlbfs: Null pointer dereference in hugetlbfs_fill_super function |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-0841 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01534 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01439 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01527 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01536 |
| published_at |
2026-04-24T12:55:00Z |
|
| 4 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01433 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01438 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01443 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01447 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.0145 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01442 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01434 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01425 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-0841 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
| 110 |
|
| 111 |
|
| 112 |
|
| 113 |
|
| 114 |
|
| 115 |
|
| 116 |
|
| 117 |
|
| 118 |
|
| 119 |
|
| 120 |
|
| 121 |
|
| 122 |
|
| 123 |
|
| 124 |
|
| 125 |
|
| 126 |
|
| 127 |
|
| 128 |
|
| 129 |
|
| 130 |
|
| 131 |
|
| 132 |
|
| 133 |
|
| 134 |
|
| 135 |
|
| 136 |
|
| 137 |
|
| 138 |
|
| 139 |
|
| 140 |
|
| 141 |
|
| 142 |
|
| 143 |
|
| 144 |
|
| 145 |
|
| 146 |
|
| 147 |
|
| 148 |
|
| 149 |
|
| 150 |
|
| 151 |
|
| 152 |
|
| 153 |
|
| 154 |
|
| 155 |
|
| 156 |
|
| 157 |
|
| 158 |
|
| 159 |
|
| 160 |
|
| 161 |
|
| 162 |
|
| 163 |
|
| 164 |
|
| 165 |
|
| 166 |
|
| 167 |
|
| 168 |
|
| 169 |
|
| 170 |
|
| 171 |
|
| 172 |
|
| 173 |
|
| 174 |
|
| 175 |
|
| 176 |
|
| 177 |
|
| 178 |
|
| 179 |
|
| 180 |
|
| 181 |
|
| 182 |
|
| 183 |
|
| 184 |
|
| 185 |
|
| 186 |
|
| 187 |
|
| 188 |
|
| 189 |
|
| 190 |
|
| 191 |
|
| 192 |
|
| 193 |
|
| 194 |
|
| 195 |
|
| 196 |
|
| 197 |
|
| 198 |
|
| 199 |
|
| 200 |
|
| 201 |
|
| 202 |
|
| 203 |
|
| 204 |
|
| 205 |
|
| 206 |
|
| 207 |
|
| 208 |
|
| 209 |
|
| 210 |
|
| 211 |
|
| 212 |
|
| 213 |
|
| 214 |
|
| 215 |
|
| 216 |
|
| 217 |
|
| 218 |
|
| 219 |
|
| 220 |
|
| 221 |
|
| 222 |
|
| 223 |
|
| 224 |
|
| 225 |
|
| 226 |
|
| 227 |
|
| 228 |
|
| 229 |
|
| 230 |
|
| 231 |
|
| 232 |
|
| 233 |
|
| 234 |
|
| 235 |
|
| 236 |
|
| 237 |
|
| 238 |
|
| 239 |
|
| 240 |
|
| 241 |
|
| 242 |
|
| 243 |
|
| 244 |
|
| 245 |
|
| 246 |
|
| 247 |
|
| 248 |
|
| 249 |
|
| 250 |
|
| 251 |
|
| 252 |
|
| 253 |
|
| 254 |
|
| 255 |
|
| 256 |
|
| 257 |
|
| 258 |
|
| 259 |
|
| 260 |
|
| 261 |
|
| 262 |
|
| 263 |
|
| 264 |
|
| 265 |
|
| 266 |
|
| 267 |
|
| 268 |
|
| 269 |
|
| 270 |
|
| 271 |
|
| 272 |
|
| 273 |
|
| 274 |
|
| 275 |
|
| 276 |
|
| 277 |
|
| 278 |
|
| 279 |
|
| 280 |
|
| 281 |
|
| 282 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-0841
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rw4x-nvsd-8ucb |
|
| 243 |
| url |
VCID-rxd4-de9r-jfew |
| vulnerability_id |
VCID-rxd4-de9r-jfew |
| summary |
kernel: hwmon: (coretemp) Simplify platform device handling |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53612 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04344 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04367 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04376 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0441 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04427 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04422 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04407 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0439 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04358 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04366 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04499 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04527 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04547 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53612 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53612
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rxd4-de9r-jfew |
|
| 244 |
| url |
VCID-s1cw-2hc3-kkfn |
| vulnerability_id |
VCID-s1cw-2hc3-kkfn |
| summary |
kernel: HID: sony: Fix a potential memory leak in sony_probe() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52529 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02449 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02528 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02463 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02466 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02486 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02458 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02457 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.0244 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02447 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02551 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02539 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02462 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52529 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-52529
|
| risk_score |
2.7 |
| exploitability |
0.5 |
| weighted_severity |
5.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-s1cw-2hc3-kkfn |
|
| 245 |
| url |
VCID-s6sp-bdnq-kkdx |
| vulnerability_id |
VCID-s6sp-bdnq-kkdx |
| summary |
kernel: Bluetooth: hci_conn: Fix crash on hci_create_cis_sync |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50447 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01826 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01838 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0184 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01843 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01857 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01844 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01829 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01824 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01807 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01806 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01887 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0188 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01876 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50447 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50447
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-s6sp-bdnq-kkdx |
|
| 246 |
| url |
VCID-s7n6-yg5w-vuem |
| vulnerability_id |
VCID-s7n6-yg5w-vuem |
| summary |
kernel: tee: amdtee: fix race condition in amdtee_open_session |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53047 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15108 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15176 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.1498 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15068 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.1512 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15087 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15049 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.14988 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.14886 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.14893 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.14948 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.14986 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.14989 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53047 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53047
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-s7n6-yg5w-vuem |
|
| 247 |
| url |
VCID-s9xw-vbvc-vfa2 |
| vulnerability_id |
VCID-s9xw-vbvc-vfa2 |
| summary |
kernel: block, bfq: Fix division by zero error on zero wsum |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54242 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06793 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0684 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06822 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06874 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06907 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.069 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06893 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06888 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0683 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06811 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06956 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06938 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06942 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54242 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54242
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-s9xw-vbvc-vfa2 |
|
| 248 |
| url |
VCID-sasb-nznc-5qdp |
| vulnerability_id |
VCID-sasb-nznc-5qdp |
| summary |
kernel: ext4: fix i_disksize exceeding i_size problem in paritally written case |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53270 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02895 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0291 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02945 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0292 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02919 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02915 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04128 |
| published_at |
2026-04-26T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04005 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03977 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0396 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03972 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04097 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0411 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53270 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53270
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sasb-nznc-5qdp |
|
| 249 |
| url |
VCID-sc4h-g6yp-cud9 |
| vulnerability_id |
VCID-sc4h-g6yp-cud9 |
| summary |
kernel: scsi: core: Remove the /proc/scsi/${proc_name} directory earlier |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53140 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25922 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25964 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.2573 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25802 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25853 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25864 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25823 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25767 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25768 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25751 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25723 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25668 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25659 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53140 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53140
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sc4h-g6yp-cud9 |
|
| 250 |
| url |
VCID-sqaq-zhmy-1bd2 |
| vulnerability_id |
VCID-sqaq-zhmy-1bd2 |
| summary |
kernel: wifi: ath11k: Add missing hw_ops->get_ring_selector() for IPQ5018 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54141 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06793 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0684 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06822 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06874 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06907 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.069 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06956 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06938 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06893 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06888 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0683 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06811 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09303 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54141 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54141
|
| risk_score |
2.6 |
| exploitability |
0.5 |
| weighted_severity |
5.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sqaq-zhmy-1bd2 |
|
| 251 |
| url |
VCID-sv6b-1fxf-2ygx |
| vulnerability_id |
VCID-sv6b-1fxf-2ygx |
| summary |
kernel: vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52973 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07882 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07839 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07922 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07936 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07953 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07964 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07944 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07929 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07886 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.1327 |
| published_at |
2026-04-26T12:55:00Z |
|
| 10 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.1321 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13291 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13298 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52973 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-52973
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sv6b-1fxf-2ygx |
|
| 252 |
| url |
VCID-syfn-z7vm-qqh1 |
| vulnerability_id |
VCID-syfn-z7vm-qqh1 |
| summary |
kernel: Linux kernel: BPF verifier log truncation via crafted user input |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54145 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06793 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0684 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06822 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06874 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06907 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.069 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06956 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06938 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06893 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06888 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0683 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06811 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09303 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54145 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54145
