Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@4.18.0-553?arch=el8_10
Typerpm
Namespaceredhat
Namekernel
Version4.18.0-553
Qualifiers
arch el8_10
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-18zd-fdck-s7hc
vulnerability_id VCID-18zd-fdck-s7hc
summary kernel: arm64: acpi: Fix possible memory leak of ffh_ctxt
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53266.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53266.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53266
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04741
published_at 2026-04-02T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04779
published_at 2026-04-07T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04764
published_at 2026-04-04T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04812
published_at 2026-04-11T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04825
published_at 2026-04-09T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05388
published_at 2026-04-21T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.05236
published_at 2026-04-18T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05288
published_at 2026-04-13T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05235
published_at 2026-04-16T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.05427
published_at 2026-04-24T12:55:00Z
10
value 0.0002
scoring_system epss
scoring_elements 0.05299
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53266
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://git.kernel.org/stable/c/1b561d3949f8478c5403c9752b5533211a757226
reference_id 1b561d3949f8478c5403c9752b5533211a757226
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:04:15Z/
url https://git.kernel.org/stable/c/1b561d3949f8478c5403c9752b5533211a757226
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2395670
reference_id 2395670
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2395670
5
reference_url https://git.kernel.org/stable/c/7521da2eb42d65f89f511b7912d3757cf3d9168a
reference_id 7521da2eb42d65f89f511b7912d3757cf3d9168a
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:04:15Z/
url https://git.kernel.org/stable/c/7521da2eb42d65f89f511b7912d3757cf3d9168a
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53266
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-18zd-fdck-s7hc
1
url VCID-192b-rfyw-nbdv
vulnerability_id VCID-192b-rfyw-nbdv
summary kernel: mm/sparsemem: fix race in accessing memory_section->usage
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52489.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52489.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-52489
reference_id
reference_type
scores
0
value 6e-05
scoring_system epss
scoring_elements 0.00416
published_at 2026-04-02T12:55:00Z
1
value 6e-05
scoring_system epss
scoring_elements 0.00425
published_at 2026-04-24T12:55:00Z
2
value 6e-05
scoring_system epss
scoring_elements 0.00405
published_at 2026-04-11T12:55:00Z
3
value 6e-05
scoring_system epss
scoring_elements 0.00406
published_at 2026-04-09T12:55:00Z
4
value 6e-05
scoring_system epss
scoring_elements 0.00402
published_at 2026-04-12T12:55:00Z
5
value 6e-05
scoring_system epss
scoring_elements 0.004
published_at 2026-04-13T12:55:00Z
6
value 6e-05
scoring_system epss
scoring_elements 0.00394
published_at 2026-04-16T12:55:00Z
7
value 6e-05
scoring_system epss
scoring_elements 0.00398
published_at 2026-04-18T12:55:00Z
8
value 6e-05
scoring_system epss
scoring_elements 0.00424
published_at 2026-04-21T12:55:00Z
9
value 6e-05
scoring_system epss
scoring_elements 0.00415
published_at 2026-04-04T12:55:00Z
10
value 6e-05
scoring_system epss
scoring_elements 0.00408
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-52489
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47233
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47233
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52429
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52429
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52434
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52435
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52458
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52458
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52482
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52486
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52489
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52491
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52492
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52493
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52498
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52587
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52587
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52594
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52595
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52597
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52598
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52599
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52600
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52601
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52602
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52603
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52604
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52606
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52615
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52616
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52617
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52618
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52619
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52622
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52623
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52627
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52627
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52635
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52637
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52642
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0340
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0607
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1151
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23849
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851
58
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24857
59
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24858
60
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24861
61
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26581
62
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26593
63
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26600
64
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601
65
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602
66
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26606
67
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26610
68
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614
69
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615
70
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26622
71
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26625
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26625
72
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26627
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26627
73
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26635
74
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26636
75
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26640
76
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641
77
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642
78
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643
79
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26644
80
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26645
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26645
81
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651
82
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26654
83
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26659
84
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663
85
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26664
86
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26665
87
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26671
88
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26673
89
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675
90
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26679
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26679
91
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26684
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26684
92
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26685
93
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26687
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26687
94
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688
95
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689
96
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26695
97
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26696
98
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26697
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26697
99
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26698
100
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26702
101
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704
102
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26707
103
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26712
104
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26722
105
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26727
106
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733
107
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735
108
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26736
109
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743
110
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744
111
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747
112
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26748
113
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26749
114
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26751
115
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26752
116
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26753
117
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754
118
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763
119
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764
120
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766
121
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771
122
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772
123
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773
124
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26776
125
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777
126
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778
127
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779
128
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26781
129
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782
130
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26787
131
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26788
132
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26790
133
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791
134
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793
135
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26795
136
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801
137
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804
138
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805
139
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26808
140
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26809
141
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26810
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26810
142
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26812
143
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26813
144
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26814
145
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816
146
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817
147
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26820
148
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26825
149
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26833
150
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26835
151
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839
152
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840
153
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26843
154
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26845
155
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26846
156
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26851
157
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852
158
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855
159
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857
160
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859
161
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26861
162
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26862
163
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863
164
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26870
165
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26872
166
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26874
167
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26875
168
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26877
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26877
169
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878
170
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26880
171
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26882
172
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883
173
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884
174
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885
175
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889
176
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891
177
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26894
178
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26895
179
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26897
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26897
180
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898
181
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901
182
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903
183
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906
184
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907
185
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26910
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26910
186
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26917
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26917
187
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922
188
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923
189
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26924
190
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925
191
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26926
192
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931
193
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26934
194
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935
195
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26937
196
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26950
197
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26951
198
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26955
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26955
199
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26956
200
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26957
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26957
201
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26958
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26958
202
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960
203
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961
204
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26965
205
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26966
206
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26969
207
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26970
208
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26973
209
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974
210
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976
211
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26978
212
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26981
213
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26984
214
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26988
215
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993
216
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26994
217
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26997
218
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26999
219
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27000
220
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27001
221
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27004
222
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008
223
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013
224
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020
225
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27024
226
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27025
227
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27028
228
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27030
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27030
229
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27038
230
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043
231
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27044
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27044
232
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27045
233
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046
234
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27047
235
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051
236
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27052
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27052
237
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27053
238
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27059
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27059
239
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065
240
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073
241
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074
242
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075
243
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27076
244
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27077
245
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078
246
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388
247
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437
248
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
249
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2269189
reference_id 2269189
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2269189
250
reference_url https://git.kernel.org/stable/c/3a01daace71b521563c38bbbf874e14c3e58adb7
reference_id 3a01daace71b521563c38bbbf874e14c3e58adb7
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-12T14:56:15Z/
url https://git.kernel.org/stable/c/3a01daace71b521563c38bbbf874e14c3e58adb7
251
reference_url https://git.kernel.org/stable/c/5ec8e8ea8b7783fab150cf86404fc38cb4db8800
reference_id 5ec8e8ea8b7783fab150cf86404fc38cb4db8800
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-12T14:56:15Z/
url https://git.kernel.org/stable/c/5ec8e8ea8b7783fab150cf86404fc38cb4db8800
252
reference_url https://git.kernel.org/stable/c/68ed9e33324021e9d6b798e9db00ca3093d2012a
reference_id 68ed9e33324021e9d6b798e9db00ca3093d2012a
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-12T14:56:15Z/
url https://git.kernel.org/stable/c/68ed9e33324021e9d6b798e9db00ca3093d2012a
253
reference_url https://git.kernel.org/stable/c/70064241f2229f7ba7b9599a98f68d9142e81a97
reference_id 70064241f2229f7ba7b9599a98f68d9142e81a97
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-12T14:56:15Z/
url https://git.kernel.org/stable/c/70064241f2229f7ba7b9599a98f68d9142e81a97
254
reference_url https://git.kernel.org/stable/c/90ad17575d26874287271127d43ef3c2af876cea
reference_id 90ad17575d26874287271127d43ef3c2af876cea
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-12T14:56:15Z/
url https://git.kernel.org/stable/c/90ad17575d26874287271127d43ef3c2af876cea
255
reference_url https://git.kernel.org/stable/c/b448de2459b6d62a53892487ab18b7d823ff0529
reference_id b448de2459b6d62a53892487ab18b7d823ff0529
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-12T14:56:15Z/
url https://git.kernel.org/stable/c/b448de2459b6d62a53892487ab18b7d823ff0529
256
reference_url https://access.redhat.com/errata/RHSA-2024:10262
reference_id RHSA-2024:10262
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10262
257
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
258
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
259
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
260
reference_url https://access.redhat.com/errata/RHSA-2024:6990
reference_id RHSA-2024:6990
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6990
261
reference_url https://access.redhat.com/errata/RHSA-2024:6991
reference_id RHSA-2024:6991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6991
262
reference_url https://access.redhat.com/errata/RHSA-2024:8613
reference_id RHSA-2024:8613
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8613
263
reference_url https://access.redhat.com/errata/RHSA-2024:8614
reference_id RHSA-2024:8614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8614
264
reference_url https://usn.ubuntu.com/6766-1/
reference_id USN-6766-1
reference_type
scores
url https://usn.ubuntu.com/6766-1/
265
reference_url https://usn.ubuntu.com/6766-2/
reference_id USN-6766-2
reference_type
scores
url https://usn.ubuntu.com/6766-2/
266
reference_url https://usn.ubuntu.com/6766-3/
reference_id USN-6766-3
reference_type
scores
url https://usn.ubuntu.com/6766-3/
267
reference_url https://usn.ubuntu.com/6795-1/
reference_id USN-6795-1
reference_type
scores
url https://usn.ubuntu.com/6795-1/
268
reference_url https://usn.ubuntu.com/6818-1/
reference_id USN-6818-1
reference_type
scores
url https://usn.ubuntu.com/6818-1/
269
reference_url https://usn.ubuntu.com/6818-2/
reference_id USN-6818-2
reference_type
scores
url https://usn.ubuntu.com/6818-2/
270
reference_url https://usn.ubuntu.com/6818-3/
reference_id USN-6818-3
reference_type
scores
url https://usn.ubuntu.com/6818-3/
271
reference_url https://usn.ubuntu.com/6818-4/
reference_id USN-6818-4
reference_type
scores
url https://usn.ubuntu.com/6818-4/
272
reference_url https://usn.ubuntu.com/6819-1/
reference_id USN-6819-1
reference_type
scores
url https://usn.ubuntu.com/6819-1/
273
reference_url https://usn.ubuntu.com/6819-2/
reference_id USN-6819-2
reference_type
scores
url https://usn.ubuntu.com/6819-2/
274
reference_url https://usn.ubuntu.com/6819-3/
reference_id USN-6819-3
reference_type
scores
url https://usn.ubuntu.com/6819-3/
275
reference_url https://usn.ubuntu.com/6819-4/
reference_id USN-6819-4
reference_type
scores
url https://usn.ubuntu.com/6819-4/
276
reference_url https://usn.ubuntu.com/6828-1/
reference_id USN-6828-1
reference_type
scores
url https://usn.ubuntu.com/6828-1/
fixed_packages
aliases CVE-2023-52489
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-192b-rfyw-nbdv
2
url VCID-1ak6-9nnt-qufc
vulnerability_id VCID-1ak6-9nnt-qufc
summary kernel: bnxt_en: Avoid order-5 memory allocation for TPA data
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53134.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53134.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53134
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.19772
published_at 2026-04-02T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19824
published_at 2026-04-04T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19546
published_at 2026-04-07T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19626
published_at 2026-04-08T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.19679
published_at 2026-04-09T12:55:00Z
5
value 0.00063
scoring_system epss
scoring_elements 0.19683
published_at 2026-04-11T12:55:00Z
6
value 0.00063
scoring_system epss
scoring_elements 0.19634
published_at 2026-04-12T12:55:00Z
7
value 0.00063
scoring_system epss
scoring_elements 0.19575
published_at 2026-04-13T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.19553
published_at 2026-04-16T12:55:00Z
9
value 0.00063
scoring_system epss
scoring_elements 0.1956
published_at 2026-04-18T12:55:00Z
10
value 0.00063
scoring_system epss
scoring_elements 0.19573
published_at 2026-04-21T12:55:00Z
11
value 0.00063
scoring_system epss
scoring_elements 0.19468
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53134
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53134
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2363705
reference_id 2363705
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2363705
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53134
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1ak6-9nnt-qufc
3
url VCID-1p3k-f3ck-83bg
vulnerability_id VCID-1p3k-f3ck-83bg
summary kernel: Use-after-free in nft_verdict_dump due to a race between set GC and transaction
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4244.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4244.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4244
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04334
published_at 2026-04-02T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04356
published_at 2026-04-18T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04367
published_at 2026-04-07T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.044
published_at 2026-04-08T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04417
published_at 2026-04-09T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04411
published_at 2026-04-11T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04396
published_at 2026-04-12T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.0438
published_at 2026-04-13T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04347
published_at 2026-04-16T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.04487
published_at 2026-04-21T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04513
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4244
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4244
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2235306
reference_id 2235306
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2235306
5
reference_url https://access.redhat.com/errata/RHSA-2024:1018
reference_id RHSA-2024:1018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1018
6
reference_url https://access.redhat.com/errata/RHSA-2024:1019
reference_id RHSA-2024:1019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1019
7
reference_url https://access.redhat.com/errata/RHSA-2024:1248
reference_id RHSA-2024:1248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1248
8
reference_url https://access.redhat.com/errata/RHSA-2024:2094
reference_id RHSA-2024:2094
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2094
9
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
10
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
11
reference_url https://access.redhat.com/errata/RHSA-2024:3414
reference_id RHSA-2024:3414
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3414
12
reference_url https://access.redhat.com/errata/RHSA-2024:3421
reference_id RHSA-2024:3421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3421
13
reference_url https://usn.ubuntu.com/6444-1/
reference_id USN-6444-1
reference_type
scores
url https://usn.ubuntu.com/6444-1/
14
reference_url https://usn.ubuntu.com/6444-2/
reference_id USN-6444-2
reference_type
scores
url https://usn.ubuntu.com/6444-2/
15
reference_url https://usn.ubuntu.com/6445-1/
reference_id USN-6445-1
reference_type
scores
url https://usn.ubuntu.com/6445-1/
16
reference_url https://usn.ubuntu.com/6445-2/
reference_id USN-6445-2
reference_type
scores
url https://usn.ubuntu.com/6445-2/
17
reference_url https://usn.ubuntu.com/6446-1/
reference_id USN-6446-1
reference_type
scores
url https://usn.ubuntu.com/6446-1/
18
reference_url https://usn.ubuntu.com/6446-2/
reference_id USN-6446-2
reference_type
scores
url https://usn.ubuntu.com/6446-2/
19
reference_url https://usn.ubuntu.com/6446-3/
reference_id USN-6446-3
reference_type
scores
url https://usn.ubuntu.com/6446-3/
20
reference_url https://usn.ubuntu.com/6461-1/
reference_id USN-6461-1
reference_type
scores
url https://usn.ubuntu.com/6461-1/
21
reference_url https://usn.ubuntu.com/6466-1/
reference_id USN-6466-1
reference_type
scores
url https://usn.ubuntu.com/6466-1/
22
reference_url https://usn.ubuntu.com/6503-1/
reference_id USN-6503-1
reference_type
scores
url https://usn.ubuntu.com/6503-1/
23
reference_url https://usn.ubuntu.com/6537-1/
reference_id USN-6537-1
reference_type
scores
url https://usn.ubuntu.com/6537-1/
24
reference_url https://usn.ubuntu.com/6572-1/
reference_id USN-6572-1
reference_type
scores
url https://usn.ubuntu.com/6572-1/
25
reference_url https://usn.ubuntu.com/6681-1/
reference_id USN-6681-1
reference_type
scores
url https://usn.ubuntu.com/6681-1/
26
reference_url https://usn.ubuntu.com/6681-2/
reference_id USN-6681-2
reference_type
scores
url https://usn.ubuntu.com/6681-2/
27
reference_url https://usn.ubuntu.com/6681-3/
reference_id USN-6681-3
reference_type
scores
url https://usn.ubuntu.com/6681-3/
28
reference_url https://usn.ubuntu.com/6681-4/
reference_id USN-6681-4
reference_type
scores
url https://usn.ubuntu.com/6681-4/
29