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-syfn-z7vm-qqh1 |
|
| 253 |
| url |
VCID-syxu-a4az-qfe4 |
| vulnerability_id |
VCID-syxu-a4az-qfe4 |
| summary |
kernel: block/rq_qos: protect rq_qos apis with a new lock |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53823 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07747 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07792 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07749 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07809 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07826 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10496 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10481 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10479 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10572 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10539 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10517 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10384 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10368 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53823 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53823
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-syxu-a4az-qfe4 |
|
| 254 |
| url |
VCID-t37x-b4vt-6kd7 |
| vulnerability_id |
VCID-t37x-b4vt-6kd7 |
| summary |
kernel: RDMA/cma: Allow UD qp_type to join multicast only |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53525 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02895 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0291 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02919 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0292 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02945 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02915 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02887 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02868 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02879 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02998 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02992 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02979 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53525 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53525
|
| risk_score |
2.6 |
| exploitability |
0.5 |
| weighted_severity |
5.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t37x-b4vt-6kd7 |
|
| 255 |
| url |
VCID-t6ut-cx1y-c3ew |
| vulnerability_id |
VCID-t6ut-cx1y-c3ew |
| summary |
kernel: OPP: Fix potential null ptr dereference in dev_pm_opp_get_required_pstate() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53664 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04741 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04764 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04779 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04812 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04825 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0479 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0477 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04723 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04731 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04875 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04912 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04951 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53664 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53664
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t6ut-cx1y-c3ew |
|
| 256 |
| url |
VCID-t6vp-xgs3-cqda |
| vulnerability_id |
VCID-t6vp-xgs3-cqda |
| summary |
kernel: igb: Fix igb_down hung on surprise removal |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53148 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03613 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03629 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03638 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.0364 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03661 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03497 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03469 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03444 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03417 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03428 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03548 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03556 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03562 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53148 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53148
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t6vp-xgs3-cqda |
|
| 257 |
| url |
VCID-t7wf-aj72-rbbb |
| vulnerability_id |
VCID-t7wf-aj72-rbbb |
| summary |
kernel: memcontrol: ensure memcg acquired by id is properly set up |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53621 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02754 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04797 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04812 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04846 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04857 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04844 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04821 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04801 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04753 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04762 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04941 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04979 |
| published_at |
2026-04-26T12:55:00Z |
|
| 12 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04774 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53621 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53621
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t7wf-aj72-rbbb |
|
| 258 |
| url |
VCID-tm9p-gvrt-yqa3 |
| vulnerability_id |
VCID-tm9p-gvrt-yqa3 |
| summary |
kernel: igc: Fix Kernel Panic during ndo_tx_timeout callback |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54166 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07346 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0739 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07372 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07427 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07451 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07437 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07424 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07413 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07341 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07329 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07456 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07417 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07408 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54166 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54166
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tm9p-gvrt-yqa3 |
|
| 259 |
| url |
VCID-tpet-vvg2-3qcb |
| vulnerability_id |
VCID-tpet-vvg2-3qcb |
| summary |
kernel: drm/amdgpu: fix calltrace warning in amddrm_buddy_fini |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53152 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01826 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01838 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0184 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01843 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01857 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02281 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02261 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02252 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02215 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02204 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02203 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02186 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02197 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53152 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53152
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tpet-vvg2-3qcb |
|
| 260 |
| url |
VCID-tt8d-32cv-kuc9 |
| vulnerability_id |
VCID-tt8d-32cv-kuc9 |
| summary |
kernel: iw_cxgb4: Fix potential NULL dereference in c4iw_fill_res_cm_id_entry() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53476 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03188 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03198 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03201 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03205 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03231 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03185 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03158 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03142 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03116 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03123 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03242 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03243 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03238 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53476 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53476
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tt8d-32cv-kuc9 |
|
| 261 |
| url |
VCID-tusj-sfvh-9kgu |
| vulnerability_id |
VCID-tusj-sfvh-9kgu |
| summary |
kernel: af_unix: Fix data-race around unix_tot_inflight |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54006 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14484 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54006 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54006
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tusj-sfvh-9kgu |
|
| 262 |
| url |
VCID-twga-5yzu-myba |
| vulnerability_id |
VCID-twga-5yzu-myba |
| summary |
kernel: drm/amd/display: Fix possible underflow for displays with large vblank |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53258 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01826 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0184 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01838 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01843 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01857 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02186 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02204 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02203 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02197 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02281 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02261 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02252 |
| published_at |
2026-04-26T12:55:00Z |
|
| 12 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02215 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53258 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53258
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-twga-5yzu-myba |
|
| 263 |
| url |
VCID-u2f9-867y-3yfb |
| vulnerability_id |
VCID-u2f9-867y-3yfb |
| summary |
kernel: Linux kernel: Denial of Service vulnerability in RDMA/rxe component |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54028 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07346 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0739 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07372 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07427 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07451 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07437 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07456 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07417 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07424 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07413 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07341 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07329 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10017 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54028 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54028
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-u2f9-867y-3yfb |
|
| 264 |
| url |
VCID-u3j5-uw7s-qkcx |
| vulnerability_id |
VCID-u3j5-uw7s-qkcx |
| summary |
kernel: Linux kernel CXL driver: Use-after-free vulnerability leading to system instability or privilege escalation |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53479 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01854 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01866 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01868 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01871 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01884 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0187 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01849 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0183 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01829 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01914 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01908 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01904 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53479 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53479
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-u3j5-uw7s-qkcx |
|
| 265 |
| url |
VCID-u8ef-d4s5-v7g2 |
| vulnerability_id |
VCID-u8ef-d4s5-v7g2 |
| summary |
kernel: Bluetooth: Fix race condition in hci_cmd_sync_clear |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53046 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11478 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11537 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11322 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11404 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11463 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11469 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11435 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11407 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11269 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.1127 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11397 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11339 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11295 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53046 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53046
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-u8ef-d4s5-v7g2 |
|
| 266 |
| url |
VCID-uakf-nme4-nufu |
| vulnerability_id |
VCID-uakf-nme4-nufu |
| summary |
kernel: use-after-free in net/atm/ioctl.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-51780 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05826 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05861 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05855 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05893 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05924 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05903 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05886 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.0585 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05862 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.06015 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.06046 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.06081 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-51780 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-51780
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-uakf-nme4-nufu |
|
| 267 |
| url |
VCID-uf3m-4erx-zyfa |
| vulnerability_id |
VCID-uf3m-4erx-zyfa |
| summary |
kernel: Bluetooth BR/EDR PIN Pairing procedure is vulnerable to an impersonation attack |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-26555 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00214 |
| scoring_system |
epss |
| scoring_elements |
0.43952 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44678 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44699 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44636 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44687 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44689 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44706 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44675 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44676 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44731 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44723 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44572 |
| published_at |
2026-04-26T12:55:00Z |
|
| 12 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44597 |
| published_at |
2026-04-01T12:55:00Z |
|
| 13 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44568 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-26555 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-26555
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-uf3m-4erx-zyfa |
|
| 268 |
| url |
VCID-ujj7-y251-9bfs |
| vulnerability_id |
VCID-ujj7-y251-9bfs |
| summary |
kernel: ovl: fix warning in ovl_create_real() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47579 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03477 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03521 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03593 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03496 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03471 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03444 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03456 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.0358 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03587 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03535 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03545 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03546 |
| published_at |
2026-04-08T12:55:00Z |
|
| 12 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03569 |
| published_at |
2026-04-09T12:55:00Z |
|
| 13 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03525 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47579 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-47579
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ujj7-y251-9bfs |
|
| 269 |
| url |
VCID-upx2-tk53-pyb1 |
| vulnerability_id |
VCID-upx2-tk53-pyb1 |
| summary |
kernel: RDMA/srpt: Add a check for valid 'mad_agent' pointer |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54274 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10793 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54274 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54274
|
| risk_score |
2.6 |
| exploitability |
0.5 |
| weighted_severity |
5.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-upx2-tk53-pyb1 |
|
| 270 |
| url |
VCID-uv78-72se-9uaw |
| vulnerability_id |
VCID-uv78-72se-9uaw |
| summary |
kernel: scsi: target: iscsit: Free cmds before session free |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54184 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10793 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54184 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54184
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-uv78-72se-9uaw |
|
| 271 |
| url |
VCID-v17r-42dr-qybs |
| vulnerability_id |
VCID-v17r-42dr-qybs |
| summary |
kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-0565 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.21863 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22073 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22071 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22064 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22017 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.21875 |
| published_at |
2026-04-24T12:55:00Z |
|
| 6 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22187 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22236 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22019 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22099 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22154 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22173 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22133 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-0565 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
| 110 |
|
| 111 |
|
| 112 |
|
| 113 |
|
| 114 |
|
| 115 |
|
| 116 |
|
| 117 |
|
| 118 |
|
| 119 |
|
| 120 |
|
| 121 |
|
| 122 |
|
| 123 |
|
| 124 |
|
| 125 |
|
| 126 |
|
| 127 |
|
| 128 |
|
| 129 |
|
| 130 |
|
| 131 |
|
| 132 |
|
| 133 |
|
| 134 |
|
| 135 |
|
| 136 |
|
| 137 |
|
| 138 |
|
| 139 |
|
| 140 |
|
| 141 |
|
| 142 |
|
| 143 |
|
| 144 |
|
| 145 |
|
| 146 |
|
| 147 |
|
| 148 |
|
| 149 |
|
| 150 |
|
| 151 |
|
| 152 |
|
| 153 |
|
| 154 |
|
| 155 |
|
| 156 |
|
| 157 |
|
| 158 |
|
| 159 |
|
| 160 |
|
| 161 |
|
| 162 |
|
| 163 |
|
| 164 |
|
| 165 |
|
| 166 |
|
| 167 |
|
| 168 |
|
| 169 |
|
| 170 |
|
| 171 |
|
| 172 |
|
| 173 |
|
| 174 |
|
| 175 |
|
| 176 |
|
| 177 |
|
| 178 |
|
| 179 |
|
| 180 |
|
| 181 |
|
| 182 |
|
| 183 |
|
| 184 |
|
| 185 |
|
| 186 |
|
| 187 |
|
| 188 |
|
| 189 |
|
| 190 |
|
| 191 |
|
| 192 |
|
| 193 |
|
| 194 |
|
| 195 |
|
| 196 |
|
| 197 |
|
| 198 |
|
| 199 |
|
| 200 |
|
| 201 |
|
| 202 |
|
| 203 |
|
| 204 |
|
| 205 |
|
| 206 |
|
| 207 |
|
| 208 |
|
| 209 |
|
| 210 |
|
| 211 |
|
| 212 |
|
| 213 |
|
| 214 |
|
| 215 |
|
| 216 |
|
| 217 |
|
| 218 |
|
| 219 |
|
| 220 |
|
| 221 |
|
| 222 |
|
| 223 |
|
| 224 |
|
| 225 |
|
| 226 |
|
| 227 |
|
| 228 |
|
| 229 |
|
| 230 |
|
| 231 |
|
| 232 |
|
| 233 |
|
| 234 |
|
| 235 |
|
| 236 |
|
| 237 |
|
| 238 |
|
| 239 |
|
| 240 |
|
| 241 |
|
| 242 |
|
| 243 |
|
| 244 |
|
| 245 |
|
| 246 |
|
| 247 |
|
| 248 |
|
| 249 |
|
| 250 |
|
| 251 |
|
| 252 |
|
| 253 |
|
| 254 |
|
| 255 |
|
| 256 |
|
| 257 |
|
| 258 |
|
| 259 |
|
| 260 |
|
| 261 |
|
| 262 |
|
| 263 |
|
| 264 |
|
| 265 |
|
| 266 |
|
| 267 |
|
| 268 |
|
| 269 |
|
| 270 |
|
| 271 |
|
| 272 |
|
| 273 |
|
| 274 |
|
| 275 |
|
| 276 |
|
| 277 |
|
| 278 |
|
| 279 |
|
| 280 |
|
| 281 |
|
| 282 |
|
| 283 |
|
| 284 |
|
| 285 |
|
| 286 |
|
| 287 |
|
| 288 |
|
| 289 |
|
| 290 |
|
| 291 |
|
| 292 |
|
| 293 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-0565
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-v17r-42dr-qybs |
|
| 272 |
| url |
VCID-v21t-t2w9-1uhd |
| vulnerability_id |
VCID-v21t-t2w9-1uhd |
| summary |
kernel: smb: client: fix missed ses refcounting |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54076 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07747 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07792 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07749 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07809 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07826 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07821 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07684 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07837 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07808 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07794 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07708 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10479 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54076 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54076
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-v21t-t2w9-1uhd |
|
| 273 |
| url |
VCID-v45t-qe34-1fcs |
| vulnerability_id |
VCID-v45t-qe34-1fcs |
| summary |
kernel: drm/amdgpu: Fix sdma v4 sw fini error |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53547 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01826 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01838 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0184 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01843 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01857 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01844 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01829 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01824 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01807 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01806 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01887 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0188 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01876 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53547 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53547
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-v45t-qe34-1fcs |
|
| 274 |
| url |
VCID-v9uq-1unx-mug6 |
| vulnerability_id |
VCID-v9uq-1unx-mug6 |
| summary |
kernel: bpf: cpumap: Fix memory leak in cpu_map_update_elem |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53441 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03188 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03198 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03201 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03205 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03231 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03185 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03158 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03142 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04397 |
| published_at |
2026-04-26T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04227 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04236 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04362 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04377 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53441 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53441
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-v9uq-1unx-mug6 |
|
| 275 |
| url |
VCID-vfd1-kh99-tudr |
| vulnerability_id |
VCID-vfd1-kh99-tudr |
| summary |
kernel: bpf: Make bpf_refcount_acquire fallible for non-owning refs |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53645 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04774 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04797 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04812 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04846 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04857 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04844 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04821 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04801 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04753 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04762 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04907 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04941 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04979 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53645 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53645
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vfd1-kh99-tudr |
|
| 276 |
| url |
VCID-vjme-nqpq-j7f2 |
| vulnerability_id |
VCID-vjme-nqpq-j7f2 |
| summary |
kernel: wifi: cfg80211: ocb: don't leave if not joined |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53992 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0684 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06822 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06874 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06907 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.069 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06793 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06956 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06938 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06893 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06888 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0683 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06811 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09303 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53992 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53992