reference_url https://usn.ubuntu.com/6716-1/
reference_id USN-6716-1
reference_type
scores
url https://usn.ubuntu.com/6716-1/
fixed_packages
aliases CVE-2023-4244
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1p3k-f3ck-83bg
4
url VCID-214g-9hfm-wqbk
vulnerability_id VCID-214g-9hfm-wqbk
summary kernel: Linux kernel: Denial of Service due to memory leak in mlx5e driver
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53999.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53999.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53999
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07747
published_at 2026-04-02T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07792
published_at 2026-04-24T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07749
published_at 2026-04-07T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07809
published_at 2026-04-08T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07826
published_at 2026-04-09T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07821
published_at 2026-04-11T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07808
published_at 2026-04-12T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07794
published_at 2026-04-13T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07708
published_at 2026-04-16T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07684
published_at 2026-04-18T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07837
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53999
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2424951
reference_id 2424951
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2424951
4
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
5
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53999
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-214g-9hfm-wqbk
5
url VCID-225u-cxd6-dqb5
vulnerability_id VCID-225u-cxd6-dqb5
summary kernel: media: dvbdev: adopts refcnt to avoid UAF
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50274.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50274.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50274
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02603
published_at 2026-04-02T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02617
published_at 2026-04-04T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02621
published_at 2026-04-07T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02625
published_at 2026-04-08T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02645
published_at 2026-04-09T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02495
published_at 2026-04-11T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02485
published_at 2026-04-12T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02483
published_at 2026-04-13T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02467
published_at 2026-04-16T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02473
published_at 2026-04-18T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.0258
published_at 2026-04-21T12:55:00Z
11
value 0.00014
scoring_system epss
scoring_elements 0.02568
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50274
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50274
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50274
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2395314
reference_id 2395314
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2395314
5
reference_url https://access.redhat.com/errata/RHSA-2023:7398
reference_id RHSA-2023:7398
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7398
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2022-50274
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-225u-cxd6-dqb5
6
url VCID-26jx-suvc-dyba
vulnerability_id VCID-26jx-suvc-dyba
summary kernel: nvmet-tcp: add bounds check on Transfer Tag
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50717.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50717.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50717
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10911
published_at 2026-04-02T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10975
published_at 2026-04-04T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.108
published_at 2026-04-07T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10876
published_at 2026-04-08T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10929
published_at 2026-04-09T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.1093
published_at 2026-04-11T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10897
published_at 2026-04-12T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10874
published_at 2026-04-21T12:55:00Z
8
value 0.00036
scoring_system epss
scoring_elements 0.10734
published_at 2026-04-16T12:55:00Z
9
value 0.00036
scoring_system epss
scoring_elements 0.10747
published_at 2026-04-18T12:55:00Z
10
value 0.00036
scoring_system epss
scoring_elements 0.10834
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50717
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50717
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2425070
reference_id 2425070
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2425070
5
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
6
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
7
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
8
reference_url https://access.redhat.com/errata/RHSA-2024:3810
reference_id RHSA-2024:3810
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3810
fixed_packages
aliases CVE-2022-50717
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-26jx-suvc-dyba
7
url VCID-2tbb-89hb-rkh6
vulnerability_id VCID-2tbb-89hb-rkh6
summary kernel: skbuff: skb_segment, Call zero copy functions before using skbuff frags
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53354.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53354.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53354
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.02951
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.02937
published_at 2026-04-12T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.0296
published_at 2026-04-11T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03
published_at 2026-04-09T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.02975
published_at 2026-04-08T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.02965
published_at 2026-04-04T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.02973
published_at 2026-04-07T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.04166
published_at 2026-04-24T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.0403
published_at 2026-04-13T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.04019
published_at 2026-04-16T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.04031
published_at 2026-04-18T12:55:00Z
11
value 0.00017
scoring_system epss
scoring_elements 0.04154
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53354
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53354
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53354
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/04c3eee4e13f60bf6f9a366ad39f88a01a57166e
reference_id 04c3eee4e13f60bf6f9a366ad39f88a01a57166e
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:42:19Z/
url https://git.kernel.org/stable/c/04c3eee4e13f60bf6f9a366ad39f88a01a57166e
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2396158
reference_id 2396158
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2396158
6
reference_url https://git.kernel.org/stable/c/2ea35288c83b3d501a88bc17f2df8f176b5cc96f
reference_id 2ea35288c83b3d501a88bc17f2df8f176b5cc96f
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:42:19Z/
url https://git.kernel.org/stable/c/2ea35288c83b3d501a88bc17f2df8f176b5cc96f
7
reference_url https://git.kernel.org/stable/c/6c26ed3c6abe86ddab0510529000b970b05c9b40
reference_id 6c26ed3c6abe86ddab0510529000b970b05c9b40
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:42:19Z/
url https://git.kernel.org/stable/c/6c26ed3c6abe86ddab0510529000b970b05c9b40
8
reference_url https://git.kernel.org/stable/c/8836c266201c29a5acb4f582227686f47b65ad61
reference_id 8836c266201c29a5acb4f582227686f47b65ad61
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:42:19Z/
url https://git.kernel.org/stable/c/8836c266201c29a5acb4f582227686f47b65ad61
9
reference_url https://git.kernel.org/stable/c/d44403ec0676317b7f7edf2a035bb219fee3304e
reference_id d44403ec0676317b7f7edf2a035bb219fee3304e
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:42:19Z/
url https://git.kernel.org/stable/c/d44403ec0676317b7f7edf2a035bb219fee3304e
10
reference_url https://git.kernel.org/stable/c/d5790386595d06ea9decfd9ba5f1ea48cf09aa02
reference_id d5790386595d06ea9decfd9ba5f1ea48cf09aa02
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:42:19Z/
url https://git.kernel.org/stable/c/d5790386595d06ea9decfd9ba5f1ea48cf09aa02
11
reference_url https://git.kernel.org/stable/c/f99006e840a4dbc8f5a34cecc6b5b26c73ef49bb
reference_id f99006e840a4dbc8f5a34cecc6b5b26c73ef49bb
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:42:19Z/
url https://git.kernel.org/stable/c/f99006e840a4dbc8f5a34cecc6b5b26c73ef49bb
12
reference_url https://git.kernel.org/stable/c/fcab3f661dbfd88e27ddbbe65368f3fa2d823175
reference_id fcab3f661dbfd88e27ddbbe65368f3fa2d823175
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:42:19Z/
url https://git.kernel.org/stable/c/fcab3f661dbfd88e27ddbbe65368f3fa2d823175
13
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
14
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
15
reference_url https://access.redhat.com/errata/RHSA-2024:8157
reference_id RHSA-2024:8157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8157
16
reference_url https://access.redhat.com/errata/RHSA-2025:21091
reference_id RHSA-2025:21091
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21091
17
reference_url https://access.redhat.com/errata/RHSA-2025:21136
reference_id RHSA-2025:21136
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21136
18
reference_url https://access.redhat.com/errata/RHSA-2025:22006
reference_id RHSA-2025:22006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22006
19
reference_url https://access.redhat.com/errata/RHSA-2025:22072
reference_id RHSA-2025:22072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22072
20
reference_url https://access.redhat.com/errata/RHSA-2025:22752
reference_id RHSA-2025:22752
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22752
21
reference_url https://access.redhat.com/errata/RHSA-2025:23445
reference_id RHSA-2025:23445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23445
fixed_packages
aliases CVE-2023-53354
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2tbb-89hb-rkh6
8
url VCID-34km-p3dp-v7gp
vulnerability_id VCID-34km-p3dp-v7gp
summary kernel: ipmi_si: fix a memleak in try_smi_init()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53611.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53611.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53611
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.02951
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.02965
published_at 2026-04-04T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.02973
published_at 2026-04-07T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.02975
published_at 2026-04-08T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03
published_at 2026-04-09T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.0296
published_at 2026-04-11T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.02937
published_at 2026-04-12T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.02927
published_at 2026-04-13T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.02902
published_at 2026-04-16T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.02912
published_at 2026-04-18T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03029
published_at 2026-04-21T12:55:00Z
11
value 0.00015
scoring_system epss
scoring_elements 0.03027
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53611
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53611
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2401557
reference_id 2401557
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2401557
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53611
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-34km-p3dp-v7gp
9
url VCID-35wc-xgzx-pkh9
vulnerability_id VCID-35wc-xgzx-pkh9
summary kernel: ip_vti: fix potential slab-use-after-free in decode_session6
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53559.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53559.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53559
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03107
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.0312
published_at 2026-04-07T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03125
published_at 2026-04-08T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.0315
published_at 2026-04-09T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03109
published_at 2026-04-11T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03083
published_at 2026-04-12T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.0307
published_at 2026-04-13T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03045
published_at 2026-04-16T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.03054
published_at 2026-04-18T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03172
published_at 2026-04-21T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03175
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53559
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53559
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2401489
reference_id 2401489
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2401489
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53559
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-35wc-xgzx-pkh9
10
url VCID-3ejf-8txq-ffg6
vulnerability_id VCID-3ejf-8txq-ffg6
summary kernel: scsi: qla2xxx: Use raw_smp_processor_id() instead of smp_processor_id()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53530.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53530.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53530
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03188
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03198
published_at 2026-04-04T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03201
published_at 2026-04-07T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03205
published_at 2026-04-08T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03231
published_at 2026-04-09T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03185
published_at 2026-04-11T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.03158
published_at 2026-04-12T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03142
published_at 2026-04-13T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.03116
published_at 2026-04-16T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03123
published_at 2026-04-18T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03242
published_at 2026-04-21T12:55:00Z
11
value 0.00015
scoring_system epss
scoring_elements 0.03243
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53530
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2400733
reference_id 2400733
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2400733
4
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
5
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53530
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3ejf-8txq-ffg6
11
url VCID-4kmy-n2ts-hfa2
vulnerability_id VCID-4kmy-n2ts-hfa2
summary kernel: sched/membarrier: reduce the ability to hammer on sys_membarrier
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26602.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26602.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-26602
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01301
published_at 2026-04-24T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.0122
published_at 2026-04-11T12:55:00Z
2
value 0.00011
scoring_system epss
scoring_elements 0.01228
published_at 2026-04-07T12:55:00Z
3
value 0.00011
scoring_system epss
scoring_elements 0.01235
published_at 2026-04-08T12:55:00Z
4
value 0.00011
scoring_system epss
scoring_elements 0.01237
published_at 2026-04-09T12:55:00Z
5
value 0.00011
scoring_system epss
scoring_elements 0.01214
published_at 2026-04-12T12:55:00Z
6
value 0.00011
scoring_system epss
scoring_elements 0.01217
published_at 2026-04-13T12:55:00Z
7
value 0.00011
scoring_system epss
scoring_elements 0.01209
published_at 2026-04-16T12:55:00Z
8
value 0.00011
scoring_system epss
scoring_elements 0.01222
published_at 2026-04-18T12:55:00Z
9
value 0.00011
scoring_system epss
scoring_elements 0.01295
published_at 2026-04-21T12:55:00Z
10
value 0.00011
scoring_system epss
scoring_elements 0.01215
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-26602
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47233
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47233
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52429
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52429
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52434
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52435
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52458
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52458
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52482
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52486
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52489
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52491
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52492
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52493
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52498
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52587
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52587
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52594
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52595
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52597
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52598
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52599
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52600
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52601
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52602
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52603
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52604
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52606
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52615
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52616
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52617
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52618
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52619
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52622
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52623
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52627
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52627
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52635
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52637
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52642
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0340
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0607
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1151
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23849
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851
58
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24857
59
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24858
60
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24861
61
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26581
62
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26593
63
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26600
64
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601
65
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602
66
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26606
67
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26610
68
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614
69
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615
70
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26622
71
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26625
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26625
72
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26627
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26627
73
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26635
74
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26636
75
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26640
76
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641
77
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642
78
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643
79
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26644
80
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26645
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26645
81
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651
82
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26654
83
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26659
84
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663
85
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26664
86
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26665
87
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26671
88
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26673
89
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675
90
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26679
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26679
91
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26684
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26684
92
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26685
93
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26687
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26687
94
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688
95
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689
96
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26695
97
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26696
98
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26697
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26697
99
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26698
100
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26702
101
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704
102
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26707
103
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26712
104
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26722
105
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26727
106
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733
107
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735
108
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26736
109
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743
110
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744
111
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747
112
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26748
113
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26749
114
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26751
115
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26752
116
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26753
117
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754
118
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763
119
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764
120
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766
121
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771
122
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772
123
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773
124
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26776
125
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777
126
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778
127
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779
128
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26781
129
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782
130
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26787
131
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26788
132
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26790
133
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791
134
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793
135
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26795
136
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801
137
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804
138
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805
139
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26808
140
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26809
141
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26810
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26810
142
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26812
143
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26813
144
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26814
145
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816
146
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817
147
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26820
148
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26825
149
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26833
150
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26835
151
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839
152
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840
153
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26843
154
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26845
155
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26846
156
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26851
157
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852
158
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855
159
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857
160
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859
161
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26861
162
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26862
163
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863
164
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26870
165
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26872
166
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26874
167
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26875
168
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26877
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26877
169
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878
170
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26880
171
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26882
172
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883
173
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884
174
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885
175
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889
176
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891
177
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26894
178
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26895
179
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26897
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26897
180
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898
181
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901
182
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903
183
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906
184
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907
185
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26910
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26910
186
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26917
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26917
187
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922
188
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923
189
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26924
190
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925
191
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26926
192
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931
193
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26934
194
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935
195
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26937
196
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26950
197
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26951
198
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26955
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26955
199
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26956
200
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26957
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26957
201
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26958
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26958
202
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960
203
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961
204
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26965
205
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26966
206
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26969
207
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26970
208
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26973
209
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974
210
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976
211
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26978
212
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26981
213
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26984
214
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26988
215
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993
216
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26994
217
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26997
218
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26999
219
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27000
220
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27001
221
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27004
222
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008
223
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013
224
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020
225
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27024
226
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27025
227
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27028
228
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27030
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27030
229
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27038
230
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043
231
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27044
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27044
232
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27045
233
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046
234
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27047
235
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051
236
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27052
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27052
237
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27053
238
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27059
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27059
239
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065
240
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073
241
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074
242
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075
243
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27076
244
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27077
245
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078
246
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388
247
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437
248
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
249
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2267695
reference_id 2267695
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2267695
250
reference_url https://git.kernel.org/stable/c/2441a64070b85c14eecc3728cc87e883f953f265
reference_id 2441a64070b85c14eecc3728cc87e883f953f265
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T16:20:03Z/
url https://git.kernel.org/stable/c/2441a64070b85c14eecc3728cc87e883f953f265
251
reference_url https://git.kernel.org/stable/c/24ec7504a08a67247fbe798d1de995208a8c128a
reference_id 24ec7504a08a67247fbe798d1de995208a8c128a
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T16:20:03Z/
url https://git.kernel.org/stable/c/24ec7504a08a67247fbe798d1de995208a8c128a
252
reference_url https://git.kernel.org/stable/c/3cd139875e9a7688b3fc715264032620812a5fa3
reference_id 3cd139875e9a7688b3fc715264032620812a5fa3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T16:20:03Z/
url https://git.kernel.org/stable/c/3cd139875e9a7688b3fc715264032620812a5fa3
253
reference_url https://git.kernel.org/stable/c/50fb4e17df319bb33be6f14e2a856950c1577dee
reference_id 50fb4e17df319bb33be6f14e2a856950c1577dee
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T16:20:03Z/
url https://git.kernel.org/stable/c/50fb4e17df319bb33be6f14e2a856950c1577dee
254
reference_url https://git.kernel.org/stable/c/944d5fe50f3f03daacfea16300e656a1691c4a23
reference_id 944d5fe50f3f03daacfea16300e656a1691c4a23
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T16:20:03Z/
url https://git.kernel.org/stable/c/944d5fe50f3f03daacfea16300e656a1691c4a23
255
reference_url https://git.kernel.org/stable/c/b6a2a9cbb67545c825ec95f06adb7ff300a2ad71
reference_id b6a2a9cbb67545c825ec95f06adb7ff300a2ad71
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T16:20:03Z/
url https://git.kernel.org/stable/c/b6a2a9cbb67545c825ec95f06adb7ff300a2ad71
256
reference_url https://git.kernel.org/stable/c/c5b2063c65d05e79fad8029324581d86cfba7eea
reference_id c5b2063c65d05e79fad8029324581d86cfba7eea
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T16:20:03Z/
url https://git.kernel.org/stable/c/c5b2063c65d05e79fad8029324581d86cfba7eea
257
reference_url https://git.kernel.org/stable/c/db896bbe4a9c67cee377e5f6a743350d3ae4acf6
reference_id db896bbe4a9c67cee377e5f6a743350d3ae4acf6
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T16:20:03Z/
url https://git.kernel.org/stable/c/db896bbe4a9c67cee377e5f6a743350d3ae4acf6
258
reference_url https://access.redhat.com/errata/RHSA-2024:1249
reference_id RHSA-2024:1249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1249
259
reference_url https://access.redhat.com/errata/RHSA-2024:1250
reference_id RHSA-2024:1250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1250
260
reference_url https://access.redhat.com/errata/RHSA-2024:1332
reference_id RHSA-2024:1332
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1332
261
reference_url https://access.redhat.com/errata/RHSA-2024:1532
reference_id RHSA-2024:1532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1532
262
reference_url https://access.redhat.com/errata/RHSA-2024:1533
reference_id RHSA-2024:1533
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1533
263
reference_url https://access.redhat.com/errata/RHSA-2024:1653
reference_id RHSA-2024:1653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1653
264
reference_url https://access.redhat.com/errata/RHSA-2024:1765
reference_id RHSA-2024:1765
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1765
265
reference_url https://access.redhat.com/errata/RHSA-2024:2006
reference_id RHSA-2024:2006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2006
266
reference_url https://access.redhat.com/errata/RHSA-2024:2008
reference_id RHSA-2024:2008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2008
267
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
268
reference_url https://access.redhat.com/errata/RHSA-2024:2582
reference_id RHSA-2024:2582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2582
269
reference_url https://access.redhat.com/errata/RHSA-2024:2585
reference_id RHSA-2024:2585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2585
270
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
271
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
272
reference_url https://access.redhat.com/errata/RHSA-2024:3810
reference_id RHSA-2024:3810
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3810
273
reference_url https://usn.ubuntu.com/6766-1/
reference_id USN-6766-1
reference_type
scores
url https://usn.ubuntu.com/6766-1/
274
reference_url https://usn.ubuntu.com/6766-2/
reference_id USN-6766-2
reference_type
scores
url https://usn.ubuntu.com/6766-2/
275
reference_url https://usn.ubuntu.com/6766-3/
reference_id USN-6766-3
reference_type
scores
url https://usn.ubuntu.com/6766-3/
276
reference_url https://usn.ubuntu.com/6767-1/
reference_id USN-6767-1
reference_type
scores
url https://usn.ubuntu.com/6767-1/
277
reference_url https://usn.ubuntu.com/6767-2/
reference_id USN-6767-2
reference_type
scores
url https://usn.ubuntu.com/6767-2/
278
reference_url https://usn.ubuntu.com/6795-1/
reference_id USN-6795-1
reference_type
scores
url https://usn.ubuntu.com/6795-1/
279
reference_url https://usn.ubuntu.com/6828-1/
reference_id USN-6828-1
reference_type
scores
url https://usn.ubuntu.com/6828-1/
280
reference_url https://usn.ubuntu.com/6895-1/
reference_id USN-6895-1
reference_type
scores
url https://usn.ubuntu.com/6895-1/
281
reference_url https://usn.ubuntu.com/6895-2/
reference_id USN-6895-2
reference_type
scores
url https://usn.ubuntu.com/6895-2/
282
reference_url https://usn.ubuntu.com/6895-3/
reference_id USN-6895-3
reference_type
scores
url https://usn.ubuntu.com/6895-3/
283
reference_url https://usn.ubuntu.com/6895-4/
reference_id USN-6895-4
reference_type
scores
url https://usn.ubuntu.com/6895-4/
284
reference_url https://usn.ubuntu.com/6900-1/
reference_id USN-6900-1
reference_type
scores
url https://usn.ubuntu.com/6900-1/
285
reference_url https://usn.ubuntu.com/7069-1/
reference_id USN-7069-1
reference_type
scores
url https://usn.ubuntu.com/7069-1/
286
reference_url https://usn.ubuntu.com/7069-2/
reference_id USN-7069-2
reference_type
scores
url https://usn.ubuntu.com/7069-2/
fixed_packages
aliases CVE-2024-26602
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4kmy-n2ts-hfa2
12
url VCID-4u8y-9b4g-vqfx
vulnerability_id VCID-4u8y-9b4g-vqfx
summary kernel: QXL: race condition leading to use-after-free in qxl_mode_dumb_create()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39198.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39198.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39198
reference_id
reference_type
scores
0
value 8e-05
scoring_system epss
scoring_elements 0.00728
published_at 2026-04-24T12:55:00Z
1
value 8e-05
scoring_system epss
scoring_elements 0.00703
published_at 2026-04-02T12:55:00Z
2
value 8e-05
scoring_system epss
scoring_elements 0.00685
published_at 2026-04-18T12:55:00Z
3
value 8e-05
scoring_system epss
scoring_elements 0.00679
published_at 2026-04-16T12:55:00Z
4
value 8e-05
scoring_system epss
scoring_elements 0.00726
published_at 2026-04-21T12:55:00Z
5
value 8e-05
scoring_system epss
scoring_elements 0.00699
published_at 2026-04-04T12:55:00Z
6
value 8e-05
scoring_system epss
scoring_elements 0.00702
published_at 2026-04-07T12:55:00Z
7
value 8e-05
scoring_system epss
scoring_elements 0.00701
published_at 2026-04-08T12:55:00Z
8
value 8e-05
scoring_system epss
scoring_elements 0.00692
published_at 2026-04-11T12:55:00Z
9
value 8e-05
scoring_system epss
scoring_elements 0.00686
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39198
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39198
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2218332
reference_id 2218332
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-01T03:55:52Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2218332
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv
reference_id cpe:/a:redhat:enterprise_linux:8::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime
reference_id cpe:/a:redhat:enterprise_linux:8::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv
reference_id cpe:/a:redhat:enterprise_linux:9::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime
reference_id cpe:/a:redhat:enterprise_linux:9::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
17
reference_url https://access.redhat.com/security/cve/CVE-2023-39198
reference_id CVE-2023-39198
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-01T03:55:52Z/
url https://access.redhat.com/security/cve/CVE-2023-39198
18
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-01T03:55:52Z/
url https://access.redhat.com/errata/RHSA-2024:2394
19
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-01T03:55:52Z/
url https://access.redhat.com/errata/RHSA-2024:2950
20
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-01T03:55:52Z/
url https://access.redhat.com/errata/RHSA-2024:3138
21
reference_url https://usn.ubuntu.com/6534-1/
reference_id USN-6534-1
reference_type
scores
url https://usn.ubuntu.com/6534-1/
22
reference_url https://usn.ubuntu.com/6534-2/
reference_id USN-6534-2
reference_type
scores
url https://usn.ubuntu.com/6534-2/
23
reference_url https://usn.ubuntu.com/6534-3/
reference_id USN-6534-3
reference_type
scores
url https://usn.ubuntu.com/6534-3/
24
reference_url https://usn.ubuntu.com/6549-1/
reference_id USN-6549-1
reference_type
scores
url https://usn.ubuntu.com/6549-1/
25
reference_url https://usn.ubuntu.com/6549-2/
reference_id USN-6549-2
reference_type
scores
url https://usn.ubuntu.com/6549-2/
26
reference_url https://usn.ubuntu.com/6549-3/
reference_id USN-6549-3
reference_type
scores
url https://usn.ubuntu.com/6549-3/
27
reference_url https://usn.ubuntu.com/6549-4/
reference_id USN-6549-4
reference_type
scores
url https://usn.ubuntu.com/6549-4/
28
reference_url https://usn.ubuntu.com/6549-5/
reference_id USN-6549-5
reference_type
scores
url https://usn.ubuntu.com/6549-5/
fixed_packages
aliases CVE-2023-39198
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4u8y-9b4g-vqfx
13
url VCID-4why-73du-t3gx
vulnerability_id VCID-4why-73du-t3gx
summary kernel: scsi: qla2xxx: Fix memory leak in qla2x00_probe_one()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53696.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53696.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53696
reference_id
reference_type
scores
0
value 0.00028
scoring_system epss
scoring_elements 0.07817
published_at 2026-04-02T12:55:00Z
1
value 0.00028
scoring_system epss
scoring_elements 0.07863
published_at 2026-04-04T12:55:00Z
2
value 0.00028
scoring_system epss
scoring_elements 0.07818
published_at 2026-04-07T12:55:00Z
3
value 0.00028
scoring_system epss
scoring_elements 0.07876
published_at 2026-04-08T12:55:00Z
4
value 0.00028
scoring_system epss
scoring_elements 0.07901
published_at 2026-04-09T12:55:00Z
5
value 0.00028
scoring_system epss
scoring_elements 0.07888
published_at 2026-04-11T12:55:00Z
6
value 0.00028
scoring_system epss
scoring_elements 0.07875
published_at 2026-04-12T12:55:00Z
7
value 0.00028
scoring_system epss
scoring_elements 0.07862
published_at 2026-04-13T12:55:00Z
8
value 0.00028
scoring_system epss
scoring_elements 0.07778
published_at 2026-04-16T12:55:00Z
9
value 0.00028
scoring_system epss
scoring_elements 0.07754
published_at 2026-04-18T12:55:00Z
10
value 0.00028
scoring_system epss
scoring_elements 0.07907
published_at 2026-04-21T12:55:00Z
11
value 0.00028
scoring_system epss
scoring_elements 0.07868
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53696
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53696
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2405745
reference_id 2405745
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2405745
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53696
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4why-73du-t3gx
14
url VCID-54qr-x4vv-xfex
vulnerability_id VCID-54qr-x4vv-xfex
summary kernel: tty: n_gsm: fix deadlock and link starvation in outgoing data path
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50116.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50116.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50116
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02662
published_at 2026-04-02T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02691
published_at 2026-04-04T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02699
published_at 2026-04-07T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02701
published_at 2026-04-08T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02722
published_at 2026-04-09T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02695
published_at 2026-04-11T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.0268
published_at 2026-04-12T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02677
published_at 2026-04-13T12:55:00Z
8
value 0.00038
scoring_system epss
scoring_elements 0.11339
published_at 2026-04-24T12:55:00Z
9
value 0.00038
scoring_system epss
scoring_elements 0.11269
published_at 2026-04-16T12:55:00Z
10
value 0.00038
scoring_system epss
scoring_elements 0.1127
published_at 2026-04-18T12:55:00Z
11
value 0.00038
scoring_system epss
scoring_elements 0.11397
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50116
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50116
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373692
reference_id 2373692
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373692
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:2621
reference_id RHSA-2024:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2621
7
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2022-50116
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-54qr-x4vv-xfex
15
url VCID-5981-2zpg-e7ch
vulnerability_id VCID-5981-2zpg-e7ch
summary kernel: iommu/amd: Add a length limitation for the ivrs_acpihid command-line parameter
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54057.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54057.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-54057
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10911
published_at 2026-04-02T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10975
published_at 2026-04-04T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.108
published_at 2026-04-07T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10876
published_at 2026-04-08T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10929
published_at 2026-04-09T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.1093
published_at 2026-04-11T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10897
published_at 2026-04-12T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10874
published_at 2026-04-21T12:55:00Z
8
value 0.00036
scoring_system epss
scoring_elements 0.10734
published_at 2026-04-16T12:55:00Z
9
value 0.00036
scoring_system epss
scoring_elements 0.10747
published_at 2026-04-18T12:55:00Z
10
value 0.00036
scoring_system epss
scoring_elements 0.10834
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-54057
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54057
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54057
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2425015
reference_id 2425015
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2425015
5
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-54057
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5981-2zpg-e7ch
16
url VCID-5hmr-mnq5-7yhr
vulnerability_id VCID-5hmr-mnq5-7yhr
summary kernel: ipmi:ssif: Fix a memory leak when scanning for an adapter
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54064.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54064.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-54064
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10911
published_at 2026-04-02T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10975
published_at 2026-04-04T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.108
published_at 2026-04-07T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10876
published_at 2026-04-08T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10929
published_at 2026-04-09T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.1093
published_at 2026-04-11T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10897
published_at 2026-04-12T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10874
published_at 2026-04-21T12:55:00Z
8
value 0.00036
scoring_system epss
scoring_elements 0.10734
published_at 2026-04-16T12:55:00Z
9
value 0.00036
scoring_system epss
scoring_elements 0.10747
published_at 2026-04-18T12:55:00Z
10
value 0.00036
scoring_system epss
scoring_elements 0.10834
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-54064
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54064
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2425018
reference_id 2425018
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2425018
5
reference_url https://access.redhat.com/errata/RHSA-2020:1769
reference_id RHSA-2020:1769
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1769
6
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
7
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-54064
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5hmr-mnq5-7yhr
17
url VCID-5tf2-unbh-1qat
vulnerability_id VCID-5tf2-unbh-1qat
summary kernel: ACPI: EC: Fix oops when removing custom query handlers
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54244.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54244.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-54244
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10911
published_at 2026-04-02T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10975
published_at 2026-04-04T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.108
published_at 2026-04-07T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10876
published_at 2026-04-08T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10929
published_at 2026-04-09T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.1093
published_at 2026-04-11T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10897
published_at 2026-04-12T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10874
published_at 2026-04-21T12:55:00Z
8
value 0.00036
scoring_system epss
scoring_elements 0.10734
published_at 2026-04-16T12:55:00Z
9
value 0.00036
scoring_system epss
scoring_elements 0.10747
published_at 2026-04-18T12:55:00Z
10
value 0.00036
scoring_system epss
scoring_elements 0.10834
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-54244
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54244
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2426096
reference_id 2426096
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2426096
5
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
6
reference_url https://access.redhat.com/errata/RHSA-2024:9315
reference_id RHSA-2024:9315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9315
fixed_packages
aliases CVE-2023-54244
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5tf2-unbh-1qat
18
url VCID-5wf1-v12t-gkcq
vulnerability_id VCID-5wf1-v12t-gkcq
summary kernel: usb: out-of-bounds read in read_descriptors
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37453.json
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37453.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-37453
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05555
published_at 2026-04-02T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05765
published_at 2026-04-24T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05592
published_at 2026-04-04T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.0559
published_at 2026-04-07T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05628
published_at 2026-04-08T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05653
published_at 2026-04-09T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05626
published_at 2026-04-11T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05618
published_at 2026-04-12T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05611
published_at 2026-04-13T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.05562
published_at 2026-04-16T12:55:00Z
10
value 0.00021
scoring_system epss
scoring_elements 0.05576
published_at 2026-04-18T12:55:00Z
11
value 0.00021
scoring_system epss
scoring_elements 0.05733
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-37453
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37453
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2221039
reference_id 2221039
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2221039
5
reference_url https://syzkaller.appspot.com/bug?extid=18996170f8096c6174d0
reference_id bug?extid=18996170f8096c6174d0
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:29:53Z/
url https://syzkaller.appspot.com/bug?extid=18996170f8096c6174d0
6
reference_url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1e4c574225cc5a0553115e5eb5787d1474db5b0f
reference_id ?id=1e4c574225cc5a0553115e5eb5787d1474db5b0f
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:29:53Z/
url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1e4c574225cc5a0553115e5eb5787d1474db5b0f
7
reference_url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=85d07c55621676d47d873d2749b88f783cd4d5a1
reference_id ?id=85d07c55621676d47d873d2749b88f783cd4d5a1
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:29:53Z/
url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=85d07c55621676d47d873d2749b88f783cd4d5a1
8
reference_url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=de28e469da75359a2bb8cd8778b78aa64b1be1f4
reference_id ?id=de28e469da75359a2bb8cd8778b78aa64b1be1f4
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:29:53Z/
url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=de28e469da75359a2bb8cd8778b78aa64b1be1f4
9
reference_url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ff33299ec8bb80cdcc073ad9c506bd79bb2ed20b
reference_id ?id=ff33299ec8bb80cdcc073ad9c506bd79bb2ed20b
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:29:53Z/
url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ff33299ec8bb80cdcc073ad9c506bd79bb2ed20b
10
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
11
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
12
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
13
reference_url https://lore.kernel.org/all/000000000000c0ffe505fe86c9ca%40google.com/T/
reference_id T
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:29:53Z/
url https://lore.kernel.org/all/000000000000c0ffe505fe86c9ca%40google.com/T/
14
reference_url https://lore.kernel.org/all/000000000000e56434059580f86e%40google.com/T/
reference_id T
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:29:53Z/
url https://lore.kernel.org/all/000000000000e56434059580f86e%40google.com/T/
15
reference_url https://usn.ubuntu.com/6415-1/
reference_id USN-6415-1
reference_type
scores
url https://usn.ubuntu.com/6415-1/
16
reference_url https://usn.ubuntu.com/6534-1/
reference_id USN-6534-1
reference_type
scores
url https://usn.ubuntu.com/6534-1/
17
reference_url https://usn.ubuntu.com/6534-2/
reference_id USN-6534-2
reference_type
scores
url https://usn.ubuntu.com/6534-2/
18
reference_url https://usn.ubuntu.com/6534-3/
reference_id USN-6534-3
reference_type
scores
url https://usn.ubuntu.com/6534-3/
19
reference_url https://usn.ubuntu.com/6548-1/
reference_id USN-6548-1
reference_type
scores
url https://usn.ubuntu.com/6548-1/
20
reference_url https://usn.ubuntu.com/6548-2/
reference_id USN-6548-2
reference_type
scores
url https://usn.ubuntu.com/6548-2/
21
reference_url https://usn.ubuntu.com/6548-3/
reference_id USN-6548-3
reference_type
scores
url https://usn.ubuntu.com/6548-3/
22
reference_url https://usn.ubuntu.com/6548-4/
reference_id USN-6548-4
reference_type
scores
url https://usn.ubuntu.com/6548-4/
23
reference_url https://usn.ubuntu.com/6548-5/
reference_id USN-6548-5
reference_type
scores
url https://usn.ubuntu.com/6548-5/
24
reference_url https://usn.ubuntu.com/6549-1/
reference_id USN-6549-1
reference_type
scores
url https://usn.ubuntu.com/6549-1/
25
reference_url https://usn.ubuntu.com/6549-2/
reference_id USN-6549-2
reference_type
scores
url https://usn.ubuntu.com/6549-2/
26
reference_url https://usn.ubuntu.com/6549-3/
reference_id USN-6549-3
reference_type
scores
url https://usn.ubuntu.com/6549-3/
27
reference_url https://usn.ubuntu.com/6549-4/
reference_id USN-6549-4
reference_type
scores
url https://usn.ubuntu.com/6549-4/
28
reference_url https://usn.ubuntu.com/6549-5/
reference_id USN-6549-5
reference_type
scores
url https://usn.ubuntu.com/6549-5/
29
reference_url https://usn.ubuntu.com/6635-1/
reference_id USN-6635-1
reference_type
scores
url https://usn.ubuntu.com/6635-1/
fixed_packages
aliases CVE-2023-37453
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5wf1-v12t-gkcq
19
url VCID-5z11-6c3t-ckd3
vulnerability_id VCID-5z11-6c3t-ckd3
summary kernel: team: NULL pointer dereference when team device type is changed
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52574.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52574.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-52574
reference_id
reference_type
scores
0
value 6e-05
scoring_system epss
scoring_elements 0.00433
published_at 2026-04-02T12:55:00Z
1
value 6e-05
scoring_system epss
scoring_elements 0.00442
published_at 2026-04-24T12:55:00Z
2
value 6e-05
scoring_system epss
scoring_elements 0.00432
published_at 2026-04-04T12:55:00Z
3
value 6e-05
scoring_system epss
scoring_elements 0.00424
published_at 2026-04-07T12:55:00Z
4
value 6e-05
scoring_system epss
scoring_elements 0.00421
published_at 2026-04-08T12:55:00Z
5
value 6e-05
scoring_system epss
scoring_elements 0.00423
published_at 2026-04-11T12:55:00Z
6
value 6e-05
scoring_system epss
scoring_elements 0.00418
published_at 2026-04-12T12:55:00Z
7
value 6e-05
scoring_system epss
scoring_elements 0.00416
published_at 2026-04-13T12:55:00Z
8
value 6e-05
scoring_system epss
scoring_elements 0.00412
published_at 2026-04-16T12:55:00Z
9
value 6e-05
scoring_system epss
scoring_elements 0.00415
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-52574
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52574
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52574
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/1779eb51b9cc628cee551f252701a85a2a50a457
reference_id 1779eb51b9cc628cee551f252701a85a2a50a457
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-06T20:45:03Z/
url https://git.kernel.org/stable/c/1779eb51b9cc628cee551f252701a85a2a50a457
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2267750
reference_id 2267750
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2267750
6
reference_url https://git.kernel.org/stable/c/2f0acb0736ecc3eb85dc80ad2790d634dcb10b58
reference_id 2f0acb0736ecc3eb85dc80ad2790d634dcb10b58
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-06T20:45:03Z/
url https://git.kernel.org/stable/c/2f0acb0736ecc3eb85dc80ad2790d634dcb10b58
7
reference_url https://git.kernel.org/stable/c/492032760127251e5540a5716a70996bacf2a3fd
reference_id 492032760127251e5540a5716a70996bacf2a3fd
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-06T20:45:03Z/
url https://git.kernel.org/stable/c/492032760127251e5540a5716a70996bacf2a3fd
8
reference_url https://git.kernel.org/stable/c/a7fb47b9711101d2405b0eb1276fb1f9b9b270c7
reference_id a7fb47b9711101d2405b0eb1276fb1f9b9b270c7
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-06T20:45:03Z/
url https://git.kernel.org/stable/c/a7fb47b9711101d2405b0eb1276fb1f9b9b270c7
9
reference_url https://git.kernel.org/stable/c/b44dd92e2afd89eb6e9d27616858e72a67bdc1a7