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vjme-nqpq-j7f2 |
|
| 277 |
| url |
VCID-vjuw-dju4-97cj |
| vulnerability_id |
VCID-vjuw-dju4-97cj |
| summary |
kernel: netfilter: xtables sctp out-of-bounds read in match_flags() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39193 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00821 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00693 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00672 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00666 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0067 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00819 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0082 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00685 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00687 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00679 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39193 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-39193
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vjuw-dju4-97cj |
|
| 278 |
| url |
VCID-vn5d-yd75-u7a7 |
| vulnerability_id |
VCID-vn5d-yd75-u7a7 |
| summary |
kernel: KVM: nSVM: Check instead of asserting on nested TSC scaling support |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53663 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01826 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01838 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0184 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01843 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01857 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01844 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01829 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01824 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01807 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01806 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01887 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0188 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01876 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53663 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53663
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vn5d-yd75-u7a7 |
|
| 279 |
| url |
VCID-vqmu-xn3y-e3gc |
| vulnerability_id |
VCID-vqmu-xn3y-e3gc |
| summary |
kernel: io_uring/net: don't overflow multishot recv |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54030 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07747 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07792 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07749 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07809 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07826 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07821 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07684 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07837 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07808 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07794 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07708 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10479 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54030 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54030
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vqmu-xn3y-e3gc |
|
| 280 |
| url |
VCID-vtu4-ahaf-yyeq |
| vulnerability_id |
VCID-vtu4-ahaf-yyeq |
| summary |
kernel: Linux kernel: Denial of Service in netfilter due to improper garbage collection |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53304 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02951 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02965 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02975 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02973 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0296 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04185 |
| published_at |
2026-04-26T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04056 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0403 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04019 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04031 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04154 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04166 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53304 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53304
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vtu4-ahaf-yyeq |
|
| 281 |
| url |
VCID-w45g-34es-13hj |
| vulnerability_id |
VCID-w45g-34es-13hj |
| summary |
kernel: dm: don't attempt to queue IO under RCU protection |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53860 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06793 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0684 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06822 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06874 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06907 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09299 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09349 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09303 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09273 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09259 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09152 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09144 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53860 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53860
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-w45g-34es-13hj |
|
| 282 |
| url |
VCID-w8cj-cmm9-kbbq |
| vulnerability_id |
VCID-w8cj-cmm9-kbbq |
| summary |
kernel: drm/amd/display: populate subvp cmd info only for the top pipe |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53806 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06793 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0684 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06822 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06874 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06907 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09299 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09349 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09303 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09273 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09259 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09152 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09144 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53806 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53806
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-w8cj-cmm9-kbbq |
|
| 283 |
| url |
VCID-wmdx-p5fr-yqe4 |
| vulnerability_id |
VCID-wmdx-p5fr-yqe4 |
| summary |
kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-6931 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00437 |
| scoring_system |
epss |
| scoring_elements |
0.62987 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00437 |
| scoring_system |
epss |
| scoring_elements |
0.63016 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00437 |
| scoring_system |
epss |
| scoring_elements |
0.6298 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00437 |
| scoring_system |
epss |
| scoring_elements |
0.63031 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00437 |
| scoring_system |
epss |
| scoring_elements |
0.63047 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00437 |
| scoring_system |
epss |
| scoring_elements |
0.63064 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00437 |
| scoring_system |
epss |
| scoring_elements |
0.6305 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00437 |
| scoring_system |
epss |
| scoring_elements |
0.63028 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00437 |
| scoring_system |
epss |
| scoring_elements |
0.63072 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00437 |
| scoring_system |
epss |
| scoring_elements |
0.63071 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00437 |
| scoring_system |
epss |
| scoring_elements |
0.63085 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-6931 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-6931
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wmdx-p5fr-yqe4 |
|
| 284 |
| url |
VCID-wrhr-cgd4-4ycs |
| vulnerability_id |
VCID-wrhr-cgd4-4ycs |
| summary |
kernel: USB: usbtmc: Fix direction for 0-length ioctl control messages |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53761 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14383 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14384 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14454 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14487 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14484 |
| published_at |
2026-04-26T12:55:00Z |
|
| 9 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14628 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14588 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14549 |
| published_at |
2026-04-12T12:55:00Z |
|
| 12 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14491 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53761 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53761
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wrhr-cgd4-4ycs |
|
| 285 |
| url |
VCID-wvyb-y46r-rub3 |
| vulnerability_id |
VCID-wvyb-y46r-rub3 |
| summary |
kernel: irdma: Improper access control |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-25775 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00584 |
| scoring_system |
epss |
| scoring_elements |
0.6896 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00584 |
| scoring_system |
epss |
| scoring_elements |
0.6898 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00584 |
| scoring_system |
epss |
| scoring_elements |
0.6901 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00584 |
| scoring_system |
epss |
| scoring_elements |
0.6903 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00584 |
| scoring_system |
epss |
| scoring_elements |
0.69051 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00584 |
| scoring_system |
epss |
| scoring_elements |
0.69037 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00584 |
| scoring_system |
epss |
| scoring_elements |
0.69008 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00584 |
| scoring_system |
epss |
| scoring_elements |
0.69048 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00584 |
| scoring_system |
epss |
| scoring_elements |
0.69057 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00584 |
| scoring_system |
epss |
| scoring_elements |
0.69088 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00584 |
| scoring_system |
epss |
| scoring_elements |
0.69096 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-25775 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-25775
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wvyb-y46r-rub3 |
|
| 286 |
| url |
VCID-wzkx-7sxx-77dr |
| vulnerability_id |
VCID-wzkx-7sxx-77dr |
| summary |
kernel: bpf: Address KCSAN report on bpf_lru_list |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54283 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10793 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54283 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54283
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wzkx-7sxx-77dr |
|
| 287 |
| url |
VCID-x4y4-hx2m-3qd3 |
| vulnerability_id |
VCID-x4y4-hx2m-3qd3 |
| summary |
kernel: net: fix UAF issue in nfqnl_nf_hook_drop() when ops_init() failed |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50780 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14484 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50780 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50780
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x4y4-hx2m-3qd3 |
|
| 288 |
| url |
VCID-x531-vx5g-eqe1 |
| vulnerability_id |
VCID-x531-vx5g-eqe1 |
| summary |
kernel: drm/ttm: check null pointer before accessing when swapping |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53352 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02895 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0291 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02945 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0292 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02919 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02915 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04128 |
| published_at |
2026-04-26T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03977 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0396 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03972 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04097 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0411 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53352 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53352
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x531-vx5g-eqe1 |
|
| 289 |
| url |
VCID-x537-rrdc-1qav |
| vulnerability_id |
VCID-x537-rrdc-1qav |
| summary |
kernel: Linux kernel igb driver: Denial of Service due to improper SR-IOV cleanup |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54070 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07747 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07792 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07749 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07809 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07826 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07821 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07684 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07837 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07808 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07794 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07708 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10479 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54070 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54070
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x537-rrdc-1qav |
|
| 290 |
| url |
VCID-xaur-udbk-27cs |
| vulnerability_id |
VCID-xaur-udbk-27cs |
| summary |
kernel: drm/amdgpu: install stub fence into potential unused fence pointers |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53248 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03638 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03664 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03654 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03667 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03688 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04176 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0423 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04207 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04185 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04312 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04329 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04349 |
| published_at |
2026-04-26T12:55:00Z |
|
| 12 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04245 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53248 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53248
|
| risk_score |
2.7 |
| exploitability |
0.5 |
| weighted_severity |
5.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xaur-udbk-27cs |
|
| 291 |
| url |
VCID-xbbm-hkmg-f3fm |
| vulnerability_id |
VCID-xbbm-hkmg-f3fm |
| summary |
kernel: ext4: improve error handling from ext4_dirhash() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53473 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03045 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03059 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03062 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03087 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03049 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03025 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03017 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02993 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03001 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03122 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03119 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03109 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53473 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53473
|
| risk_score |
2.7 |
| exploitability |
0.5 |
| weighted_severity |
5.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xbbm-hkmg-f3fm |
|
| 292 |
| url |
VCID-xd76-s5yw-fyaq |
| vulnerability_id |
VCID-xd76-s5yw-fyaq |
| summary |
kernel: drm/amdgpu: unmap and remove csa_va properly |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53545 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03921 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0393 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03942 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03948 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03971 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03939 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03922 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03893 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03872 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03883 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04004 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04016 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04022 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53545 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53545
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xd76-s5yw-fyaq |
|
| 293 |
| url |
VCID-xewe-3q5z-wbfg |
| vulnerability_id |
VCID-xewe-3q5z-wbfg |
| summary |
kernel: PM: domains: fix memory leak with using debugfs_lookup() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53202 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04603 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04627 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04639 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04673 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04685 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05697 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05732 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05768 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05594 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05584 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05576 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05524 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05533 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53202 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53202
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xewe-3q5z-wbfg |
|
| 294 |
| url |
VCID-xhsu-dqfq-3fev |
| vulnerability_id |
VCID-xhsu-dqfq-3fev |
| summary |
kernel: Linux kernel (CIFS): Use-after-free vulnerability allows data integrity compromise and denial of service |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53751 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07372 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07427 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07346 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0739 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09883 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09858 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10007 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10037 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10017 |
| published_at |
2026-04-26T12:55:00Z |
|
| 9 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10049 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10071 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.1003 |
| published_at |
2026-04-12T12:55:00Z |
|
| 12 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10009 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53751 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53751
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xhsu-dqfq-3fev |
|
| 295 |
| url |
VCID-xpyd-juuc-5kf6 |
| vulnerability_id |
VCID-xpyd-juuc-5kf6 |
| summary |
kernel: drm/i915: Fix memory leaks in i915 selftests |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53677 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04741 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04764 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04779 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04812 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04825 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0479 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0477 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04723 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04731 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04875 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04912 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04951 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53677 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53677
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xpyd-juuc-5kf6 |
|
| 296 |
| url |
VCID-xrva-admv-ufh2 |
| vulnerability_id |
VCID-xrva-admv-ufh2 |
| summary |
kernel: hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49011 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00554 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00572 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00545 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00542 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00537 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00539 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00536 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00534 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00538 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00574 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0057 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00546 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49011 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49011
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xrva-admv-ufh2 |
|
| 297 |
| url |
VCID-xtez-b58n-yydw |
| vulnerability_id |
VCID-xtez-b58n-yydw |
| summary |
kernel: drm/i915/perf: add sentinel to xehp_oa_b_counters |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53646 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04774 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04797 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04812 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04846 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04857 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04844 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04821 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04801 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04753 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04762 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04907 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04941 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04979 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53646 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53646
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xtez-b58n-yydw |
|
| 298 |
| url |
VCID-xuhu-rkfu-z7cg |
| vulnerability_id |
VCID-xuhu-rkfu-z7cg |
| summary |
kernel: Linux kernel: Denial of Service due to file descriptor leak in BPF sample code |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53290 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02951 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02965 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02975 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02973 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0296 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04185 |
| published_at |
2026-04-26T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04056 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0403 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04019 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04031 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04154 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04166 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53290 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53290
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xuhu-rkfu-z7cg |
|
| 299 |
| url |
VCID-xwba-habm-vyfy |
| vulnerability_id |
VCID-xwba-habm-vyfy |
| summary |
kernel: Linux kernel (ext4): Denial of Service due to inode leak via failed extended attribute creation |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50845 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10793 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50845 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50845
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xwba-habm-vyfy |
|
| 300 |
| url |
VCID-xxt8-8mp7-ckfm |
| vulnerability_id |
VCID-xxt8-8mp7-ckfm |
| summary |
kernel: Linux kernel: Denial of service in network core via incorrect frame size handling |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54155 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07346 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0739 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07372 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07427 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07451 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07437 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07456 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07417 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07424 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07413 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07341 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07329 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10017 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54155 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54155
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xxt8-8mp7-ckfm |
|
| 301 |
| url |
VCID-y146-vvyc-u7cc |
| vulnerability_id |
VCID-y146-vvyc-u7cc |
| summary |
kernel: net: fix UaF in netns ops registration error path |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52999 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07882 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07909 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07929 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07886 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07944 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07964 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07953 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07936 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07922 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07839 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07823 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07982 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07942 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52999 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-52999
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-y146-vvyc-u7cc |
|
| 302 |
| url |
VCID-y2ar-gv45-67dr |
| vulnerability_id |
VCID-y2ar-gv45-67dr |
| summary |