reference_id b44dd92e2afd89eb6e9d27616858e72a67bdc1a7
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-06T20:45:03Z/
url https://git.kernel.org/stable/c/b44dd92e2afd89eb6e9d27616858e72a67bdc1a7
10
reference_url https://git.kernel.org/stable/c/c5f6478686bb45f453031594ae19b6c9723a780d
reference_id c5f6478686bb45f453031594ae19b6c9723a780d
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-06T20:45:03Z/
url https://git.kernel.org/stable/c/c5f6478686bb45f453031594ae19b6c9723a780d
11
reference_url https://git.kernel.org/stable/c/cac50d9f5d876be32cb9aa21c74018468900284d
reference_id cac50d9f5d876be32cb9aa21c74018468900284d
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-06T20:45:03Z/
url https://git.kernel.org/stable/c/cac50d9f5d876be32cb9aa21c74018468900284d
12
reference_url https://git.kernel.org/stable/c/cd05eec2ee0cc396813a32ef675634e403748255
reference_id cd05eec2ee0cc396813a32ef675634e403748255
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-06T20:45:03Z/
url https://git.kernel.org/stable/c/cd05eec2ee0cc396813a32ef675634e403748255
13
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
14
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
15
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
16
reference_url https://usn.ubuntu.com/7853-1/
reference_id USN-7853-1
reference_type
scores
url https://usn.ubuntu.com/7853-1/
17
reference_url https://usn.ubuntu.com/7853-2/
reference_id USN-7853-2
reference_type
scores
url https://usn.ubuntu.com/7853-2/
18
reference_url https://usn.ubuntu.com/7853-3/
reference_id USN-7853-3
reference_type
scores
url https://usn.ubuntu.com/7853-3/
19
reference_url https://usn.ubuntu.com/7854-1/
reference_id USN-7854-1
reference_type
scores
url https://usn.ubuntu.com/7854-1/
20
reference_url https://usn.ubuntu.com/7863-1/
reference_id USN-7863-1
reference_type
scores
url https://usn.ubuntu.com/7863-1/
21
reference_url https://usn.ubuntu.com/7865-1/
reference_id USN-7865-1
reference_type
scores
url https://usn.ubuntu.com/7865-1/
22
reference_url https://usn.ubuntu.com/7875-1/
reference_id USN-7875-1
reference_type
scores
url https://usn.ubuntu.com/7875-1/
23
reference_url https://usn.ubuntu.com/7937-1/
reference_id USN-7937-1
reference_type
scores
url https://usn.ubuntu.com/7937-1/
fixed_packages
aliases CVE-2023-52574
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5z11-6c3t-ckd3
20
url VCID-67ha-wmbz-u7ea
vulnerability_id VCID-67ha-wmbz-u7ea
summary kernel: ACPI: APEI: Fix integer overflow in ghes_estatus_pool_init()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49885.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49885.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49885
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.12895
published_at 2026-04-02T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12794
published_at 2026-04-24T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.12748
published_at 2026-04-07T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12827
published_at 2026-04-08T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12878
published_at 2026-04-09T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.12845
published_at 2026-04-11T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.12806
published_at 2026-04-12T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.12762
published_at 2026-04-13T12:55:00Z
8
value 0.00042
scoring_system epss
scoring_elements 0.12665
published_at 2026-04-16T12:55:00Z
9
value 0.00042
scoring_system epss
scoring_elements 0.12671
published_at 2026-04-18T12:55:00Z
10
value 0.00042
scoring_system epss
scoring_elements 0.12775
published_at 2026-04-21T12:55:00Z
11
value 0.00042
scoring_system epss
scoring_elements 0.12945
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49885
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49885
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2363361
reference_id 2363361
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2363361
5
reference_url https://git.kernel.org/stable/c/43d2748394c3feb86c0c771466f5847e274fc043
reference_id 43d2748394c3feb86c0c771466f5847e274fc043
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:10:29Z/
url https://git.kernel.org/stable/c/43d2748394c3feb86c0c771466f5847e274fc043
6
reference_url https://git.kernel.org/stable/c/4c10c854113720cbfe75d4f51db79b700a629e73
reference_id 4c10c854113720cbfe75d4f51db79b700a629e73
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:10:29Z/
url https://git.kernel.org/stable/c/4c10c854113720cbfe75d4f51db79b700a629e73
7
reference_url https://git.kernel.org/stable/c/9edf20e5a1d805855e78f241cf221d741b50d482
reference_id 9edf20e5a1d805855e78f241cf221d741b50d482
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:10:29Z/
url https://git.kernel.org/stable/c/9edf20e5a1d805855e78f241cf221d741b50d482
8
reference_url https://git.kernel.org/stable/c/c50ec15725e005e9fb20bce69b6c23b135a4a9b7
reference_id c50ec15725e005e9fb20bce69b6c23b135a4a9b7
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T16:10:29Z/
url https://git.kernel.org/stable/c/c50ec15725e005e9fb20bce69b6c23b135a4a9b7
9
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
10
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2022-49885
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-67ha-wmbz-u7ea
21
url VCID-67u4-sdzt-w7ep
vulnerability_id VCID-67u4-sdzt-w7ep
summary kernel: i40e: Do not allow untrusted VF to remove administratively set MAC
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26830.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26830.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-26830
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01877
published_at 2026-04-08T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01874
published_at 2026-04-07T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.0189
published_at 2026-04-09T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01876
published_at 2026-04-11T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.0186
published_at 2026-04-12T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01855
published_at 2026-04-13T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01838
published_at 2026-04-16T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.01837
published_at 2026-04-18T12:55:00Z
8
value 0.00012
scoring_system epss
scoring_elements 0.01861
published_at 2026-04-02T12:55:00Z
9
value 0.00012
scoring_system epss
scoring_elements 0.01873
published_at 2026-04-04T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.0342
published_at 2026-04-21T12:55:00Z
11
value 0.00015
scoring_system epss
scoring_elements 0.03406
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-26830
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26830
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/1c981792e4ccbc134b468797acdd7781959e6893
reference_id 1c981792e4ccbc134b468797acdd7781959e6893
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:41:40Z/
url https://git.kernel.org/stable/c/1c981792e4ccbc134b468797acdd7781959e6893
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2275596
reference_id 2275596
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2275596
6
reference_url https://git.kernel.org/stable/c/73d9629e1c8c1982f13688c4d1019c3994647ccc
reference_id 73d9629e1c8c1982f13688c4d1019c3994647ccc
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:41:40Z/
url https://git.kernel.org/stable/c/73d9629e1c8c1982f13688c4d1019c3994647ccc
7
reference_url https://git.kernel.org/stable/c/be147926140ac48022c9605d7ab0a67387e4b404
reference_id be147926140ac48022c9605d7ab0a67387e4b404
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:41:40Z/
url https://git.kernel.org/stable/c/be147926140ac48022c9605d7ab0a67387e4b404
8
reference_url https://git.kernel.org/stable/c/d250a81ba813a93563be68072c563aa1e346346d
reference_id d250a81ba813a93563be68072c563aa1e346346d
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T17:41:40Z/
url https://git.kernel.org/stable/c/d250a81ba813a93563be68072c563aa1e346346d
9
reference_url https://access.redhat.com/errata/RHSA-2024:10941
reference_id RHSA-2024:10941
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10941
10
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
11
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
12
reference_url https://access.redhat.com/errata/RHSA-2024:8161
reference_id RHSA-2024:8161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8161
13
reference_url https://access.redhat.com/errata/RHSA-2025:0063
reference_id RHSA-2025:0063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0063
14
reference_url https://access.redhat.com/errata/RHSA-2025:0064
reference_id RHSA-2025:0064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0064
15
reference_url https://usn.ubuntu.com/6895-1/
reference_id USN-6895-1
reference_type
scores
url https://usn.ubuntu.com/6895-1/
16
reference_url https://usn.ubuntu.com/6895-2/
reference_id USN-6895-2
reference_type
scores
url https://usn.ubuntu.com/6895-2/
17
reference_url https://usn.ubuntu.com/6895-3/
reference_id USN-6895-3
reference_type
scores
url https://usn.ubuntu.com/6895-3/
18
reference_url https://usn.ubuntu.com/6895-4/
reference_id USN-6895-4
reference_type
scores
url https://usn.ubuntu.com/6895-4/
19
reference_url https://usn.ubuntu.com/6900-1/
reference_id USN-6900-1
reference_type
scores
url https://usn.ubuntu.com/6900-1/
20
reference_url https://usn.ubuntu.com/6973-1/
reference_id USN-6973-1
reference_type
scores
url https://usn.ubuntu.com/6973-1/
21
reference_url https://usn.ubuntu.com/6973-2/
reference_id USN-6973-2
reference_type
scores
url https://usn.ubuntu.com/6973-2/
22
reference_url https://usn.ubuntu.com/6973-3/
reference_id USN-6973-3
reference_type
scores
url https://usn.ubuntu.com/6973-3/
23
reference_url https://usn.ubuntu.com/6973-4/
reference_id USN-6973-4
reference_type
scores
url https://usn.ubuntu.com/6973-4/
24
reference_url https://usn.ubuntu.com/6974-1/
reference_id USN-6974-1
reference_type
scores
url https://usn.ubuntu.com/6974-1/
25
reference_url https://usn.ubuntu.com/6974-2/
reference_id USN-6974-2
reference_type
scores
url https://usn.ubuntu.com/6974-2/
26
reference_url https://usn.ubuntu.com/7006-1/
reference_id USN-7006-1
reference_type
scores
url https://usn.ubuntu.com/7006-1/
27
reference_url https://usn.ubuntu.com/7019-1/
reference_id USN-7019-1
reference_type
scores
url https://usn.ubuntu.com/7019-1/
fixed_packages
aliases CVE-2024-26830
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-67u4-sdzt-w7ep
22
url VCID-73fa-zuvg-p3cu
vulnerability_id VCID-73fa-zuvg-p3cu
summary kernel: bpf, cpumap: Make sure kthread is running before map update returns
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53577.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53577.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53577
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03458
published_at 2026-04-02T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03471
published_at 2026-04-04T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03484
published_at 2026-04-07T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03487
published_at 2026-04-08T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03509
published_at 2026-04-09T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03464
published_at 2026-04-11T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03436
published_at 2026-04-12T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03411
published_at 2026-04-13T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03387
published_at 2026-04-16T12:55:00Z
9
value 0.00016
scoring_system epss
scoring_elements 0.03399
published_at 2026-04-18T12:55:00Z
10
value 0.00016
scoring_system epss
scoring_elements 0.03516
published_at 2026-04-21T12:55:00Z
11
value 0.00016
scoring_system epss
scoring_elements 0.03522
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53577
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53577
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2401573
reference_id 2401573
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2401573
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53577
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-73fa-zuvg-p3cu
23
url VCID-7b8b-jzma-4qc2
vulnerability_id VCID-7b8b-jzma-4qc2
summary kernel: smb: client: fix potential OOBs in smb2_parse_contexts()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52434.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52434.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-52434
reference_id
reference_type
scores
0
value 0.00094
scoring_system epss
scoring_elements 0.2638
published_at 2026-04-02T12:55:00Z
1
value 0.00094
scoring_system epss
scoring_elements 0.26081
published_at 2026-04-24T12:55:00Z
2
value 0.00094
scoring_system epss
scoring_elements 0.2631
published_at 2026-04-09T12:55:00Z
3
value 0.00094
scoring_system epss
scoring_elements 0.26317
published_at 2026-04-11T12:55:00Z
4
value 0.00094
scoring_system epss
scoring_elements 0.26271
published_at 2026-04-12T12:55:00Z
5
value 0.00094
scoring_system epss
scoring_elements 0.26213
published_at 2026-04-13T12:55:00Z
6
value 0.00094
scoring_system epss
scoring_elements 0.26218
published_at 2026-04-16T12:55:00Z
7
value 0.00094
scoring_system epss
scoring_elements 0.26194
published_at 2026-04-18T12:55:00Z
8
value 0.00094
scoring_system epss
scoring_elements 0.26156
published_at 2026-04-21T12:55:00Z
9
value 0.00094
scoring_system epss
scoring_elements 0.26421
published_at 2026-04-04T12:55:00Z
10
value 0.00094
scoring_system epss
scoring_elements 0.26195
published_at 2026-04-07T12:55:00Z
11
value 0.00094
scoring_system epss
scoring_elements 0.26262
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-52434
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47233
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47233
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52429
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52429
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52434
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52435
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52458
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52458
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52482
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52486
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52489
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52491
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52492
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52493
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52498
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52587
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52587
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52594
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52595
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52597
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52598
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52599
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52600
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52601
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52602
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52603
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52604
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52606
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52615
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52616
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52617
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52618
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52619
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52622
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52623
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52627
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52627
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52635
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52637
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52642
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0340
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0607
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1151
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23849
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851
58
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24857
59
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24858
60
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24861
61
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26581
62
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26593
63
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26600
64
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601
65
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602
66
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26606
67
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26610
68
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614
69
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615
70
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26622
71
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26625
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26625
72
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26627
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26627
73
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26635
74
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26636
75
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26640
76
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641
77
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642
78
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643
79
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26644
80
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26645
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26645
81
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651
82
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26654
83
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26659
84
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663
85
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26664
86
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26665
87
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26671
88
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26673
89
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675
90
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26679
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26679
91
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26684
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26684
92
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26685
93
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26687
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26687
94
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688
95
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689
96
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26695
97
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26696
98
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26697
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26697
99
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26698
100
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26702
101
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704
102
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26707
103
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26712
104
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26722
105
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26727
106
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733
107
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735
108
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26736
109
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743
110
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744
111
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747
112
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26748
113
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26749
114
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26751
115
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26752
116
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26753
117
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754
118
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763
119
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764
120
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766
121
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771
122
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772
123
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773
124
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26776
125
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777
126
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778
127
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779
128
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26781
129
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782
130
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26787
131
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26788
132
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26790
133
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791
134
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793
135
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26795
136
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801
137
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804
138
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805
139
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26808
140
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26809
141
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26810
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26810
142
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26812
143
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26813
144
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26814
145
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816
146
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817
147
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26820
148
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26825
149
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26833
150
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26835
151
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839
152
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840
153
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26843
154
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26845
155
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26846
156
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26851
157
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852
158
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855
159
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857
160
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859
161
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26861
162
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26862
163
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863
164
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26870
165
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26872
166
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26874
167
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26875
168
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26877
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26877
169
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878
170
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26880
171
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26882
172
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883
173
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884
174
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885
175
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889
176
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891
177
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26894
178
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26895
179
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26897
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26897
180
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898
181
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901
182
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903
183
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906
184
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907
185
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26910
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26910
186
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26917
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26917
187
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922
188
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923
189
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26924
190
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925
191
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26926
192
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931
193
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26934
194
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935
195
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26937
196
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26950
197
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26951
198
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26955
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26955
199
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26956
200
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26957
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26957
201
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26958
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26958
202
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960
203
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961
204
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26965
205
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26966
206
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26969
207
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26970
208
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26973
209
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974
210
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976
211
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26978
212
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26981
213
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26984
214
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26988
215
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993
216
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26994
217
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26997
218
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26999
219
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27000
220
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27001
221
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27004
222
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008
223
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013
224
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020
225
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27024
226
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27025
227
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27028
228
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27030
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27030
229
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27038
230
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043
231
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27044
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27044
232
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27045
233
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046
234
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27047
235
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051
236
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27052
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27052
237
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27053
238
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27059
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27059
239
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065
240
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073
241
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074
242
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075
243
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27076
244
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27077
245
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078
246
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388
247
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437
248
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
249
reference_url https://git.kernel.org/stable/c/13fb0fc4917621f3dfa285a27eaf7151d770b5e5
reference_id 13fb0fc4917621f3dfa285a27eaf7151d770b5e5
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-20T19:31:41Z/
url https://git.kernel.org/stable/c/13fb0fc4917621f3dfa285a27eaf7151d770b5e5
250
reference_url https://git.kernel.org/stable/c/17a0f64cc02d4972e21c733d9f21d1c512963afa
reference_id 17a0f64cc02d4972e21c733d9f21d1c512963afa
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-20T19:31:41Z/
url https://git.kernel.org/stable/c/17a0f64cc02d4972e21c733d9f21d1c512963afa
251
reference_url https://git.kernel.org/stable/c/1ae3c59355dc9882e09c020afe8ffbd895ad0f29
reference_id 1ae3c59355dc9882e09c020afe8ffbd895ad0f29
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-20T19:31:41Z/
url https://git.kernel.org/stable/c/1ae3c59355dc9882e09c020afe8ffbd895ad0f29
252
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2265285
reference_id 2265285
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2265285
253
reference_url https://git.kernel.org/stable/c/6726429c18c62dbf5e96ebbd522f262e016553fb
reference_id 6726429c18c62dbf5e96ebbd522f262e016553fb
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-20T19:31:41Z/
url https://git.kernel.org/stable/c/6726429c18c62dbf5e96ebbd522f262e016553fb
254
reference_url https://git.kernel.org/stable/c/890bc4fac3c0973a49cac35f634579bebba7fe48
reference_id 890bc4fac3c0973a49cac35f634579bebba7fe48
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-20T19:31:41Z/
url https://git.kernel.org/stable/c/890bc4fac3c0973a49cac35f634579bebba7fe48
255
reference_url https://git.kernel.org/stable/c/af1689a9b7701d9907dfc84d2a4b57c4bc907144
reference_id af1689a9b7701d9907dfc84d2a4b57c4bc907144
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-20T19:31:41Z/
url https://git.kernel.org/stable/c/af1689a9b7701d9907dfc84d2a4b57c4bc907144
256
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
257
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
258
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
259
reference_url https://access.redhat.com/errata/RHSA-2024:4412
reference_id RHSA-2024:4412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4412
260
reference_url https://access.redhat.com/errata/RHSA-2024:4415
reference_id RHSA-2024:4415
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4415
261
reference_url https://access.redhat.com/errata/RHSA-2024:4823
reference_id RHSA-2024:4823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4823
262
reference_url https://access.redhat.com/errata/RHSA-2024:4831
reference_id RHSA-2024:4831
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4831
263
reference_url https://access.redhat.com/errata/RHSA-2024:5692
reference_id RHSA-2024:5692
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5692
264
reference_url https://access.redhat.com/errata/RHSA-2024:6993
reference_id RHSA-2024:6993
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6993
265
reference_url https://usn.ubuntu.com/6724-1/
reference_id USN-6724-1
reference_type
scores
url https://usn.ubuntu.com/6724-1/
266
reference_url https://usn.ubuntu.com/6724-2/
reference_id USN-6724-2
reference_type
scores
url https://usn.ubuntu.com/6724-2/
267
reference_url https://usn.ubuntu.com/6820-1/
reference_id USN-6820-1
reference_type
scores
url https://usn.ubuntu.com/6820-1/
268
reference_url https://usn.ubuntu.com/6820-2/
reference_id USN-6820-2
reference_type
scores
url https://usn.ubuntu.com/6820-2/
269
reference_url https://usn.ubuntu.com/6821-1/
reference_id USN-6821-1
reference_type
scores
url https://usn.ubuntu.com/6821-1/
270
reference_url https://usn.ubuntu.com/6821-2/
reference_id USN-6821-2
reference_type
scores
url https://usn.ubuntu.com/6821-2/
271
reference_url https://usn.ubuntu.com/6821-3/
reference_id USN-6821-3
reference_type
scores
url https://usn.ubuntu.com/6821-3/
272
reference_url https://usn.ubuntu.com/6821-4/
reference_id USN-6821-4
reference_type
scores
url https://usn.ubuntu.com/6821-4/
273
reference_url https://usn.ubuntu.com/6828-1/
reference_id USN-6828-1
reference_type
scores
url https://usn.ubuntu.com/6828-1/
274
reference_url https://usn.ubuntu.com/6871-1/
reference_id USN-6871-1
reference_type
scores
url https://usn.ubuntu.com/6871-1/
275
reference_url https://usn.ubuntu.com/6892-1/
reference_id USN-6892-1
reference_type
scores
url https://usn.ubuntu.com/6892-1/
276
reference_url https://usn.ubuntu.com/6919-1/
reference_id USN-6919-1
reference_type
scores
url https://usn.ubuntu.com/6919-1/
277
reference_url https://usn.ubuntu.com/6951-1/
reference_id USN-6951-1
reference_type
scores
url https://usn.ubuntu.com/6951-1/
278
reference_url https://usn.ubuntu.com/6951-2/
reference_id USN-6951-2
reference_type
scores
url https://usn.ubuntu.com/6951-2/
279
reference_url https://usn.ubuntu.com/6951-3/
reference_id USN-6951-3
reference_type
scores
url https://usn.ubuntu.com/6951-3/
280
reference_url https://usn.ubuntu.com/6951-4/
reference_id USN-6951-4
reference_type
scores
url https://usn.ubuntu.com/6951-4/
281
reference_url https://usn.ubuntu.com/6953-1/
reference_id USN-6953-1
reference_type
scores
url https://usn.ubuntu.com/6953-1/
282
reference_url https://usn.ubuntu.com/6979-1/
reference_id USN-6979-1
reference_type
scores
url https://usn.ubuntu.com/6979-1/
283
reference_url https://usn.ubuntu.com/7123-1/
reference_id USN-7123-1
reference_type
scores
url https://usn.ubuntu.com/7123-1/
284
reference_url https://usn.ubuntu.com/7194-1/
reference_id USN-7194-1
reference_type
scores
url https://usn.ubuntu.com/7194-1/
fixed_packages
aliases CVE-2023-52434
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7b8b-jzma-4qc2
24
url VCID-7rr7-7tmp-2fg9
vulnerability_id VCID-7rr7-7tmp-2fg9
summary kernel: ext4: add EXT4_IGET_BAD flag to prevent unexpected bad inode
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50485.json
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50485.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50485
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.02951
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.02965
published_at 2026-04-04T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.02973
published_at 2026-04-07T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.02975
published_at 2026-04-08T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03
published_at 2026-04-09T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.0296
published_at 2026-04-11T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.02937
published_at 2026-04-12T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.02927
published_at 2026-04-13T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.02902
published_at 2026-04-16T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.02912
published_at 2026-04-18T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03029
published_at 2026-04-21T12:55:00Z
11
value 0.00015
scoring_system epss
scoring_elements 0.03027
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50485
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50485
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2401531
reference_id 2401531
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2401531
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2022-50485
risk_score 2.5
exploitability 0.5
weighted_severity 5.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7rr7-7tmp-2fg9
25
url VCID-7zav-ajzv-xybc
vulnerability_id VCID-7zav-ajzv-xybc
summary kernel: ext4: silence the warning when evicting inode with dioread_nolock
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50730.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50730.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50730
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07494
published_at 2026-04-02T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07533
published_at 2026-04-04T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07514
published_at 2026-04-07T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07573
published_at 2026-04-08T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07593
published_at 2026-04-09T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.0759
published_at 2026-04-11T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07576
published_at 2026-04-12T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07564
published_at 2026-04-13T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07488
published_at 2026-04-16T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07476
published_at 2026-04-18T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07608
published_at 2026-04-21T12:55:00Z
11
value 0.00027
scoring_system epss
scoring_elements 0.07569
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50730
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50730
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2425043
reference_id 2425043
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2425043
5
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2022-50730
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7zav-ajzv-xybc
26
url VCID-8en8-usp9-gfgp
vulnerability_id VCID-8en8-usp9-gfgp
summary kernel: cpufreq: amd-pstate: fix global sysfs attribute type
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53550.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53550.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53550
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04741
published_at 2026-04-02T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04764
published_at 2026-04-04T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04779
published_at 2026-04-07T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04812
published_at 2026-04-11T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04825
published_at 2026-04-09T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.0479
published_at 2026-04-12T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.0477
published_at 2026-04-13T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04723
published_at 2026-04-16T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04731
published_at 2026-04-18T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.04875
published_at 2026-04-21T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04912
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53550
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2401463
reference_id 2401463
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2401463
4
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
5
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53550
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8en8-usp9-gfgp
27
url VCID-8tnf-q5r9-67au
vulnerability_id VCID-8tnf-q5r9-67au
summary kernel: icmp6: Fix null-ptr-deref of ip6_null_entry->rt6i_idev in icmp6_dev()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53343.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53343.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53343
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.02951
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.02937
published_at 2026-04-12T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.0296
published_at 2026-04-11T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03
published_at 2026-04-09T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.02975
published_at 2026-04-08T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.02965
published_at 2026-04-04T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.02973
published_at 2026-04-07T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.04166
published_at 2026-04-24T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.0403
published_at 2026-04-13T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.04019
published_at 2026-04-16T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.04031
published_at 2026-04-18T12:55:00Z
11
value 0.00017
scoring_system epss
scoring_elements 0.04154
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53343
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53343
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/1462e9d9aa52d14665eaca6d89d22c4af44ede04
reference_id 1462e9d9aa52d14665eaca6d89d22c4af44ede04
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:39:18Z/
url https://git.kernel.org/stable/c/1462e9d9aa52d14665eaca6d89d22c4af44ede04
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2396136
reference_id 2396136
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2396136
6
reference_url https://git.kernel.org/stable/c/2aaa8a15de73874847d62eb595c6683bface80fd
reference_id 2aaa8a15de73874847d62eb595c6683bface80fd
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:39:18Z/
url https://git.kernel.org/stable/c/2aaa8a15de73874847d62eb595c6683bface80fd
7
reference_url https://git.kernel.org/stable/c/3fabca5d9cae0140b6aad09a1c6b9aa57089fbb8
reference_id 3fabca5d9cae0140b6aad09a1c6b9aa57089fbb8
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:39:18Z/
url https://git.kernel.org/stable/c/3fabca5d9cae0140b6aad09a1c6b9aa57089fbb8
8
reference_url https://git.kernel.org/stable/c/61b4c4659746959056450b92a5d7e6bc1243b31b
reference_id 61b4c4659746959056450b92a5d7e6bc1243b31b
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:39:18Z/
url https://git.kernel.org/stable/c/61b4c4659746959056450b92a5d7e6bc1243b31b
9
reference_url https://git.kernel.org/stable/c/8803c59fde4dd370a627dfbf7183682fa0cabf70
reference_id 8803c59fde4dd370a627dfbf7183682fa0cabf70
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:39:18Z/
url https://git.kernel.org/stable/c/8803c59fde4dd370a627dfbf7183682fa0cabf70
10
reference_url https://git.kernel.org/stable/c/aa657d319e6c7502a4eb85cc0ee80cc81b8e5724
reference_id aa657d319e6c7502a4eb85cc0ee80cc81b8e5724
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:39:18Z/
url https://git.kernel.org/stable/c/aa657d319e6c7502a4eb85cc0ee80cc81b8e5724
11
reference_url https://git.kernel.org/stable/c/d30ddd7ff15df9d91a793ce3f06f0190ff7afacc
reference_id d30ddd7ff15df9d91a793ce3f06f0190ff7afacc
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:39:18Z/
url https://git.kernel.org/stable/c/d30ddd7ff15df9d91a793ce3f06f0190ff7afacc
12
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
13
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53343
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8tnf-q5r9-67au
28
url VCID-8xcv-aysz-w3ds
vulnerability_id VCID-8xcv-aysz-w3ds
summary kernel: highmem: fix checks in __kmap_local_sched_{in,out}
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49081.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49081.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49081
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01562
published_at 2026-04-11T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05532
published_at 2026-04-24T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.0539
published_at 2026-04-12T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05381
published_at 2026-04-13T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05332
published_at 2026-04-16T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05333
published_at 2026-04-18T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.05492
published_at 2026-04-21T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10785
published_at 2026-04-02T12:55:00Z
8
value 0.00036
scoring_system epss
scoring_elements 0.10848
published_at 2026-04-04T12:55:00Z
9
value 0.00054
scoring_system epss
scoring_elements 0.16983
published_at 2026-04-07T12:55:00Z
10
value 0.00054
scoring_system epss
scoring_elements 0.17073
published_at 2026-04-08T12:55:00Z
11
value 0.00054
scoring_system epss
scoring_elements 0.1713
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49081
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347739
reference_id 2347739
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347739
4
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
5
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2022-49081
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8xcv-aysz-w3ds
29
url VCID-9ucy-kbah-yyae
vulnerability_id VCID-9ucy-kbah-yyae
summary kernel: scsi: qedf: Fix NULL dereference in error handling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54289.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54289.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-54289
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10911
published_at 2026-04-02T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10975
published_at 2026-04-04T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.108
published_at 2026-04-07T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10876
published_at 2026-04-08T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10929
published_at 2026-04-09T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.1093
published_at 2026-04-11T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10897
published_at 2026-04-12T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10874
published_at 2026-04-21T12:55:00Z
8
value 0.00036
scoring_system epss
scoring_elements 0.10734
published_at 2026-04-16T12:55:00Z
9
value 0.00036
scoring_system epss
scoring_elements 0.10747
published_at 2026-04-18T12:55:00Z
10
value 0.00036
scoring_system epss
scoring_elements 0.10834
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-54289
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54289
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2426167
reference_id 2426167
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2426167
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-54289
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9ucy-kbah-yyae
30
url VCID-9ybb-bzq2-cueb
vulnerability_id VCID-9ybb-bzq2-cueb
summary kernel: ceph: fix potential use-after-free bug when trimming caps
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53867.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53867.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53867
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07346
published_at 2026-04-02T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.0739
published_at 2026-04-04T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.07372
published_at 2026-04-07T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07427
published_at 2026-04-08T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.07451
published_at 2026-04-09T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.07437
published_at 2026-04-11T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.07424
published_at 2026-04-12T12:55:00Z
7
value 0.00026
scoring_system epss
scoring_elements 0.07413
published_at 2026-04-13T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.07341
published_at 2026-04-16T12:55:00Z
9
value 0.00026
scoring_system epss
scoring_elements 0.07329
published_at 2026-04-18T12:55:00Z
10
value 0.00026
scoring_system epss
scoring_elements 0.07456
published_at 2026-04-21T12:55:00Z
11
value 0.00026
scoring_system epss
scoring_elements 0.07417
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53867
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53867
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2424984
reference_id 2424984
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2424984
5
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53867
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9ybb-bzq2-cueb
31
url VCID-a67m-rg36-aqgw
vulnerability_id VCID-a67m-rg36-aqgw
summary kernel: scsi: target: Fix multiple LUN_RESET handling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53586.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53586.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53586
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03055
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03068
published_at 2026-04-07T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03073
published_at 2026-04-08T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03098
published_at 2026-04-09T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.0306
published_at 2026-04-11T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03036
published_at 2026-04-12T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.03025
published_at 2026-04-13T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03002
published_at 2026-04-16T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.03011
published_at 2026-04-18T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03131
published_at 2026-04-21T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03137
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53586
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53586
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2401541
reference_id 2401541
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2401541
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53586
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a67m-rg36-aqgw
32
url VCID-acs7-w3pn-eybs
vulnerability_id VCID-acs7-w3pn-eybs
summary kernel: Bluetooth: L2CAP: Fix u8 overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48947.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48947.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-48947
reference_id
reference_type
scores
0
value 7e-05
scoring_system epss
scoring_elements 0.00445
published_at 2026-04-02T12:55:00Z
1
value 7e-05
scoring_system epss
scoring_elements 0.00459
published_at 2026-04-24T12:55:00Z
2
value 7e-05
scoring_system epss
scoring_elements 0.00444
published_at 2026-04-04T12:55:00Z
3
value 7e-05
scoring_system epss
scoring_elements 0.00436
published_at 2026-04-11T12:55:00Z
4
value 7e-05
scoring_system epss
scoring_elements 0.00433
published_at 2026-04-08T12:55:00Z
5
value 7e-05
scoring_system epss
scoring_elements 0.00435
published_at 2026-04-09T12:55:00Z
6
value 7e-05
scoring_system epss
scoring_elements 0.00431
published_at 2026-04-12T12:55:00Z
7
value 7e-05
scoring_system epss
scoring_elements 0.0043
published_at 2026-04-13T12:55:00Z
8
value 7e-05
scoring_system epss
scoring_elements 0.00427
published_at 2026-04-16T12:55:00Z
9
value 7e-05
scoring_system epss
scoring_elements 0.00432
published_at 2026-04-18T12:55:00Z
10
value 7e-05
scoring_system epss
scoring_elements 0.00461
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-48947
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48947
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/19a78143961a197de8502f4f29c453b913dc3c29
reference_id 19a78143961a197de8502f4f29c453b913dc3c29
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:22:07Z/
url https://git.kernel.org/stable/c/19a78143961a197de8502f4f29c453b913dc3c29
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2320770
reference_id 2320770
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2320770
6
reference_url https://git.kernel.org/stable/c/49d5867819ab7c744852b45509e8469839c07e0e
reference_id 49d5867819ab7c744852b45509e8469839c07e0e
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:22:07Z/
url https://git.kernel.org/stable/c/49d5867819ab7c744852b45509e8469839c07e0e
7
reference_url https://git.kernel.org/stable/c/5550bbf709c323194881737fd290c4bada9e6ead
reference_id 5550bbf709c323194881737fd290c4bada9e6ead
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:22:07Z/
url https://git.kernel.org/stable/c/5550bbf709c323194881737fd290c4bada9e6ead
8
reference_url https://git.kernel.org/stable/c/95f1847a361c7b4bf7d74c06ecb6968455082c1a
reference_id 95f1847a361c7b4bf7d74c06ecb6968455082c1a
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:22:07Z/
url https://git.kernel.org/stable/c/95f1847a361c7b4bf7d74c06ecb6968455082c1a
9
reference_url https://git.kernel.org/stable/c/9fdc79b571434af7bc742da40a3405f038b637a7
reference_id 9fdc79b571434af7bc742da40a3405f038b637a7
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:22:07Z/
url https://git.kernel.org/stable/c/9fdc79b571434af7bc742da40a3405f038b637a7
10
reference_url https://git.kernel.org/stable/c/ad528fde0702903208d0a79d88d5a42ae3fc235b
reference_id ad528fde0702903208d0a79d88d5a42ae3fc235b
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:22:07Z/
url https://git.kernel.org/stable/c/ad528fde0702903208d0a79d88d5a42ae3fc235b
11
reference_url https://git.kernel.org/stable/c/bcd70260ef56e0aee8a4fc6cd214a419900b0765
reference_id bcd70260ef56e0aee8a4fc6cd214a419900b0765
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:22:07Z/
url https://git.kernel.org/stable/c/bcd70260ef56e0aee8a4fc6cd214a419900b0765
12
reference_url https://git.kernel.org/stable/c/f3fe6817156a2ad4b06f01afab04638a34d7c9a6
reference_id f3fe6817156a2ad4b06f01afab04638a34d7c9a6
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T13:22:07Z/
url https://git.kernel.org/stable/c/f3fe6817156a2ad4b06f01afab04638a34d7c9a6
13
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
14
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2022-48947
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-acs7-w3pn-eybs
33
url VCID-ajp8-kr6j-nyhv
vulnerability_id VCID-ajp8-kr6j-nyhv
summary kernel: integer overflow in l2cap_config_req() in net/bluetooth/l2cap_core.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45934.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45934.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-45934
reference_id
reference_type
scores
0
value 0.00409
scoring_system epss
scoring_elements 0.61193
published_at 2026-04-02T12:55:00Z
1
value 0.00409
scoring_system epss
scoring_elements 0.61252
published_at 2026-04-24T12:55:00Z
2
value 0.00409
scoring_system epss
scoring_elements 0.61221
published_at 2026-04-04T12:55:00Z
3
value 0.00409
scoring_system epss
scoring_elements 0.61188
published_at 2026-04-07T12:55:00Z
4
value 0.00409
scoring_system epss
scoring_elements 0.61235
published_at 2026-04-08T12:55:00Z
5
value 0.00409
scoring_system epss
scoring_elements 0.6125
published_at 2026-04-09T12:55:00Z
6
value 0.00409
scoring_system epss
scoring_elements 0.6127
published_at 2026-04-11T12:55:00Z
7
value 0.00409
scoring_system epss
scoring_elements 0.61256
published_at 2026-04-12T12:55:00Z
8
value 0.00409
scoring_system epss
scoring_elements 0.61238
published_at 2026-04-13T12:55:00Z
9
value 0.00409
scoring_system epss
scoring_elements 0.61277
published_at 2026-04-16T12:55:00Z
10
value 0.00409
scoring_system epss
scoring_elements 0.61282
published_at 2026-04-18T12:55:00Z
11
value 0.00409
scoring_system epss
scoring_elements 0.61263
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-45934
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2151959
reference_id 2151959
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2151959
17
reference_url https://www.debian.org/security/2023/dsa-5324
reference_id dsa-5324
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-29T13:40:38Z/
url https://www.debian.org/security/2023/dsa-5324
18
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=ae4569813a6e931258db627cdfe50dfb4f917d5d
reference_id ?id=ae4569813a6e931258db627cdfe50dfb4f917d5d
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-29T13:40:38Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=ae4569813a6e931258db627cdfe50dfb4f917d5d
19
reference_url https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
reference_id msg00000.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-29T13:40:38Z/
url https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
20
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-29T13:40:38Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NDAKCGDW6CQ6G3RZWYZJO454R3L5CTQB/
reference_id NDAKCGDW6CQ6G3RZWYZJO454R3L5CTQB
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-29T13:40:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NDAKCGDW6CQ6G3RZWYZJO454R3L5CTQB/
22
reference_url https://security.netapp.com/advisory/ntap-20230113-0008/
reference_id ntap-20230113-0008
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-29T13:40:38Z/
url https://security.netapp.com/advisory/ntap-20230113-0008/
23
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
24
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
25
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
26
reference_url https://usn.ubuntu.com/5794-1/
reference_id USN-5794-1
reference_type
scores
url https://usn.ubuntu.com/5794-1/
27
reference_url https://usn.ubuntu.com/5802-1/
reference_id USN-5802-1
reference_type
scores
url https://usn.ubuntu.com/5802-1/
28
reference_url https://usn.ubuntu.com/5803-1/
reference_id USN-5803-1
reference_type
scores
url https://usn.ubuntu.com/5803-1/
29
reference_url https://usn.ubuntu.com/5804-1/
reference_id USN-5804-1
reference_type
scores
url https://usn.ubuntu.com/5804-1/
30
reference_url https://usn.ubuntu.com/5804-2/
reference_id USN-5804-2
reference_type
scores
url https://usn.ubuntu.com/5804-2/
31
reference_url https://usn.ubuntu.com/5808-1/
reference_id USN-5808-1
reference_type
scores
url https://usn.ubuntu.com/5808-1/
32
reference_url https://usn.ubuntu.com/5809-1/
reference_id USN-5809-1
reference_type
scores
url https://usn.ubuntu.com/5809-1/
33
reference_url https://usn.ubuntu.com/5813-1/
reference_id USN-5813-1
reference_type
scores
url https://usn.ubuntu.com/5813-1/
34
reference_url https://usn.ubuntu.com/5814-1/
reference_id USN-5814-1
reference_type
scores
url https://usn.ubuntu.com/5814-1/
35
reference_url https://usn.ubuntu.com/5829-1/
reference_id USN-5829-1
reference_type
scores
url https://usn.ubuntu.com/5829-1/
36
reference_url https://usn.ubuntu.com/5830-1/
reference_id USN-5830-1
reference_type
scores
url https://usn.ubuntu.com/5830-1/
37
reference_url https://usn.ubuntu.com/5831-1/
reference_id USN-5831-1
reference_type
scores
url https://usn.ubuntu.com/5831-1/
38
reference_url https://usn.ubuntu.com/5832-1/
reference_id USN-5832-1
reference_type
scores
url https://usn.ubuntu.com/5832-1/
39
reference_url https://usn.ubuntu.com/5858-1/
reference_id USN-5858-1
reference_type
scores
url https://usn.ubuntu.com/5858-1/
40
reference_url https://usn.ubuntu.com/5860-1/
reference_id USN-5860-1
reference_type
scores
url https://usn.ubuntu.com/5860-1/
41
reference_url https://usn.ubuntu.com/5861-1/
reference_id USN-5861-1
reference_type
scores
url https://usn.ubuntu.com/5861-1/
42
reference_url https://usn.ubuntu.com/5863-1/
reference_id USN-5863-1
reference_type
scores
url https://usn.ubuntu.com/5863-1/
43
reference_url https://usn.ubuntu.com/5875-1/
reference_id USN-5875-1
reference_type
scores
url https://usn.ubuntu.com/5875-1/
44
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
45
reference_url https://usn.ubuntu.com/5879-1/
reference_id USN-5879-1
reference_type
scores
url https://usn.ubuntu.com/5879-1/
46
reference_url https://usn.ubuntu.com/5914-1/
reference_id USN-5914-1
reference_type
scores
url https://usn.ubuntu.com/5914-1/
47
reference_url https://usn.ubuntu.com/5918-1/
reference_id USN-5918-1
reference_type
scores
url https://usn.ubuntu.com/5918-1/
fixed_packages
aliases CVE-2022-45934
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ajp8-kr6j-nyhv
34
url VCID-apaa-8wdp-cyfq