kernel: Bluetooth: use RCU for hci_conn_params and iterate safely in hci_sync |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53252 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01854 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01868 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01866 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01871 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01884 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02509 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02499 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02494 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02606 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.0251 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02592 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02582 |
| published_at |
2026-04-26T12:55:00Z |
|
| 12 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02521 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53252 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53252
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-y2ar-gv45-67dr |
|
| 303 |
| url |
VCID-y3xe-hy5b-3qhp |
| vulnerability_id |
VCID-y3xe-hy5b-3qhp |
| summary |
kernel: intel: Fix NULL pointer dereference issue in upi_fill_topology() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52450 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0324 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03288 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03167 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03177 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03298 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0329 |
| published_at |
2026-04-24T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0325 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03257 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03263 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03284 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03242 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03215 |
| published_at |
2026-04-12T12:55:00Z |
|
| 12 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03194 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52450 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-52450
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-y3xe-hy5b-3qhp |
|
| 304 |
| url |
VCID-y52h-54a6-m3a8 |
| vulnerability_id |
VCID-y52h-54a6-m3a8 |
| summary |
kernel: mm/MADV_COLLAPSE: catch !none !huge !bad pmd lookups |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52934 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05477 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05512 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05513 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05548 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05569 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05544 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05531 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05524 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05475 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05485 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05648 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05682 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05718 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52934 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-52934
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-y52h-54a6-m3a8 |
|
| 305 |
| url |
VCID-y5ds-5mpf-u3hz |
| vulnerability_id |
VCID-y5ds-5mpf-u3hz |
| summary |
kernel: ext4: avoid deadlock in fs reclaim with page writeback |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53149 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01623 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01624 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01631 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01617 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.01978 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02064 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02048 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02043 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02016 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02002 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.01998 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.01976 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53149 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53149
|
| risk_score |
2.6 |
| exploitability |
0.5 |
| weighted_severity |
5.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-y5ds-5mpf-u3hz |
|
| 306 |
| url |
VCID-y5g5-grqv-cbhv |
| vulnerability_id |
VCID-y5g5-grqv-cbhv |
| summary |
kernel: NVMe: info leak due to out-of-bounds read in nvmet_ctrl_find_get |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-6121 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00252 |
| scoring_system |
epss |
| scoring_elements |
0.4856 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00252 |
| scoring_system |
epss |
| scoring_elements |
0.4853 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00252 |
| scoring_system |
epss |
| scoring_elements |
0.48612 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00252 |
| scoring_system |
epss |
| scoring_elements |
0.48607 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00252 |
| scoring_system |
epss |
| scoring_elements |
0.48565 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.00252 |
| scoring_system |
epss |
| scoring_elements |
0.48553 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00252 |
| scoring_system |
epss |
| scoring_elements |
0.48504 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00252 |
| scoring_system |
epss |
| scoring_elements |
0.48559 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00252 |
| scoring_system |
epss |
| scoring_elements |
0.48555 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00252 |
| scoring_system |
epss |
| scoring_elements |
0.48576 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00252 |
| scoring_system |
epss |
| scoring_elements |
0.48549 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00252 |
| scoring_system |
epss |
| scoring_elements |
0.48562 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-6121 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-6121
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-y5g5-grqv-cbhv |
|
| 307 |
| url |
VCID-y6kd-c3u5-v3h6 |
| vulnerability_id |
VCID-y6kd-c3u5-v3h6 |
| summary |
kernel: blk-crypto: make blk_crypto_evict_key() more robust |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53536 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03107 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0312 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03125 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0315 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03109 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03083 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0307 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03045 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03054 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03172 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03175 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03168 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53536 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53536
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-y6kd-c3u5-v3h6 |
|
| 308 |
| url |
VCID-y7h4-s9p8-d3hd |
| vulnerability_id |
VCID-y7h4-s9p8-d3hd |
| summary |
kernel: scsi: qla2xxx: Fix potential NULL pointer dereference |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53451 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02951 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02965 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02973 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02975 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0296 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02937 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02927 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02902 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02912 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03029 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03027 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03016 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53451 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53451
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-y7h4-s9p8-d3hd |
|
| 309 |
| url |
VCID-yaps-gywk-auaf |
| vulnerability_id |
VCID-yaps-gywk-auaf |
| summary |
kernel: blk-mq: fix IO hang from sbitmap wakeup race |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26671 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.01022 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00978 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00983 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00979 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00964 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00958 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00955 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00962 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.01017 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.01018 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0097 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26671 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
| 110 |
|
| 111 |
|
| 112 |
|
| 113 |
|
| 114 |
|
| 115 |
|
| 116 |
|
| 117 |
|
| 118 |
|
| 119 |
|
| 120 |
|
| 121 |
|
| 122 |
|
| 123 |
|
| 124 |
|
| 125 |
|
| 126 |
|
| 127 |
|
| 128 |
|
| 129 |
|
| 130 |
|
| 131 |
|
| 132 |
|
| 133 |
|
| 134 |
|
| 135 |
|
| 136 |
|
| 137 |
|
| 138 |
|
| 139 |
|
| 140 |
|
| 141 |
|
| 142 |
|
| 143 |
|
| 144 |
|
| 145 |
|
| 146 |
|
| 147 |
|
| 148 |
|
| 149 |
|
| 150 |
|
| 151 |
|
| 152 |
|
| 153 |
|
| 154 |
|
| 155 |
|
| 156 |
|
| 157 |
|
| 158 |
|
| 159 |
|
| 160 |
|
| 161 |
|
| 162 |
|
| 163 |
|
| 164 |
|
| 165 |
|
| 166 |
|
| 167 |
|
| 168 |
|
| 169 |
|
| 170 |
|
| 171 |
|
| 172 |
|
| 173 |
|
| 174 |
|
| 175 |
|
| 176 |
|
| 177 |
|
| 178 |
|
| 179 |
|
| 180 |
|
| 181 |
|
| 182 |
|
| 183 |
|
| 184 |
|
| 185 |
|
| 186 |
|
| 187 |
|
| 188 |
|
| 189 |
|
| 190 |
|
| 191 |
|
| 192 |
|
| 193 |
|
| 194 |
|
| 195 |
|
| 196 |
|
| 197 |
|
| 198 |
|
| 199 |
|
| 200 |
|
| 201 |
|
| 202 |
|
| 203 |
|
| 204 |
|
| 205 |
|
| 206 |
|
| 207 |
|
| 208 |
|
| 209 |
|
| 210 |
|
| 211 |
|
| 212 |
|
| 213 |
|
| 214 |
|
| 215 |
|
| 216 |
|
| 217 |
|
| 218 |
|
| 219 |
|
| 220 |
|
| 221 |
|
| 222 |
|
| 223 |
|
| 224 |
|
| 225 |
|
| 226 |
|
| 227 |
|
| 228 |
|
| 229 |
|
| 230 |
|
| 231 |
|
| 232 |
|
| 233 |
|
| 234 |
|
| 235 |
|
| 236 |
|
| 237 |
|
| 238 |
|
| 239 |
|
| 240 |
|
| 241 |
|
| 242 |
|
| 243 |
|
| 244 |
|
| 245 |
|
| 246 |
|
| 247 |
|
| 248 |
|
| 249 |
|
| 250 |
|
| 251 |
|
| 252 |
|
| 253 |
|
| 254 |
|
| 255 |
|
| 256 |
|
| 257 |
|
| 258 |
|
| 259 |
|
| 260 |
|
| 261 |
|
| 262 |
|
| 263 |
|
| 264 |
|
| 265 |
|
| 266 |
|
| 267 |
|
| 268 |
|
| 269 |
|
| 270 |
|
| 271 |
|
| 272 |
|
| 273 |
|
| 274 |
|
| 275 |
|
| 276 |
|
| 277 |
|
| 278 |
|
| 279 |
|
| 280 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-26671
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yaps-gywk-auaf |
|
| 310 |
| url |
VCID-yb31-7rha-kua2 |
| vulnerability_id |
VCID-yb31-7rha-kua2 |
| summary |
kernel: mm/uffd: fix pte marker when fork() without fork event |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49744 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.2241 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22456 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22244 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22327 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22382 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22402 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22361 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22302 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22318 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22312 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.2226 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22111 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22099 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49744 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49744
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yb31-7rha-kua2 |
|
| 311 |
| url |
VCID-ydwn-b6qe-c3fj |
| vulnerability_id |
VCID-ydwn-b6qe-c3fj |
| summary |
kernel: irqchip/ti-sci: Fix refcount leak in ti_sci_intr_irq_domain_probe |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53164 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02951 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02965 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02973 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02975 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04154 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04166 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04185 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04067 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04056 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0403 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04019 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04031 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53164 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53164
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ydwn-b6qe-c3fj |
|
| 312 |
| url |
VCID-ykfr-gyv1-73gd |
| vulnerability_id |
VCID-ykfr-gyv1-73gd |
| summary |
kernel: tee: add overflow check in register_shm_helper() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50080 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06259 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06275 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06321 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06361 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06353 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06298 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06348 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06337 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19455 |