vulnerability_id VCID-apaa-8wdp-cyfq
summary kernel: improper input validation may lead to privilege escalation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4204.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4204.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4204
reference_id
reference_type
scores
0
value 0.00767
scoring_system epss
scoring_elements 0.73414
published_at 2026-04-01T12:55:00Z
1
value 0.00767
scoring_system epss
scoring_elements 0.73422
published_at 2026-04-02T12:55:00Z
2
value 0.00767
scoring_system epss
scoring_elements 0.73445
published_at 2026-04-04T12:55:00Z
3
value 0.00767
scoring_system epss
scoring_elements 0.73417
published_at 2026-04-07T12:55:00Z
4
value 0.00767
scoring_system epss
scoring_elements 0.73454
published_at 2026-04-08T12:55:00Z
5
value 0.00767
scoring_system epss
scoring_elements 0.73468
published_at 2026-04-09T12:55:00Z
6
value 0.00767
scoring_system epss
scoring_elements 0.73491
published_at 2026-04-11T12:55:00Z
7
value 0.00767
scoring_system epss
scoring_elements 0.73471
published_at 2026-04-12T12:55:00Z
8
value 0.00767
scoring_system epss
scoring_elements 0.73463
published_at 2026-04-13T12:55:00Z
9
value 0.00767
scoring_system epss
scoring_elements 0.73505
published_at 2026-04-16T12:55:00Z
10
value 0.00767
scoring_system epss
scoring_elements 0.73514
published_at 2026-04-18T12:55:00Z
11
value 0.00767
scoring_system epss
scoring_elements 0.73508
published_at 2026-04-21T12:55:00Z
12
value 0.00767
scoring_system epss
scoring_elements 0.73541
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4204
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4204
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039178
reference_id 2039178
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039178
5
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
6
reference_url https://access.redhat.com/errata/RHSA-2024:10262
reference_id RHSA-2024:10262
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10262
7
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
8
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
9
reference_url https://usn.ubuntu.com/5217-1/
reference_id USN-5217-1
reference_type
scores
url https://usn.ubuntu.com/5217-1/
10
reference_url https://usn.ubuntu.com/5218-1/
reference_id USN-5218-1
reference_type
scores
url https://usn.ubuntu.com/5218-1/
11
reference_url https://usn.ubuntu.com/5219-1/
reference_id USN-5219-1
reference_type
scores
url https://usn.ubuntu.com/5219-1/
fixed_packages
aliases CVE-2021-4204
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-apaa-8wdp-cyfq
35
url VCID-awhh-d1hb-y7ak
vulnerability_id VCID-awhh-d1hb-y7ak
summary kernel: ice: Block switchdev mode when ADQ is active and vice versa
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53442.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53442.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53442
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01826
published_at 2026-04-02T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01838
published_at 2026-04-04T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.0184
published_at 2026-04-07T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01843
published_at 2026-04-08T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01857
published_at 2026-04-09T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01844
published_at 2026-04-11T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01829
published_at 2026-04-12T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.01824
published_at 2026-04-13T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.02261
published_at 2026-04-24T12:55:00Z
9
value 0.00013
scoring_system epss
scoring_elements 0.02186
published_at 2026-04-16T12:55:00Z
10
value 0.00013
scoring_system epss
scoring_elements 0.02197
published_at 2026-04-18T12:55:00Z
11
value 0.00013
scoring_system epss
scoring_elements 0.02281
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53442
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2396501
reference_id 2396501
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2396501
4
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
5
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53442
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-awhh-d1hb-y7ak
36
url VCID-b4ct-fnbp-43a3
vulnerability_id VCID-b4ct-fnbp-43a3
summary kernel: cxgb4: use-after-free in ch_flower_stats_cb()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4133.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4133.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4133
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01385
published_at 2026-04-24T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01294
published_at 2026-04-02T12:55:00Z
2
value 0.00011
scoring_system epss
scoring_elements 0.01299
published_at 2026-04-13T12:55:00Z
3
value 0.00011
scoring_system epss
scoring_elements 0.01288
published_at 2026-04-16T12:55:00Z
4
value 0.00011
scoring_system epss
scoring_elements 0.01376
published_at 2026-04-21T12:55:00Z
5
value 0.00011
scoring_system epss
scoring_elements 0.01298
published_at 2026-04-04T12:55:00Z
6
value 0.00011
scoring_system epss
scoring_elements 0.0131
published_at 2026-04-07T12:55:00Z
7
value 0.00011
scoring_system epss
scoring_elements 0.01315
published_at 2026-04-08T12:55:00Z
8
value 0.00011
scoring_system epss
scoring_elements 0.01318
published_at 2026-04-09T12:55:00Z
9
value 0.00011
scoring_system epss
scoring_elements 0.01302
published_at 2026-04-18T12:55:00Z
10
value 0.00011
scoring_system epss
scoring_elements 0.01296
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4133
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4133
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2221702
reference_id 2221702
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-26T21:51:04Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2221702
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv
reference_id cpe:/a:redhat:enterprise_linux:8::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime
reference_id cpe:/a:redhat:enterprise_linux:8::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv
reference_id cpe:/a:redhat:enterprise_linux:9::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime
reference_id cpe:/a:redhat:enterprise_linux:9::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
17
reference_url https://access.redhat.com/security/cve/CVE-2023-4133
reference_id CVE-2023-4133
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-26T21:51:04Z/
url https://access.redhat.com/security/cve/CVE-2023-4133
18
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-26T21:51:04Z/
url https://access.redhat.com/errata/RHSA-2024:2394
19
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-26T21:51:04Z/
url https://access.redhat.com/errata/RHSA-2024:2950
20
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-26T21:51:04Z/
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-4133
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b4ct-fnbp-43a3
37
url VCID-b4j7-s2wg-qfcb
vulnerability_id VCID-b4j7-s2wg-qfcb
summary kernel: scsi: qla2xxx: Fix deletion race condition
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53615.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53615.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53615
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.0147
published_at 2026-04-02T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01473
published_at 2026-04-04T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01479
published_at 2026-04-07T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01484
published_at 2026-04-08T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01486
published_at 2026-04-09T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01478
published_at 2026-04-11T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01471
published_at 2026-04-12T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.01472
published_at 2026-04-13T12:55:00Z
8
value 0.00012
scoring_system epss
scoring_elements 0.01462
published_at 2026-04-16T12:55:00Z
9
value 0.00012
scoring_system epss
scoring_elements 0.01476
published_at 2026-04-18T12:55:00Z
10
value 0.00012
scoring_system epss
scoring_elements 0.01565
published_at 2026-04-21T12:55:00Z
11
value 0.00012
scoring_system epss
scoring_elements 0.01573
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53615
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53615
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2401469
reference_id 2401469
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2401469
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53615
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b4j7-s2wg-qfcb
38
url VCID-ba6k-mvxj-8udm
vulnerability_id VCID-ba6k-mvxj-8udm
summary hw: amd: Instruction raise #VC exception at exit
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-25742.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-25742.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-25742
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.13721
published_at 2026-04-24T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.13713
published_at 2026-04-07T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.13795
published_at 2026-04-08T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13846
published_at 2026-04-09T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13815
published_at 2026-04-11T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13779
published_at 2026-04-12T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13731
published_at 2026-04-13T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13641
published_at 2026-04-16T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.13638
published_at 2026-04-18T12:55:00Z
9
value 0.00045
scoring_system epss
scoring_elements 0.1371
published_at 2026-04-21T12:55:00Z
10
value 0.00045
scoring_system epss
scoring_elements 0.13855
published_at 2026-04-02T12:55:00Z
11
value 0.00045
scoring_system epss
scoring_elements 0.13912
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-25742
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25742
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270836
reference_id 2270836
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270836
5
reference_url https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3008.html
reference_id amd-sb-3008.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-20T14:09:31Z/
url https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3008.html
6
reference_url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.9
reference_id ChangeLog-6.9
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-20T14:09:31Z/
url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.9
7
reference_url https://github.com/torvalds/linux/commit/e3ef461af35a8c74f2f4ce6616491ddb355a208f
reference_id e3ef461af35a8c74f2f4ce6616491ddb355a208f
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-20T14:09:31Z/
url https://github.com/torvalds/linux/commit/e3ef461af35a8c74f2f4ce6616491ddb355a208f
8
reference_url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e3ef461af35a8c74f2f4ce6616491ddb355a208f
reference_id ?id=e3ef461af35a8c74f2f4ce6616491ddb355a208f
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-20T14:09:31Z/
url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e3ef461af35a8c74f2f4ce6616491ddb355a208f
9
reference_url https://access.redhat.com/errata/RHSA-2024:2627
reference_id RHSA-2024:2627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2627
10
reference_url https://access.redhat.com/errata/RHSA-2024:2628
reference_id RHSA-2024:2628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2628
11
reference_url https://access.redhat.com/errata/RHSA-2024:2758
reference_id RHSA-2024:2758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2758
12
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
13
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
14
reference_url https://access.redhat.com/errata/RHSA-2024:3421
reference_id RHSA-2024:3421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3421
15
reference_url https://access.redhat.com/errata/RHSA-2024:3810
reference_id RHSA-2024:3810
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3810
16
reference_url https://usn.ubuntu.com/6921-1/
reference_id USN-6921-1
reference_type
scores
url https://usn.ubuntu.com/6921-1/
17
reference_url https://usn.ubuntu.com/6921-2/
reference_id USN-6921-2
reference_type
scores
url https://usn.ubuntu.com/6921-2/
18
reference_url https://usn.ubuntu.com/6923-1/
reference_id USN-6923-1
reference_type
scores
url https://usn.ubuntu.com/6923-1/
19
reference_url https://usn.ubuntu.com/6923-2/
reference_id USN-6923-2
reference_type
scores
url https://usn.ubuntu.com/6923-2/
20
reference_url https://usn.ubuntu.com/6927-1/
reference_id USN-6927-1
reference_type
scores
url https://usn.ubuntu.com/6927-1/
21
reference_url https://usn.ubuntu.com/6952-1/
reference_id USN-6952-1
reference_type
scores
url https://usn.ubuntu.com/6952-1/
22
reference_url https://usn.ubuntu.com/6952-2/
reference_id USN-6952-2
reference_type
scores
url https://usn.ubuntu.com/6952-2/
23
reference_url https://usn.ubuntu.com/6956-1/
reference_id USN-6956-1
reference_type
scores
url https://usn.ubuntu.com/6956-1/
24
reference_url https://usn.ubuntu.com/6957-1/
reference_id USN-6957-1
reference_type
scores
url https://usn.ubuntu.com/6957-1/
25
reference_url https://usn.ubuntu.com/7019-1/
reference_id USN-7019-1
reference_type
scores
url https://usn.ubuntu.com/7019-1/
fixed_packages
aliases CVE-2024-25742
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ba6k-mvxj-8udm
39
url VCID-bdew-rk4n-wkcf
vulnerability_id VCID-bdew-rk4n-wkcf
summary kernel: null pointer dereference vulnerability in nft_dynset_init()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6622.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6622.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6622
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01401
published_at 2026-04-02T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01405
published_at 2026-04-04T12:55:00Z
2
value 0.00011
scoring_system epss
scoring_elements 0.01411
published_at 2026-04-07T12:55:00Z
3
value 0.00011
scoring_system epss
scoring_elements 0.01416
published_at 2026-04-08T12:55:00Z
4
value 0.00011
scoring_system epss
scoring_elements 0.01417
published_at 2026-04-09T12:55:00Z
5
value 0.00011
scoring_system epss
scoring_elements 0.0141
published_at 2026-04-11T12:55:00Z
6
value 0.00011
scoring_system epss
scoring_elements 0.01402
published_at 2026-04-12T12:55:00Z
7
value 0.00011
scoring_system epss
scoring_elements 0.01404
published_at 2026-04-13T12:55:00Z
8
value 0.00011
scoring_system epss
scoring_elements 0.01395
published_at 2026-04-16T12:55:00Z
9
value 0.00011
scoring_system epss
scoring_elements 0.01408
published_at 2026-04-18T12:55:00Z
10
value 0.00011
scoring_system epss
scoring_elements 0.01496
published_at 2026-04-21T12:55:00Z
11
value 0.00011
scoring_system epss
scoring_elements 0.01503
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6622
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2253632
reference_id 2253632
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2253632
4
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
5
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
7
reference_url https://usn.ubuntu.com/6624-1/
reference_id USN-6624-1
reference_type
scores
url https://usn.ubuntu.com/6624-1/
8
reference_url https://usn.ubuntu.com/6626-1/
reference_id USN-6626-1
reference_type
scores
url https://usn.ubuntu.com/6626-1/
9
reference_url https://usn.ubuntu.com/6626-2/
reference_id USN-6626-2
reference_type
scores
url https://usn.ubuntu.com/6626-2/
10
reference_url https://usn.ubuntu.com/6626-3/
reference_id USN-6626-3
reference_type
scores
url https://usn.ubuntu.com/6626-3/
11
reference_url https://usn.ubuntu.com/6628-1/
reference_id USN-6628-1
reference_type
scores
url https://usn.ubuntu.com/6628-1/
12
reference_url https://usn.ubuntu.com/6628-2/
reference_id USN-6628-2
reference_type
scores
url https://usn.ubuntu.com/6628-2/
13
reference_url https://usn.ubuntu.com/6639-1/
reference_id USN-6639-1
reference_type
scores
url https://usn.ubuntu.com/6639-1/
14
reference_url https://usn.ubuntu.com/6652-1/
reference_id USN-6652-1
reference_type
scores
url https://usn.ubuntu.com/6652-1/
fixed_packages
aliases CVE-2023-6622
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bdew-rk4n-wkcf
40
url VCID-bgyu-226f-zyca
vulnerability_id VCID-bgyu-226f-zyca
summary kernel: Linux kernel: Denial of Service via memory leak in mlx5e_init_rep_rx
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54106.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54106.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-54106
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.06793
published_at 2026-04-02T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.0684
published_at 2026-04-04T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06822
published_at 2026-04-07T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.06874
published_at 2026-04-08T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.06907
published_at 2026-04-09T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.069
published_at 2026-04-11T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.06893
published_at 2026-04-12T12:55:00Z
7
value 0.00025
scoring_system epss
scoring_elements 0.06888
published_at 2026-04-13T12:55:00Z
8
value 0.00025
scoring_system epss
scoring_elements 0.0683
published_at 2026-04-16T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.06811
published_at 2026-04-18T12:55:00Z
10
value 0.00025
scoring_system epss
scoring_elements 0.06956
published_at 2026-04-21T12:55:00Z
11
value 0.00025
scoring_system epss
scoring_elements 0.06938
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-54106
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2425199
reference_id 2425199
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2425199
4
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
5
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-54106
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bgyu-226f-zyca
41
url VCID-bh8m-pcw7-c3h5
vulnerability_id VCID-bh8m-pcw7-c3h5
summary kernel: Linux kernel: RDMA/core GID entry leak causes Denial of Service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54003.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54003.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-54003
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10911
published_at 2026-04-02T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10975
published_at 2026-04-04T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.108
published_at 2026-04-07T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10876
published_at 2026-04-08T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10929
published_at 2026-04-09T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.1093
published_at 2026-04-11T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10897
published_at 2026-04-12T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10874
published_at 2026-04-21T12:55:00Z
8
value 0.00036
scoring_system epss
scoring_elements 0.10734
published_at 2026-04-16T12:55:00Z
9
value 0.00036
scoring_system epss
scoring_elements 0.10747
published_at 2026-04-18T12:55:00Z
10
value 0.00036
scoring_system epss
scoring_elements 0.10834
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-54003
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54003
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54003
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2424996
reference_id 2424996
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2424996
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-54003
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bh8m-pcw7-c3h5
42
url VCID-bkxu-zjjm-w3gc
vulnerability_id VCID-bkxu-zjjm-w3gc
summary kernel: usb: typec: altmodes/displayport: fix pin_assignment_show
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54186.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54186.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-54186
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10911
published_at 2026-04-02T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10975
published_at 2026-04-04T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.108
published_at 2026-04-07T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10876
published_at 2026-04-08T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10929
published_at 2026-04-09T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.1093
published_at 2026-04-11T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10897
published_at 2026-04-12T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10874
published_at 2026-04-21T12:55:00Z
8
value 0.00036
scoring_system epss
scoring_elements 0.10734
published_at 2026-04-16T12:55:00Z
9
value 0.00036
scoring_system epss
scoring_elements 0.10747
published_at 2026-04-18T12:55:00Z
10
value 0.00036
scoring_system epss
scoring_elements 0.10834
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-54186
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54186
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2426180
reference_id 2426180
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2426180
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-54186
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bkxu-zjjm-w3gc
43
url VCID-bp25-h13e-3kbw
vulnerability_id VCID-bp25-h13e-3kbw
summary kernel: ext4: fix bug_on in __es_tree_search caused by bad quota inode
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50782.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50782.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50782
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10911
published_at 2026-04-02T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10975
published_at 2026-04-04T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.108
published_at 2026-04-07T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10876
published_at 2026-04-08T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10929
published_at 2026-04-09T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.1093
published_at 2026-04-11T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10897
published_at 2026-04-12T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10874
published_at 2026-04-21T12:55:00Z
8
value 0.00036
scoring_system epss
scoring_elements 0.10734
published_at 2026-04-16T12:55:00Z
9
value 0.00036
scoring_system epss
scoring_elements 0.10747
published_at 2026-04-18T12:55:00Z
10
value 0.00036
scoring_system epss
scoring_elements 0.10834
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50782
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50782
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2425085
reference_id 2425085
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2425085
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2022-50782
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bp25-h13e-3kbw
44
url VCID-brz8-6j8x-aqep
vulnerability_id VCID-brz8-6j8x-aqep
summary kernel: tty: n_gsm: add sanity check for gsm->receive in gsm_receive_buf()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49940.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49940.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49940
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06468
published_at 2026-04-02T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.0652
published_at 2026-04-04T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.0651
published_at 2026-04-07T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.0656
published_at 2026-04-08T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06602
published_at 2026-04-09T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06596
published_at 2026-04-11T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06588
published_at 2026-04-12T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06579
published_at 2026-04-13T12:55:00Z
8
value 0.00065
scoring_system epss
scoring_elements 0.19968
published_at 2026-04-24T12:55:00Z
9
value 0.00065
scoring_system epss
scoring_elements 0.20082
published_at 2026-04-16T12:55:00Z
10
value 0.00065
scoring_system epss
scoring_elements 0.20086
published_at 2026-04-18T12:55:00Z
11
value 0.00065
scoring_system epss
scoring_elements 0.20084
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49940
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49940
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49940
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373397
reference_id 2373397
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373397
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:2621
reference_id RHSA-2024:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2621
7
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2022-49940
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-brz8-6j8x-aqep
45
url VCID-bss4-njk5-8uhv
vulnerability_id VCID-bss4-njk5-8uhv
summary kernel: net/mlx5: DR, fix memory leak in mlx5dr_cmd_create_reformat_ctx
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53546.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53546.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53546
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.02951
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.02965
published_at 2026-04-04T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.02973
published_at 2026-04-07T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.02975
published_at 2026-04-08T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03
published_at 2026-04-09T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.0296
published_at 2026-04-11T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.02937
published_at 2026-04-12T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.02927
published_at 2026-04-13T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.02902
published_at 2026-04-16T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.02912
published_at 2026-04-18T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03029
published_at 2026-04-21T12:55:00Z
11
value 0.00015
scoring_system epss
scoring_elements 0.03027
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53546
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53546
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2401561
reference_id 2401561
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2401561
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53546
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bss4-njk5-8uhv
46
url VCID-btxx-agn2-mye2
vulnerability_id VCID-btxx-agn2-mye2
summary kernel: net/core: kernel crash in ETH_P_1588 flow dissector
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52580.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52580.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-52580
reference_id
reference_type
scores
0
value 8e-05
scoring_system epss
scoring_elements 0.0078
published_at 2026-04-08T12:55:00Z
1
value 8e-05
scoring_system epss
scoring_elements 0.00813
published_at 2026-04-24T12:55:00Z
2
value 8e-05
scoring_system epss
scoring_elements 0.00775
published_at 2026-04-09T12:55:00Z
3
value 8e-05
scoring_system epss
scoring_elements 0.00768
published_at 2026-04-18T12:55:00Z
4
value 8e-05
scoring_system epss
scoring_elements 0.00762
published_at 2026-04-12T12:55:00Z
5
value 8e-05
scoring_system epss
scoring_elements 0.00763
published_at 2026-04-16T12:55:00Z
6
value 8e-05
scoring_system epss
scoring_elements 0.00812
published_at 2026-04-21T12:55:00Z
7
value 8e-05
scoring_system epss
scoring_elements 0.00781
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-52580
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2267760
reference_id 2267760
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2267760
4
reference_url https://git.kernel.org/stable/c/488ea2a3e2666022f79abfdd7d12e8305fc27a40
reference_id 488ea2a3e2666022f79abfdd7d12e8305fc27a40
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T15:52:44Z/
url https://git.kernel.org/stable/c/488ea2a3e2666022f79abfdd7d12e8305fc27a40
5
reference_url https://git.kernel.org/stable/c/48e105a2a1a10adc21c0ae717969f5e8e990ba48
reference_id 48e105a2a1a10adc21c0ae717969f5e8e990ba48
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T15:52:44Z/
url https://git.kernel.org/stable/c/48e105a2a1a10adc21c0ae717969f5e8e990ba48
6
reference_url https://git.kernel.org/stable/c/75ad80ed88a182ab2ad5513e448cf07b403af5c3
reference_id 75ad80ed88a182ab2ad5513e448cf07b403af5c3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T15:52:44Z/
url https://git.kernel.org/stable/c/75ad80ed88a182ab2ad5513e448cf07b403af5c3
7
reference_url https://git.kernel.org/stable/c/f90a7b9586d72f907092078a9f394733ca502cc9
reference_id f90a7b9586d72f907092078a9f394733ca502cc9
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T15:52:44Z/
url https://git.kernel.org/stable/c/f90a7b9586d72f907092078a9f394733ca502cc9
8
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
9
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
10
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-52580
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-btxx-agn2-mye2
47
url VCID-c2mu-8323-1ydz
vulnerability_id VCID-c2mu-8323-1ydz
summary kernel: md/raid5-cache: fix null-ptr-deref for r5l_flush_stripe_to_raid()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53210.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53210.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53210
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03188
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03198
published_at 2026-04-04T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03201
published_at 2026-04-07T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03205
published_at 2026-04-08T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03231
published_at 2026-04-09T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.04256
published_at 2026-04-13T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.04362
published_at 2026-04-21T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.04377
published_at 2026-04-24T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.04292
published_at 2026-04-11T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.04278
published_at 2026-04-12T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.04227
published_at 2026-04-16T12:55:00Z
11
value 0.00017
scoring_system epss
scoring_elements 0.04236
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53210
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://git.kernel.org/stable/c/0d0bd28c500173bfca78aa840f8f36d261ef1765
reference_id 0d0bd28c500173bfca78aa840f8f36d261ef1765
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:48:25Z/
url https://git.kernel.org/stable/c/0d0bd28c500173bfca78aa840f8f36d261ef1765
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2395424
reference_id 2395424
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2395424
5
reference_url https://git.kernel.org/stable/c/711fb92606208a8626b785da4f9f23d648a5b6c8
reference_id 711fb92606208a8626b785da4f9f23d648a5b6c8
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:48:25Z/
url https://git.kernel.org/stable/c/711fb92606208a8626b785da4f9f23d648a5b6c8
6
reference_url https://git.kernel.org/stable/c/7a8b6d93991bf4b72b3f959baea35397c6c8e521
reference_id 7a8b6d93991bf4b72b3f959baea35397c6c8e521
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:48:25Z/
url https://git.kernel.org/stable/c/7a8b6d93991bf4b72b3f959baea35397c6c8e521
7
reference_url https://git.kernel.org/stable/c/e46b2e7be8059d156af8c011dd8d665229b65886
reference_id e46b2e7be8059d156af8c011dd8d665229b65886
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:48:25Z/
url https://git.kernel.org/stable/c/e46b2e7be8059d156af8c011dd8d665229b65886
8
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
9
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53210
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c2mu-8323-1ydz
48
url VCID-c3rn-zqxh-tqdt
vulnerability_id VCID-c3rn-zqxh-tqdt
summary kernel: powerpc/kprobes: Fix null pointer reference in arch_prepare_kprobe()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50635.json
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50635.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50635
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07346
published_at 2026-04-02T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.0739
published_at 2026-04-04T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.07372
published_at 2026-04-07T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07427
published_at 2026-04-08T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.07451
published_at 2026-04-09T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.10007
published_at 2026-04-21T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.10037
published_at 2026-04-24T12:55:00Z
7
value 0.00034
scoring_system epss
scoring_elements 0.10071
published_at 2026-04-11T12:55:00Z
8
value 0.00034
scoring_system epss
scoring_elements 0.1003
published_at 2026-04-12T12:55:00Z
9
value 0.00034
scoring_system epss
scoring_elements 0.10009
published_at 2026-04-13T12:55:00Z
10
value 0.00034
scoring_system epss
scoring_elements 0.09883
published_at 2026-04-16T12:55:00Z
11
value 0.00034
scoring_system epss
scoring_elements 0.09858
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50635
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50635
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2420274
reference_id 2420274
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2420274
5
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2022-50635
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c3rn-zqxh-tqdt
49
url VCID-c4d2-twee-nuft
vulnerability_id VCID-c4d2-twee-nuft
summary kernel: bnxt: avoid overflow in bnxt_get_nvram_directory()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53661.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53661.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53661
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03188
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03198
published_at 2026-04-04T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03201
published_at 2026-04-07T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03205
published_at 2026-04-08T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03231
published_at 2026-04-09T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03185
published_at 2026-04-11T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.03158
published_at 2026-04-12T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03142
published_at 2026-04-13T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.03116
published_at 2026-04-16T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03123
published_at 2026-04-18T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03242
published_at 2026-04-21T12:55:00Z
11
value 0.00015
scoring_system epss
scoring_elements 0.03243
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53661
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53661
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2402245
reference_id 2402245
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2402245
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53661
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c4d2-twee-nuft
50
url VCID-cdk9-g2mt-tue1
vulnerability_id VCID-cdk9-g2mt-tue1
summary kernel: scsi: qla2xxx: Array index may go out of bound
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54179.json
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54179.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-54179
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10911
published_at 2026-04-02T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10975
published_at 2026-04-04T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.108
published_at 2026-04-07T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10876
published_at 2026-04-08T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10929
published_at 2026-04-09T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.1093
published_at 2026-04-11T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10897
published_at 2026-04-12T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10874
published_at 2026-04-21T12:55:00Z
8
value 0.00036
scoring_system epss
scoring_elements 0.10734
published_at 2026-04-16T12:55:00Z
9
value 0.00036
scoring_system epss
scoring_elements 0.10747
published_at 2026-04-18T12:55:00Z
10
value 0.00036
scoring_system epss
scoring_elements 0.10834
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-54179
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54179
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2426244
reference_id 2426244
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2426244
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-54179
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cdk9-g2mt-tue1
51
url VCID-chuj-26tz-gfae
vulnerability_id VCID-chuj-26tz-gfae
summary kernel: ACPI: PPTT: Fix to avoid sleep in the atomic context when PPTT is absent
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53070.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53070.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53070
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.15267
published_at 2026-04-02T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.15335
published_at 2026-04-04T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.15139
published_at 2026-04-07T12:55:00Z
3
value 0.00049
scoring_system epss
scoring_elements 0.15227
published_at 2026-04-08T12:55:00Z
4
value 0.00049
scoring_system epss
scoring_elements 0.15278
published_at 2026-04-09T12:55:00Z
5
value 0.00049
scoring_system epss
scoring_elements 0.15248
published_at 2026-04-11T12:55:00Z
6
value 0.00049
scoring_system epss
scoring_elements 0.15209
published_at 2026-04-12T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.15145
published_at 2026-04-13T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.15058
published_at 2026-04-16T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.15068
published_at 2026-04-18T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.15119
published_at 2026-04-21T12:55:00Z
11
value 0.00049
scoring_system epss
scoring_elements 0.15157
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53070
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2363685
reference_id 2363685
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2363685
4
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
5
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53070
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-chuj-26tz-gfae
52
url VCID-cs99-jacq-qkey
vulnerability_id VCID-cs99-jacq-qkey
summary kernel: use-after-free in l1oip timer handlers
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3565.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3565.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3565
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.06808
published_at 2026-04-24T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.06725
published_at 2026-04-12T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06717
published_at 2026-04-13T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.06654
published_at 2026-04-16T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.06645
published_at 2026-04-18T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.06801
published_at 2026-04-21T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.06626
published_at 2026-04-02T12:55:00Z
7
value 0.00025
scoring_system epss
scoring_elements 0.0667
published_at 2026-04-04T12:55:00Z
8
value 0.00025
scoring_system epss
scoring_elements 0.0665
published_at 2026-04-07T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.06699
published_at 2026-04-08T12:55:00Z
10
value 0.00025
scoring_system epss
scoring_elements 0.06734
published_at 2026-04-09T12:55:00Z
11
value 0.00025
scoring_system epss
scoring_elements 0.06732
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3565
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3565
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2150953
reference_id 2150953
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2150953
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
10
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
11
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
12
reference_url https://usn.ubuntu.com/5754-1/
reference_id USN-5754-1
reference_type
scores
url https://usn.ubuntu.com/5754-1/
13
reference_url https://usn.ubuntu.com/5754-2/
reference_id USN-5754-2
reference_type
scores
url https://usn.ubuntu.com/5754-2/
14
reference_url https://usn.ubuntu.com/5755-1/
reference_id USN-5755-1
reference_type
scores
url https://usn.ubuntu.com/5755-1/
15
reference_url https://usn.ubuntu.com/5755-2/
reference_id USN-5755-2
reference_type
scores
url https://usn.ubuntu.com/5755-2/
16
reference_url https://usn.ubuntu.com/5756-1/
reference_id USN-5756-1
reference_type
scores
url https://usn.ubuntu.com/5756-1/
17
reference_url https://usn.ubuntu.com/5756-2/
reference_id USN-5756-2
reference_type
scores
url https://usn.ubuntu.com/5756-2/
18
reference_url https://usn.ubuntu.com/5756-3/
reference_id USN-5756-3
reference_type
scores
url https://usn.ubuntu.com/5756-3/
19
reference_url https://usn.ubuntu.com/5757-1/
reference_id USN-5757-1
reference_type
scores
url https://usn.ubuntu.com/5757-1/
20
reference_url https://usn.ubuntu.com/5757-2/
reference_id USN-5757-2
reference_type
scores
url https://usn.ubuntu.com/5757-2/
21
reference_url https://usn.ubuntu.com/5758-1/
reference_id USN-5758-1
reference_type
scores
url https://usn.ubuntu.com/5758-1/
22
reference_url https://usn.ubuntu.com/5774-1/
reference_id USN-5774-1
reference_type
scores
url https://usn.ubuntu.com/5774-1/
23
reference_url https://usn.ubuntu.com/5779-1/
reference_id USN-5779-1
reference_type
scores
url https://usn.ubuntu.com/5779-1/
24
reference_url https://usn.ubuntu.com/5913-1/
reference_id USN-5913-1
reference_type
scores
url https://usn.ubuntu.com/5913-1/
fixed_packages
aliases CVE-2022-3565
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cs99-jacq-qkey
53
url VCID-d2f8-dt9k-37bv
vulnerability_id VCID-d2f8-dt9k-37bv
summary kernel: Linux kernel (soundwire): Memory corruption due to incorrect device enumeration completion
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54096.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54096.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-54096
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07494
published_at 2026-04-02T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07533
published_at 2026-04-04T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07514
published_at 2026-04-07T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07573
published_at 2026-04-08T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07593
published_at 2026-04-09T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.0759
published_at 2026-04-11T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07576
published_at 2026-04-12T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07564
published_at 2026-04-13T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07488
published_at 2026-04-16T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07476
published_at 2026-04-18T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07608
published_at 2026-04-21T12:55:00Z
11
value 0.00027
scoring_system epss
scoring_elements 0.07569
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-54096
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54096
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2425131
reference_id 2425131
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2425131
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-54096
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d2f8-dt9k-37bv
54
url VCID-d8ft-ehad-6kap
vulnerability_id VCID-d8ft-ehad-6kap
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-13631.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-13631.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-13631
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05279
published_at 2026-04-01T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05322
published_at 2026-04-02T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05353
published_at 2026-04-04T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05372
published_at 2026-04-07T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05405
published_at 2026-04-08T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05428
published_at 2026-04-09T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.05396
published_at 2026-04-11T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05385
published_at 2026-04-12T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05376
published_at 2026-04-13T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.05327
published_at 2026-04-16T12:55:00Z
10
value 0.0002
scoring_system epss
scoring_elements 0.05329
published_at 2026-04-18T12:55:00Z
11
value 0.0002
scoring_system epss
scoring_elements 0.05487
published_at 2026-04-21T12:55:00Z
12
value 0.0002
scoring_system epss
scoring_elements 0.05527
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-13631
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8553
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18509
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20856
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5995
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10639
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10639
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12817
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12984
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13233
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13233
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15239
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15239
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1999
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3882
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3900
22
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1731000
reference_id 1731000
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1731000
24
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
25
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
26
reference_url https://usn.ubuntu.com/4115-1/
reference_id USN-4115-1
reference_type
scores
url https://usn.ubuntu.com/4115-1/
27
reference_url https://usn.ubuntu.com/4118-1/
reference_id USN-4118-1
reference_type
scores
url https://usn.ubuntu.com/4118-1/
28
reference_url https://usn.ubuntu.com/4145-1/
reference_id USN-4145-1
reference_type
scores
url https://usn.ubuntu.com/4145-1/
29
reference_url https://usn.ubuntu.com/4147-1/
reference_id USN-4147-1
reference_type
scores
url https://usn.ubuntu.com/4147-1/
fixed_packages
aliases CVE-2019-13631
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d8ft-ehad-6kap
55
url VCID-dh34-eegq-suf2
vulnerability_id VCID-dh34-eegq-suf2
summary kernel: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50327.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50327.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50327
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05695
published_at 2026-04-02T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05736
published_at 2026-04-04T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05729
published_at 2026-04-07T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05769
published_at 2026-04-08T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05795
published_at 2026-04-09T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06768
published_at 2026-04-21T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06777
published_at 2026-04-24T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06702
published_at 2026-04-11T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06696
published_at 2026-04-12T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06687
published_at 2026-04-13T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06619
published_at 2026-04-16T12:55:00Z
11
value 0.00024
scoring_system epss
scoring_elements 0.06612
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50327
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50327
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50327
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2395438
reference_id 2395438
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2395438
5
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
7
reference_url https://usn.ubuntu.com/7909-1/
reference_id USN-7909-1
reference_type
scores
url https://usn.ubuntu.com/7909-1/
8
reference_url https://usn.ubuntu.com/7909-2/
reference_id USN-7909-2
reference_type
scores
url https://usn.ubuntu.com/7909-2/
9
reference_url https://usn.ubuntu.com/7909-3/
reference_id USN-7909-3
reference_type
scores
url https://usn.ubuntu.com/7909-3/
10
reference_url https://usn.ubuntu.com/7909-4/
reference_id USN-7909-4
reference_type
scores
url https://usn.ubuntu.com/7909-4/
11
reference_url https://usn.ubuntu.com/7909-5/
reference_id USN-7909-5
reference_type
scores
url https://usn.ubuntu.com/7909-5/
12
reference_url https://usn.ubuntu.com/7910-1/
reference_id USN-7910-1
reference_type
scores
url https://usn.ubuntu.com/7910-1/
13
reference_url https://usn.ubuntu.com/7910-2/
reference_id USN-7910-2
reference_type
scores
url https://usn.ubuntu.com/7910-2/
14
reference_url https://usn.ubuntu.com/7933-1/
reference_id USN-7933-1
reference_type
scores
url https://usn.ubuntu.com/7933-1/
15
reference_url https://usn.ubuntu.com/7938-1/
reference_id USN-7938-1
reference_type
scores
url https://usn.ubuntu.com/7938-1/
fixed_packages
aliases CVE-2022-50327
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dh34-eegq-suf2
56
url VCID-dhnq-vhr2-sbhh
vulnerability_id VCID-dhnq-vhr2-sbhh
summary kernel: ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53275.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53275.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53275
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02476
published_at 2026-04-02T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02467
published_at 2026-04-24T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02488
published_at 2026-04-07T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02491
published_at 2026-04-08T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02512
published_at 2026-04-09T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02489
published_at 2026-04-11T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02392
published_at 2026-04-13T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02376
published_at 2026-04-16T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02381
published_at 2026-04-18T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.0248
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53275
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53275
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53275
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/109f0aaa0b8838a88af9125b79579023539300a7
reference_id 109f0aaa0b8838a88af9125b79579023539300a7
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:06:44Z/
url https://git.kernel.org/stable/c/109f0aaa0b8838a88af9125b79579023539300a7
5
reference_url https://git.kernel.org/stable/c/1f4a08fed450db87fbb5ff5105354158bdbe1a22
reference_id 1f4a08fed450db87fbb5ff5105354158bdbe1a22
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:06:44Z/
url https://git.kernel.org/stable/c/1f4a08fed450db87fbb5ff5105354158bdbe1a22
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2395693
reference_id 2395693
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2395693
7
reference_url https://git.kernel.org/stable/c/8703b26387e1fa4f8749db98d24c67617b873acb
reference_id 8703b26387e1fa4f8749db98d24c67617b873acb
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:06:44Z/
url https://git.kernel.org/stable/c/8703b26387e1fa4f8749db98d24c67617b873acb
8
reference_url https://git.kernel.org/stable/c/9f9eed451176ffcac6b5ba0f6dae1a6b4a1cb0eb
reference_id 9f9eed451176ffcac6b5ba0f6dae1a6b4a1cb0eb
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:06:44Z/
url https://git.kernel.org/stable/c/9f9eed451176ffcac6b5ba0f6dae1a6b4a1cb0eb
9
reference_url https://git.kernel.org/stable/c/b32e40379e5b2814de0c4bc199edc2d82317dc07
reference_id b32e40379e5b2814de0c4bc199edc2d82317dc07
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:06:44Z/
url https://git.kernel.org/stable/c/b32e40379e5b2814de0c4bc199edc2d82317dc07
10
reference_url https://git.kernel.org/stable/c/cdd412b528dee6e0851c4735d6676ec138da13a4
reference_id cdd412b528dee6e0851c4735d6676ec138da13a4
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:06:44Z/
url https://git.kernel.org/stable/c/cdd412b528dee6e0851c4735d6676ec138da13a4
11
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
12
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53275
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dhnq-vhr2-sbhh
57
url VCID-djyp-77yw-cfh2
vulnerability_id VCID-djyp-77yw-cfh2
summary kernel: scsi: qla2xxx: Wait for io return on terminate rport
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53322.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53322.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53322
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02603
published_at 2026-04-02T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02568
published_at 2026-04-24T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02617
published_at 2026-04-04T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02621
published_at 2026-04-07T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02625
published_at 2026-04-08T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02645
published_at 2026-04-09T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02622
published_at 2026-04-11T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02485
published_at 2026-04-12T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02483
published_at 2026-04-13T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02467
published_at 2026-04-16T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02473
published_at 2026-04-18T12:55:00Z
11
value 0.00014
scoring_system epss
scoring_elements 0.0258
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53322
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53322
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/079c8264ed9fea8cbcac01ad29040f901cbc3692
reference_id 079c8264ed9fea8cbcac01ad29040f901cbc3692
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:27:44Z/
url https://git.kernel.org/stable/c/079c8264ed9fea8cbcac01ad29040f901cbc3692
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2395891
reference_id 2395891
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2395891
6
reference_url https://git.kernel.org/stable/c/4647d2e88918a078359d1532d90c417a38542c9e
reference_id 4647d2e88918a078359d1532d90c417a38542c9e
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:27:44Z/
url https://git.kernel.org/stable/c/4647d2e88918a078359d1532d90c417a38542c9e
7
reference_url https://git.kernel.org/stable/c/5bcdaafd92be6035ddc77fa76650cf9dd5b864c4
reference_id 5bcdaafd92be6035ddc77fa76650cf9dd5b864c4
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:27:44Z/
url https://git.kernel.org/stable/c/5bcdaafd92be6035ddc77fa76650cf9dd5b864c4
8
reference_url https://git.kernel.org/stable/c/8a55556cd7e0220486163b1285ce11a8be2ce5fa
reference_id 8a55556cd7e0220486163b1285ce11a8be2ce5fa
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:27:44Z/
url https://git.kernel.org/stable/c/8a55556cd7e0220486163b1285ce11a8be2ce5fa
9
reference_url https://git.kernel.org/stable/c/90770dad1eb30967ebd8d37d82830bcf270b3293
reference_id 90770dad1eb30967ebd8d37d82830bcf270b3293
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:27:44Z/
url https://git.kernel.org/stable/c/90770dad1eb30967ebd8d37d82830bcf270b3293
10
reference_url https://git.kernel.org/stable/c/a9fe97fb7b4ee21bffb76f2acb05769bad27ae70
reference_id a9fe97fb7b4ee21bffb76f2acb05769bad27ae70
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:27:44Z/
url https://git.kernel.org/stable/c/a9fe97fb7b4ee21bffb76f2acb05769bad27ae70
11
reference_url https://git.kernel.org/stable/c/d25fded78d88e1515439b3ba581684d683e0b6ab
reference_id d25fded78d88e1515439b3ba581684d683e0b6ab
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:27:44Z/
url https://git.kernel.org/stable/c/d25fded78d88e1515439b3ba581684d683e0b6ab
12
reference_url https://git.kernel.org/stable/c/fc0cba0c7be8261a1625098bd1d695077ec621c9
reference_id fc0cba0c7be8261a1625098bd1d695077ec621c9
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:27:44Z/
url https://git.kernel.org/stable/c/fc0cba0c7be8261a1625098bd1d695077ec621c9
13
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
14
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
15
reference_url https://access.redhat.com/errata/RHSA-2025:22072
reference_id RHSA-2025:22072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22072
16
reference_url https://access.redhat.com/errata/RHSA-2025:23422
reference_id RHSA-2025:23422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23422
17
reference_url https://access.redhat.com/errata/RHSA-2025:23423
reference_id RHSA-2025:23423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23423
18
reference_url https://access.redhat.com/errata/RHSA-2025:23424
reference_id RHSA-2025:23424
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23424
19
reference_url https://access.redhat.com/errata/RHSA-2025:23426
reference_id RHSA-2025:23426
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23426
20
reference_url https://access.redhat.com/errata/RHSA-2025:23463
reference_id RHSA-2025:23463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23463
21
reference_url https://access.redhat.com/errata/RHSA-2025:23947
reference_id RHSA-2025:23947
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23947
22
reference_url https://access.redhat.com/errata/RHSA-2025:23960
reference_id RHSA-2025:23960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23960
23
reference_url https://access.redhat.com/errata/RHSA-2026:0536
reference_id RHSA-2026:0536
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0536
24
reference_url https://access.redhat.com/errata/RHSA-2026:0643
reference_id RHSA-2026:0643
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0643
fixed_packages
aliases CVE-2023-53322
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-djyp-77yw-cfh2
58
url VCID-dmr7-td91-f3dt
vulnerability_id VCID-dmr7-td91-f3dt
summary kernel: scsi: qedi: Fix use after free bug in qedi_remove()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54100.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54100.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-54100
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10911
published_at 2026-04-02T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10975
published_at 2026-04-04T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.108
published_at 2026-04-07T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10876
published_at 2026-04-08T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10929
published_at 2026-04-09T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.1093
published_at 2026-04-11T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10897
published_at 2026-04-12T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10874
published_at 2026-04-21T12:55:00Z
8
value 0.00036
scoring_system epss
scoring_elements 0.10734
published_at 2026-04-16T12:55:00Z
9
value 0.00036
scoring_system epss
scoring_elements 0.10747
published_at 2026-04-18T12:55:00Z
10
value 0.00036
scoring_system epss
scoring_elements 0.10834