| published_at |
2026-04-26T12:55:00Z |
|
| 9 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19553 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.1956 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19573 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19468 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50080 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50080
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ykfr-gyv1-73gd |
|
| 313 |
| url |
VCID-yq98-krmu-j3hb |
| vulnerability_id |
VCID-yq98-krmu-j3hb |
| summary |
kernel: bpf: reject unhashed sockets in bpf_sk_assign |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53585 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02951 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02965 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02973 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02975 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0296 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02937 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02927 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02902 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02912 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03029 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03027 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03016 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53585 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53585
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yq98-krmu-j3hb |
|
| 314 |
| url |
VCID-ytjs-9bm9-jfbu |
| vulnerability_id |
VCID-ytjs-9bm9-jfbu |
| summary |
kernel: Linux kernel: md/raid10 soft lockup due to unlimited plugged bio |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53151 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01539 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01542 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01546 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0155 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01556 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01472 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01466 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01467 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01456 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01471 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01558 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01566 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01564 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53151 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53151
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ytjs-9bm9-jfbu |
|
| 315 |
| url |
VCID-ytxq-fc9h-vyfu |
| vulnerability_id |
VCID-ytxq-fc9h-vyfu |
| summary |
kernel: netfilter: nf_tables: fix underflow in chain reference counter |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54035 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06793 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0684 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06822 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06874 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06907 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.069 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06956 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06938 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06893 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06888 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0683 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06811 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09303 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54035 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54035
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ytxq-fc9h-vyfu |
|
| 316 |
| url |
VCID-yuk9-xu8a-tybr |
| vulnerability_id |
VCID-yuk9-xu8a-tybr |
| summary |
kernel: drm: Don't unref the same fb many times by mistake due to deadlock handling |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52486 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00409 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0042 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00408 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00402 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00399 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.004 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00396 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00394 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00389 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00393 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00419 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52486 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
| 110 |
|
| 111 |
|
| 112 |
|
| 113 |
|
| 114 |
|
| 115 |
|
| 116 |
|
| 117 |
|
| 118 |
|
| 119 |
|
| 120 |
|
| 121 |
|
| 122 |
|
| 123 |
|
| 124 |
|
| 125 |
|
| 126 |
|
| 127 |
|
| 128 |
|
| 129 |
|
| 130 |
|
| 131 |
|
| 132 |
|
| 133 |
|
| 134 |
|
| 135 |
|
| 136 |
|
| 137 |
|
| 138 |
|
| 139 |
|
| 140 |
|
| 141 |
|
| 142 |
|
| 143 |
|
| 144 |
|
| 145 |
|
| 146 |
|
| 147 |
|
| 148 |
|
| 149 |
|
| 150 |
|
| 151 |
|
| 152 |
|
| 153 |
|
| 154 |
|
| 155 |
|
| 156 |
|
| 157 |
|
| 158 |
|
| 159 |
|
| 160 |
|
| 161 |
|
| 162 |
|
| 163 |
|
| 164 |
|
| 165 |
|
| 166 |
|
| 167 |
|
| 168 |
|
| 169 |
|
| 170 |
|
| 171 |
|
| 172 |
|
| 173 |
|
| 174 |
|
| 175 |
|
| 176 |
|
| 177 |
|
| 178 |
|
| 179 |
|
| 180 |
|
| 181 |
|
| 182 |
|
| 183 |
|
| 184 |
|
| 185 |
|
| 186 |
|
| 187 |
|
| 188 |
|
| 189 |
|
| 190 |
|
| 191 |
|
| 192 |
|
| 193 |
|
| 194 |
|
| 195 |
|
| 196 |
|
| 197 |
|
| 198 |
|
| 199 |
|
| 200 |
|
| 201 |
|
| 202 |
|
| 203 |
|
| 204 |
|
| 205 |
|
| 206 |
|
| 207 |
|
| 208 |
|
| 209 |
|
| 210 |
|
| 211 |
|
| 212 |
|
| 213 |
|
| 214 |
|
| 215 |
|
| 216 |
|
| 217 |
|
| 218 |
|
| 219 |
|
| 220 |
|
| 221 |
|
| 222 |
|
| 223 |
|
| 224 |
|
| 225 |
|
| 226 |
|
| 227 |
|
| 228 |
|
| 229 |
|
| 230 |
|
| 231 |
|
| 232 |
|
| 233 |
|
| 234 |
|
| 235 |
|
| 236 |
|
| 237 |
|
| 238 |
|
| 239 |
|
| 240 |
|
| 241 |
|
| 242 |
|
| 243 |
|
| 244 |
|
| 245 |
|
| 246 |
|
| 247 |
|
| 248 |
|
| 249 |
|
| 250 |
|
| 251 |
|
| 252 |
|
| 253 |
|
| 254 |
|
| 255 |
|
| 256 |
|
| 257 |
|
| 258 |
|
| 259 |
|
| 260 |
|
| 261 |
|
| 262 |
|
| 263 |
|
| 264 |
|
| 265 |
|
| 266 |
|
| 267 |
|
| 268 |
|
| 269 |
|
| 270 |
|
| 271 |
|
| 272 |
|
| 273 |
|
| 274 |
|
| 275 |
|
| 276 |
|
| 277 |
|
| 278 |
|
| 279 |
|
| 280 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-52486
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yuk9-xu8a-tybr |
|
| 317 |
| url |
VCID-yxeb-ww1y-yfg6 |
| vulnerability_id |
VCID-yxeb-ww1y-yfg6 |
| summary |
kernel: wifi: nl80211: fix integer overflow in nl80211_parse_mbssid_elems() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53570 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01854 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01866 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01868 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01871 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01884 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0187 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01849 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0183 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01829 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01914 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01908 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01904 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53570 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53570
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yxeb-ww1y-yfg6 |
|
| 318 |
| url |
VCID-z5fj-v93t-1ff2 |
| vulnerability_id |
VCID-z5fj-v93t-1ff2 |
| summary |
kernel: RDMA/irdma: Fix data race on CQP completion stats |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54302 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07346 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0739 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07372 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07427 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07451 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07437 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07424 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07413 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07341 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07329 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07456 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07417 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07408 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54302 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54302
|
| risk_score |
2.6 |
| exploitability |
0.5 |
| weighted_severity |
5.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-z5fj-v93t-1ff2 |
|
| 319 |
| url |
VCID-z5te-8evk-73ds |
| vulnerability_id |
VCID-z5te-8evk-73ds |
| summary |
kernel: drm: bridge: dw_hdmi: fix connector access for scdc |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53784 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07747 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07792 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07749 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07809 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07826 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10496 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10481 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10479 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10572 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10539 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10517 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10384 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10368 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53784 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53784
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-z5te-8evk-73ds |
|
| 320 |
| url |
VCID-z6t2-t5hv-a7hg |
| vulnerability_id |
VCID-z6t2-t5hv-a7hg |
| summary |
kernel: scsi: qla2xxx: Remove unused nvme_ls_waitq wait queue |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53280 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02807 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02821 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02853 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02832 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02829 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02822 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04028 |
| published_at |
2026-04-26T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0393 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.039 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0388 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0389 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04011 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04021 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53280 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53280
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-z6t2-t5hv-a7hg |
|
| 321 |
| url |
VCID-z8sz-3h8h-nkbu |
| vulnerability_id |
VCID-z8sz-3h8h-nkbu |
| summary |
kernel: ring-buffer: Handle race between rb_move_tail and rb_check_pages |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53709 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08409 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08461 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08382 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08453 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08471 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08465 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08445 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.0843 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08323 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08306 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08433 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08397 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53709 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53709
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-z8sz-3h8h-nkbu |
|
| 322 |
| url |
VCID-zdee-dnta-kubb |
| vulnerability_id |
VCID-zdee-dnta-kubb |
| summary |
kernel: firmware: arm_sdei: Fix sleep from invalid context BUG |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54160 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14484 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54160 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54160
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zdee-dnta-kubb |
|
| 323 |
| url |
VCID-zfcy-q38c-ykhx |
| vulnerability_id |
VCID-zfcy-q38c-ykhx |
| summary |
kernel: ip6mr: Fix skb_under_panic in ip6mr_cache_report() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53365 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02951 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02937 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0296 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02975 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02965 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02973 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04185 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0403 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04019 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04031 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04154 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04166 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53365 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53365
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zfcy-q38c-ykhx |
|
| 324 |
| url |
VCID-zfgx-3auq-b3f5 |
| vulnerability_id |
VCID-zfgx-3auq-b3f5 |
| summary |
kernel: ext4: fix BUG in ext4_mb_new_inode_pa() due to overflow |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54069 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14484 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54069 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54069
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zfgx-3auq-b3f5 |
|
| 325 |
| url |
VCID-zghp-5uyq-n7hz |
| vulnerability_id |
VCID-zghp-5uyq-n7hz |
| summary |
kernel: bpf: Disable preemption in bpf_perf_event_output |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54303 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06793 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0684 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06822 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06874 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06907 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.069 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06893 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06888 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0683 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06811 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06956 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06938 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06942 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54303 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54303
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zghp-5uyq-n7hz |
|
| 326 |
| url |
VCID-zgsp-6tr3-j7dk |
| vulnerability_id |
VCID-zgsp-6tr3-j7dk |
| summary |
kernel: Linux kernel Wi-Fi driver: Denial of Service due to missing transmit status |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54052 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07346 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0739 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07372 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07427 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07451 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07437 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07456 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07417 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07424 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07413 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07341 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07329 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10017 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54052 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54052
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zgsp-6tr3-j7dk |
|
| 327 |
| url |
VCID-zhhm-x29t-c3gg |
| vulnerability_id |
VCID-zhhm-x29t-c3gg |
| summary |
kernel: netfilter: nftables out-of-bounds read in nf_osf_match_one() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39189 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00813 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00816 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0082 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00817 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00808 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00802 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00803 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00807 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00999 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.01 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.01004 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39189 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-39189
|
| risk_score |
2.3 |
| exploitability |
0.5 |
| weighted_severity |
4.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zhhm-x29t-c3gg |
|
| 328 |
| url |
VCID-zmmm-mp7d-rbga |
| vulnerability_id |
VCID-zmmm-mp7d-rbga |
| summary |
kernel: rcu: Avoid stack overflow due to __rcu_irq_enter_check_tick() being kprobe-ed |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53655 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02002 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02011 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02008 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.0201 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02027 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02009 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.01995 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.0199 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.01968 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.0197 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02054 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02039 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02034 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53655 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53655
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zmmm-mp7d-rbga |
|
| 329 |
| url |
VCID-znzg-71sh-ufe9 |
| vulnerability_id |
VCID-znzg-71sh-ufe9 |
| summary |
kernel: Bluetooth: hci_{ldisc,serdev}: check percpu_init_rwsem() failure |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50374 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02895 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0291 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02945 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0292 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02919 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02915 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04128 |
| published_at |
2026-04-26T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03977 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0396 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03972 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04097 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0411 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50374 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50374
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-znzg-71sh-ufe9 |
|
| 330 |
| url |
VCID-zph7-5zjb-quae |
| vulnerability_id |
VCID-zph7-5zjb-quae |
| summary |
kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-3567 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00709 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00705 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00708 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00699 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00698 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00693 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00692 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00686 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00734 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00736 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00737 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-3567 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-3567
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zph7-5zjb-quae |
|
| 331 |
| url |
VCID-zpup-8k6s-6ua4 |
| vulnerability_id |
VCID-zpup-8k6s-6ua4 |
| summary |
kernel: drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52817 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01523 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01615 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01526 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01529 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01533 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01537 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01528 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0152 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01506 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0161 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01618 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52817 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-52817
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zpup-8k6s-6ua4 |
|
| 332 |
| url |
VCID-zr97-qr9w-byd3 |
| vulnerability_id |
VCID-zr97-qr9w-byd3 |
| summary |
kernel: Linux kernel: Denial of Service due to memory leak in target_cmd_counter |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54154 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06793 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0684 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06822 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06874 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06907 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.069 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06956 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06938 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06893 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06888 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0683 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06811 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09303 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54154 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54154
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zr97-qr9w-byd3 |
|
| 333 |
| url |
VCID-zrky-rbtv-hkaf |
| vulnerability_id |
VCID-zrky-rbtv-hkaf |
| summary |
kernel: mm: multi-gen LRU: fix crash during cgroup migration |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52940 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08345 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08398 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08319 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08383 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.084 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08391 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08373 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08356 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.0825 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08233 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08395 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08367 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08332 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52940 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-52940
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zrky-rbtv-hkaf |
|
| 334 |
| url |
VCID-zwem-xgyr-73dw |
| vulnerability_id |
VCID-zwem-xgyr-73dw |
| summary |
kernel: ext4: fix bug_on in __es_tree_search caused by bad boot loader inode |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50638 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.1533 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.154 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15203 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15291 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15341 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19753 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19648 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19642 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19866 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19821 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19764 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19739 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19741 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50638 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50638
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zwem-xgyr-73dw |
|
| 335 |
| url |
VCID-zype-8718-47g9 |
| vulnerability_id |
VCID-zype-8718-47g9 |
| summary |
kernel: net/mlx5e: fix memory leak in mlx5e_fs_tt_redirect_any_create |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53371 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01826 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0184 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01838 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01843 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01857 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01844 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01829 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01824 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02197 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02261 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02252 |
| published_at |
2026-04-26T12:55:00Z |
|
| 11 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02186 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02281 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53371 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53371
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zype-8718-47g9 |
|
| 336 |
| url |
VCID-zzp1-dxu7-5ygv |
| vulnerability_id |
VCID-zzp1-dxu7-5ygv |
| summary |
kernel: Linux kernel: Denial of Service in ASoC wcd938x codec due to improper error handling |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53666 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03188 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03198 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03201 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03205 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03231 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03185 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03158 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03142 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03116 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03123 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03242 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03243 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03238 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53666 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53666
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zzp1-dxu7-5ygv |
|