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-54100
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54100
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54100
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2425099
reference_id 2425099
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2425099
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-54100
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dmr7-td91-f3dt
59
url VCID-dws2-fd38-kfe7
vulnerability_id VCID-dws2-fd38-kfe7
summary kernel: md: raid1: fix potential OOB in raid1_remove_disk()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53722.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53722.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53722
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.12252
published_at 2026-04-02T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.12297
published_at 2026-04-04T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.12095
published_at 2026-04-07T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.12177
published_at 2026-04-08T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.12228
published_at 2026-04-09T12:55:00Z
5
value 0.0004
scoring_system epss
scoring_elements 0.12236
published_at 2026-04-11T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.12199
published_at 2026-04-12T12:55:00Z
7
value 0.0004
scoring_system epss
scoring_elements 0.12163
published_at 2026-04-13T12:55:00Z
8
value 0.0004
scoring_system epss
scoring_elements 0.12033
published_at 2026-04-16T12:55:00Z
9
value 0.0004
scoring_system epss
scoring_elements 0.12035
published_at 2026-04-18T12:55:00Z
10
value 0.0004
scoring_system epss
scoring_elements 0.1215
published_at 2026-04-21T12:55:00Z
11
value 0.0004
scoring_system epss
scoring_elements 0.12126
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53722
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53722
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2405756
reference_id 2405756
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2405756
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53722
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dws2-fd38-kfe7
60
url VCID-e7mz-znzm-5yf1
vulnerability_id VCID-e7mz-znzm-5yf1
summary kernel: mptcp: fix UaF in listener shutdown
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53088.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53088.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53088
reference_id
reference_type
scores
0
value 0.00052
scoring_system epss
scoring_elements 0.16289
published_at 2026-04-02T12:55:00Z
1
value 0.00052
scoring_system epss
scoring_elements 0.16351
published_at 2026-04-04T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.1615
published_at 2026-04-07T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.16236
published_at 2026-04-08T12:55:00Z
4
value 0.00052
scoring_system epss
scoring_elements 0.16302
published_at 2026-04-09T12:55:00Z
5
value 0.00052
scoring_system epss
scoring_elements 0.16284
published_at 2026-04-11T12:55:00Z
6
value 0.00052
scoring_system epss
scoring_elements 0.16244
published_at 2026-04-12T12:55:00Z
7
value 0.00052
scoring_system epss
scoring_elements 0.16176
published_at 2026-04-13T12:55:00Z
8
value 0.00052
scoring_system epss
scoring_elements 0.16114
published_at 2026-04-16T12:55:00Z
9
value 0.00052
scoring_system epss
scoring_elements 0.16132
published_at 2026-04-18T12:55:00Z
10
value 0.00052
scoring_system epss
scoring_elements 0.1617
published_at 2026-04-21T12:55:00Z
11
value 0.00052
scoring_system epss
scoring_elements 0.16059
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53088
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2363766
reference_id 2363766
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2363766
4
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
5
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53088
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e7mz-znzm-5yf1
61
url VCID-ebkx-mvcd-sfde
vulnerability_id VCID-ebkx-mvcd-sfde
summary kernel: rsvp: out-of-bounds read in rsvp_classify()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42755.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42755.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42755
reference_id
reference_type
scores
0
value 6e-05
scoring_system epss
scoring_elements 0.00423
published_at 2026-04-24T12:55:00Z
1
value 6e-05
scoring_system epss
scoring_elements 0.00402
published_at 2026-04-08T12:55:00Z
2
value 6e-05
scoring_system epss
scoring_elements 0.00404
published_at 2026-04-11T12:55:00Z
3
value 6e-05
scoring_system epss
scoring_elements 0.004
published_at 2026-04-12T12:55:00Z
4
value 6e-05
scoring_system epss
scoring_elements 0.00398
published_at 2026-04-13T12:55:00Z
5
value 6e-05
scoring_system epss
scoring_elements 0.00393
published_at 2026-04-16T12:55:00Z
6
value 6e-05
scoring_system epss
scoring_elements 0.00397
published_at 2026-04-18T12:55:00Z
7
value 6e-05
scoring_system epss
scoring_elements 0.00422
published_at 2026-04-21T12:55:00Z
8
value 6e-05
scoring_system epss
scoring_elements 0.00406
published_at 2026-04-07T12:55:00Z
9
value 7e-05
scoring_system epss
scoring_elements 0.005
published_at 2026-04-04T12:55:00Z
10
value 7e-05
scoring_system epss
scoring_elements 0.00507
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42755
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42755
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2239847
reference_id 2239847
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:12:38Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2239847
5
reference_url https://seclists.org/oss-sec/2023/q3/229
reference_id 229
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:12:38Z/
url https://seclists.org/oss-sec/2023/q3/229
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv
reference_id cpe:/a:redhat:enterprise_linux:8::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime
reference_id cpe:/a:redhat:enterprise_linux:8::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
13
reference_url https://access.redhat.com/security/cve/CVE-2023-42755
reference_id CVE-2023-42755
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:12:38Z/
url https://access.redhat.com/security/cve/CVE-2023-42755
14
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:12:38Z/
url https://access.redhat.com/errata/RHSA-2024:2950
15
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:12:38Z/
url https://access.redhat.com/errata/RHSA-2024:3138
16
reference_url https://usn.ubuntu.com/6439-1/
reference_id USN-6439-1
reference_type
scores
url https://usn.ubuntu.com/6439-1/
17
reference_url https://usn.ubuntu.com/6439-2/
reference_id USN-6439-2
reference_type
scores
url https://usn.ubuntu.com/6439-2/
18
reference_url https://usn.ubuntu.com/6440-1/
reference_id USN-6440-1
reference_type
scores
url https://usn.ubuntu.com/6440-1/
19
reference_url https://usn.ubuntu.com/6440-2/
reference_id USN-6440-2
reference_type
scores
url https://usn.ubuntu.com/6440-2/
20
reference_url https://usn.ubuntu.com/6440-3/
reference_id USN-6440-3
reference_type
scores
url https://usn.ubuntu.com/6440-3/
21
reference_url https://usn.ubuntu.com/6441-1/
reference_id USN-6441-1
reference_type
scores
url https://usn.ubuntu.com/6441-1/
22
reference_url https://usn.ubuntu.com/6441-2/
reference_id USN-6441-2
reference_type
scores
url https://usn.ubuntu.com/6441-2/
23
reference_url https://usn.ubuntu.com/6441-3/
reference_id USN-6441-3
reference_type
scores
url https://usn.ubuntu.com/6441-3/
24
reference_url https://usn.ubuntu.com/6442-1/
reference_id USN-6442-1
reference_type
scores
url https://usn.ubuntu.com/6442-1/
25
reference_url https://usn.ubuntu.com/6443-1/
reference_id USN-6443-1
reference_type
scores
url https://usn.ubuntu.com/6443-1/
26
reference_url https://usn.ubuntu.com/6444-1/
reference_id USN-6444-1
reference_type
scores
url https://usn.ubuntu.com/6444-1/
27
reference_url https://usn.ubuntu.com/6444-2/
reference_id USN-6444-2
reference_type
scores
url https://usn.ubuntu.com/6444-2/
28
reference_url https://usn.ubuntu.com/6445-1/
reference_id USN-6445-1
reference_type
scores
url https://usn.ubuntu.com/6445-1/
29
reference_url https://usn.ubuntu.com/6445-2/
reference_id USN-6445-2
reference_type
scores
url https://usn.ubuntu.com/6445-2/
30
reference_url https://usn.ubuntu.com/6446-1/
reference_id USN-6446-1
reference_type
scores
url https://usn.ubuntu.com/6446-1/
31
reference_url https://usn.ubuntu.com/6446-2/
reference_id USN-6446-2
reference_type
scores
url https://usn.ubuntu.com/6446-2/
32
reference_url https://usn.ubuntu.com/6446-3/
reference_id USN-6446-3
reference_type
scores
url https://usn.ubuntu.com/6446-3/
33
reference_url https://usn.ubuntu.com/6460-1/
reference_id USN-6460-1
reference_type
scores
url https://usn.ubuntu.com/6460-1/
34
reference_url https://usn.ubuntu.com/6466-1/
reference_id USN-6466-1
reference_type
scores
url https://usn.ubuntu.com/6466-1/
fixed_packages
aliases CVE-2023-42755
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ebkx-mvcd-sfde
62
url VCID-ee81-gwef-x7hg
vulnerability_id VCID-ee81-gwef-x7hg
summary kernel: local privileges escalation in kernel/bpf/verifier.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23222.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23222.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23222
reference_id
reference_type
scores
0
value 0.00562
scoring_system epss
scoring_elements 0.68406
published_at 2026-04-24T12:55:00Z
1
value 0.00562
scoring_system epss
scoring_elements 0.68347
published_at 2026-04-09T12:55:00Z
2
value 0.00562
scoring_system epss
scoring_elements 0.68372
published_at 2026-04-11T12:55:00Z
3
value 0.00562
scoring_system epss
scoring_elements 0.68359
published_at 2026-04-12T12:55:00Z
4
value 0.00562
scoring_system epss
scoring_elements 0.68327
published_at 2026-04-13T12:55:00Z
5
value 0.00562
scoring_system epss
scoring_elements 0.68366
published_at 2026-04-16T12:55:00Z
6
value 0.00562
scoring_system epss
scoring_elements 0.68379
published_at 2026-04-18T12:55:00Z
7
value 0.00562
scoring_system epss
scoring_elements 0.68358
published_at 2026-04-21T12:55:00Z
8
value 0.00587
scoring_system epss
scoring_elements 0.69101
published_at 2026-04-08T12:55:00Z
9
value 0.00738
scoring_system epss
scoring_elements 0.72801
published_at 2026-04-07T12:55:00Z
10
value 0.00738
scoring_system epss
scoring_elements 0.72804
published_at 2026-04-02T12:55:00Z
11
value 0.00738
scoring_system epss
scoring_elements 0.72825
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23222
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0185
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043520
reference_id 2043520
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043520
16
reference_url https://security.archlinux.org/AVG-2668
reference_id AVG-2668
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2668
17
reference_url https://security.archlinux.org/AVG-2669
reference_id AVG-2669
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2669
18
reference_url https://security.archlinux.org/AVG-2670
reference_id AVG-2670
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2670
19
reference_url https://security.archlinux.org/AVG-2671
reference_id AVG-2671
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2671
20
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
21
reference_url https://access.redhat.com/errata/RHSA-2024:10262
reference_id RHSA-2024:10262
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10262
22
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
23
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
24
reference_url https://usn.ubuntu.com/5278-1/
reference_id USN-5278-1
reference_type
scores
url https://usn.ubuntu.com/5278-1/
25
reference_url https://usn.ubuntu.com/5337-1/
reference_id USN-5337-1
reference_type
scores
url https://usn.ubuntu.com/5337-1/
26
reference_url https://usn.ubuntu.com/5362-1/
reference_id USN-5362-1
reference_type
scores
url https://usn.ubuntu.com/5362-1/
27
reference_url https://usn.ubuntu.com/5368-1/
reference_id USN-5368-1
reference_type
scores
url https://usn.ubuntu.com/5368-1/
fixed_packages
aliases CVE-2022-23222
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ee81-gwef-x7hg
63
url VCID-ejyg-b2cr-73gc
vulnerability_id VCID-ejyg-b2cr-73gc
summary kernel: x86/sev: Make enc_dec_hypercall() accept a size instead of npages
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53996.json
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53996.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53996
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.0316
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.0317
published_at 2026-04-04T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03173
published_at 2026-04-07T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03178
published_at 2026-04-08T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03203
published_at 2026-04-09T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03162
published_at 2026-04-11T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.03136
published_at 2026-04-12T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03122
published_at 2026-04-13T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.03098
published_at 2026-04-16T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03105
published_at 2026-04-18T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03225
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53996
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2424944
reference_id 2424944
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2424944
4
reference_url https://access.redhat.com/errata/RHSA-2023:7749
reference_id RHSA-2023:7749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7749
5
reference_url https://access.redhat.com/errata/RHSA-2024:0575
reference_id RHSA-2024:0575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0575
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53996
risk_score 2.5
exploitability 0.5
weighted_severity 5.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ejyg-b2cr-73gc
64
url VCID-emge-avzn-mkgz
vulnerability_id VCID-emge-avzn-mkgz
summary kernel: Null Pointer Dereference vulnerability in ida_free in lib/idr.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6915.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6915.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6915
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01455
published_at 2026-04-24T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01359
published_at 2026-04-02T12:55:00Z
2
value 0.00011
scoring_system epss
scoring_elements 0.01379
published_at 2026-04-09T12:55:00Z
3
value 0.00011
scoring_system epss
scoring_elements 0.01368
published_at 2026-04-18T12:55:00Z
4
value 0.00011
scoring_system epss
scoring_elements 0.01362
published_at 2026-04-12T12:55:00Z
5
value 0.00011
scoring_system epss
scoring_elements 0.01355
published_at 2026-04-16T12:55:00Z
6
value 0.00011
scoring_system epss
scoring_elements 0.01447
published_at 2026-04-21T12:55:00Z
7
value 0.00011
scoring_system epss
scoring_elements 0.01364
published_at 2026-04-13T12:55:00Z
8
value 0.00011
scoring_system epss
scoring_elements 0.01374
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6915
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6915
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2254982
reference_id 2254982
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T20:13:23Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2254982
5
reference_url https://github.com/torvalds/linux/commit/af73483f4e8b6f5c68c9aa63257bdd929a9c194a
reference_id af73483f4e8b6f5c68c9aa63257bdd929a9c194a
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T20:13:23Z/
url https://github.com/torvalds/linux/commit/af73483f4e8b6f5c68c9aa63257bdd929a9c194a
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv
reference_id cpe:/a:redhat:enterprise_linux:8::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime
reference_id cpe:/a:redhat:enterprise_linux:8::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv
reference_id cpe:/a:redhat:enterprise_linux:9::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime
reference_id cpe:/a:redhat:enterprise_linux:9::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
18
reference_url https://access.redhat.com/security/cve/CVE-2023-6915
reference_id CVE-2023-6915
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T20:13:23Z/
url https://access.redhat.com/security/cve/CVE-2023-6915
19
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T20:13:23Z/
url https://access.redhat.com/errata/RHSA-2024:2394
20
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T20:13:23Z/
url https://access.redhat.com/errata/RHSA-2024:2950
21
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T20:13:23Z/
url https://access.redhat.com/errata/RHSA-2024:3138
22
reference_url https://usn.ubuntu.com/6648-1/
reference_id USN-6648-1
reference_type
scores
url https://usn.ubuntu.com/6648-1/
23
reference_url https://usn.ubuntu.com/6648-2/
reference_id USN-6648-2
reference_type
scores
url https://usn.ubuntu.com/6648-2/
24
reference_url https://usn.ubuntu.com/6650-1/
reference_id USN-6650-1
reference_type
scores
url https://usn.ubuntu.com/6650-1/
25
reference_url https://usn.ubuntu.com/6651-1/
reference_id USN-6651-1
reference_type
scores
url https://usn.ubuntu.com/6651-1/
26
reference_url https://usn.ubuntu.com/6651-2/
reference_id USN-6651-2
reference_type
scores
url https://usn.ubuntu.com/6651-2/
27
reference_url https://usn.ubuntu.com/6651-3/
reference_id USN-6651-3
reference_type
scores
url https://usn.ubuntu.com/6651-3/
28
reference_url https://usn.ubuntu.com/6652-1/
reference_id USN-6652-1
reference_type
scores
url https://usn.ubuntu.com/6652-1/
29
reference_url https://usn.ubuntu.com/6653-1/
reference_id USN-6653-1
reference_type
scores
url https://usn.ubuntu.com/6653-1/
30
reference_url https://usn.ubuntu.com/6653-2/
reference_id USN-6653-2
reference_type
scores
url https://usn.ubuntu.com/6653-2/
31
reference_url https://usn.ubuntu.com/6653-3/
reference_id USN-6653-3
reference_type
scores
url https://usn.ubuntu.com/6653-3/
32
reference_url https://usn.ubuntu.com/6653-4/
reference_id USN-6653-4
reference_type
scores
url https://usn.ubuntu.com/6653-4/
33
reference_url https://usn.ubuntu.com/6740-1/
reference_id USN-6740-1
reference_type
scores
url https://usn.ubuntu.com/6740-1/
fixed_packages
aliases CVE-2023-6915
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-emge-avzn-mkgz
65
url VCID-emkv-9fnu-5kc5
vulnerability_id VCID-emkv-9fnu-5kc5
summary kernel: mm/swap: fix swap_info_struct race between swapoff and get_swap_pages()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53623.json
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53623.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53623
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02326
published_at 2026-04-02T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02335
published_at 2026-04-04T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.0233
published_at 2026-04-07T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02333
published_at 2026-04-08T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02355
published_at 2026-04-09T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02332
published_at 2026-04-11T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02318
published_at 2026-04-12T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02316
published_at 2026-04-13T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.023
published_at 2026-04-16T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02306
published_at 2026-04-18T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02675
published_at 2026-04-21T12:55:00Z
11
value 0.00014
scoring_system epss
scoring_elements 0.02384
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53623
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53623
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2402289
reference_id 2402289
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2402289
5
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53623
risk_score 2.5
exploitability 0.5
weighted_severity 5.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-emkv-9fnu-5kc5
66
url VCID-er3h-4pqj-dqah
vulnerability_id VCID-er3h-4pqj-dqah
summary kernel: xfrm: out-of-bounds read in __xfrm_state_filter_match()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39194.json
reference_id
reference_type
scores
0
value 3.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39194.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39194
reference_id
reference_type
scores
0
value 9e-05
scoring_system epss
scoring_elements 0.00827
published_at 2026-04-04T12:55:00Z
1
value 9e-05
scoring_system epss
scoring_elements 0.00828
published_at 2026-04-07T12:55:00Z
2
value 9e-05
scoring_system epss
scoring_elements 0.00833
published_at 2026-04-08T12:55:00Z
3
value 9e-05
scoring_system epss
scoring_elements 0.0083
published_at 2026-04-09T12:55:00Z
4
value 9e-05
scoring_system epss
scoring_elements 0.00819
published_at 2026-04-18T12:55:00Z
5
value 9e-05
scoring_system epss
scoring_elements 0.00813
published_at 2026-04-12T12:55:00Z
6
value 9e-05
scoring_system epss
scoring_elements 0.00815
published_at 2026-04-13T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.00814
published_at 2026-04-16T12:55:00Z
8
value 9e-05
scoring_system epss
scoring_elements 0.01018
published_at 2026-04-21T12:55:00Z
9
value 9e-05
scoring_system epss
scoring_elements 0.01019
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39194
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39194
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2226788
reference_id 2226788
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2226788
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
7
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
8
reference_url https://usn.ubuntu.com/6494-1/
reference_id USN-6494-1
reference_type
scores
url https://usn.ubuntu.com/6494-1/
9
reference_url https://usn.ubuntu.com/6494-2/
reference_id USN-6494-2
reference_type
scores
url https://usn.ubuntu.com/6494-2/
10
reference_url https://usn.ubuntu.com/6532-1/
reference_id USN-6532-1
reference_type
scores
url https://usn.ubuntu.com/6532-1/
11
reference_url https://usn.ubuntu.com/6534-1/
reference_id USN-6534-1
reference_type
scores
url https://usn.ubuntu.com/6534-1/
12
reference_url https://usn.ubuntu.com/6534-2/
reference_id USN-6534-2
reference_type
scores
url https://usn.ubuntu.com/6534-2/
13
reference_url https://usn.ubuntu.com/6534-3/
reference_id USN-6534-3
reference_type
scores
url https://usn.ubuntu.com/6534-3/
14
reference_url https://usn.ubuntu.com/6548-1/
reference_id USN-6548-1
reference_type
scores
url https://usn.ubuntu.com/6548-1/
15
reference_url https://usn.ubuntu.com/6548-2/
reference_id USN-6548-2
reference_type
scores
url https://usn.ubuntu.com/6548-2/
16
reference_url https://usn.ubuntu.com/6548-3/
reference_id USN-6548-3
reference_type
scores
url https://usn.ubuntu.com/6548-3/
17
reference_url https://usn.ubuntu.com/6548-4/
reference_id USN-6548-4
reference_type
scores
url https://usn.ubuntu.com/6548-4/
18
reference_url https://usn.ubuntu.com/6548-5/
reference_id USN-6548-5
reference_type
scores
url https://usn.ubuntu.com/6548-5/
19
reference_url https://usn.ubuntu.com/6549-1/
reference_id USN-6549-1
reference_type
scores
url https://usn.ubuntu.com/6549-1/
20
reference_url https://usn.ubuntu.com/6549-2/
reference_id USN-6549-2
reference_type
scores
url https://usn.ubuntu.com/6549-2/
21
reference_url https://usn.ubuntu.com/6549-3/
reference_id USN-6549-3
reference_type
scores
url https://usn.ubuntu.com/6549-3/
22
reference_url https://usn.ubuntu.com/6549-4/
reference_id USN-6549-4
reference_type
scores
url https://usn.ubuntu.com/6549-4/
23
reference_url https://usn.ubuntu.com/6549-5/
reference_id USN-6549-5
reference_type
scores
url https://usn.ubuntu.com/6549-5/
fixed_packages
aliases CVE-2023-39194
risk_score 1.4
exploitability 0.5
weighted_severity 2.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-er3h-4pqj-dqah
67
url VCID-f86y-uswn-u7ct
vulnerability_id VCID-f86y-uswn-u7ct
summary kernel: ethtool: Fix uninitialized number of lanes
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53798.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53798.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53798
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07494
published_at 2026-04-02T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07533
published_at 2026-04-04T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07514
published_at 2026-04-07T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07573
published_at 2026-04-08T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07593
published_at 2026-04-09T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10231
published_at 2026-04-21T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.10211
published_at 2026-04-24T12:55:00Z
7
value 0.00035
scoring_system epss
scoring_elements 0.10305
published_at 2026-04-11T12:55:00Z
8
value 0.00035
scoring_system epss
scoring_elements 0.10265
published_at 2026-04-12T12:55:00Z
9
value 0.00035
scoring_system epss
scoring_elements 0.10246
published_at 2026-04-13T12:55:00Z
10
value 0.00035
scoring_system epss
scoring_elements 0.10119
published_at 2026-04-16T12:55:00Z
11
value 0.00035
scoring_system epss
scoring_elements 0.10098
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53798
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2420252
reference_id 2420252
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2420252
4
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53798
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f86y-uswn-u7ct
68
url VCID-fm9q-u17m-dqbu
vulnerability_id VCID-fm9q-u17m-dqbu
summary kernel: ice: Don't tx before switchdev is fully configured
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53657.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53657.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53657
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01826
published_at 2026-04-02T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01838
published_at 2026-04-04T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.0184
published_at 2026-04-07T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01843
published_at 2026-04-08T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01857
published_at 2026-04-09T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01844
published_at 2026-04-11T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01829
published_at 2026-04-12T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.01824
published_at 2026-04-13T12:55:00Z
8
value 0.00012
scoring_system epss
scoring_elements 0.01807
published_at 2026-04-16T12:55:00Z
9
value 0.00012
scoring_system epss
scoring_elements 0.01806
published_at 2026-04-18T12:55:00Z
10
value 0.00012
scoring_system epss
scoring_elements 0.01887
published_at 2026-04-21T12:55:00Z
11
value 0.00012
scoring_system epss
scoring_elements 0.0188
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53657
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2402281
reference_id 2402281
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2402281
4
reference_url https://access.redhat.com/errata/RHSA-2023:7557
reference_id RHSA-2023:7557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7557
5
reference_url https://access.redhat.com/errata/RHSA-2023:7749
reference_id RHSA-2023:7749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7749
6
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
7
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53657
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fm9q-u17m-dqbu
69
url VCID-g688-fq6a-abas
vulnerability_id VCID-g688-fq6a-abas
summary kernel: Linux ebpf logic vulnerability leads to critical memory read and write gaining root privileges
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0500.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0500.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0500
reference_id
reference_type
scores
0
value 0.0003
scoring_system epss
scoring_elements 0.08534
published_at 2026-04-07T12:55:00Z
1
value 0.0003
scoring_system epss
scoring_elements 0.08631
published_at 2026-04-09T12:55:00Z
2
value 0.0003
scoring_system epss
scoring_elements 0.08561
published_at 2026-04-02T12:55:00Z
3
value 0.0003
scoring_system epss
scoring_elements 0.08614
published_at 2026-04-04T12:55:00Z
4
value 0.0003
scoring_system epss
scoring_elements 0.08606
published_at 2026-04-08T12:55:00Z
5
value 0.0003
scoring_system epss
scoring_elements 0.08628
published_at 2026-04-11T12:55:00Z
6
value 0.0003
scoring_system epss
scoring_elements 0.08605
published_at 2026-04-12T12:55:00Z
7
value 0.0003
scoring_system epss
scoring_elements 0.08593
published_at 2026-04-13T12:55:00Z
8
value 0.00033
scoring_system epss
scoring_elements 0.09635
published_at 2026-04-21T12:55:00Z
9
value 0.00033
scoring_system epss
scoring_elements 0.09683
published_at 2026-04-24T12:55:00Z
10
value 0.00033
scoring_system epss
scoring_elements 0.09483
published_at 2026-04-16T12:55:00Z
11
value 0.00033
scoring_system epss
scoring_elements 0.09487
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0500
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0500
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2044578
reference_id 2044578
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2044578
5
reference_url https://security.archlinux.org/AVG-2772
reference_id AVG-2772
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2772
6
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
7
reference_url https://access.redhat.com/errata/RHSA-2024:10262
reference_id RHSA-2024:10262
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10262
8
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
9
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
10
reference_url https://usn.ubuntu.com/5518-1/
reference_id USN-5518-1
reference_type
scores
url https://usn.ubuntu.com/5518-1/
11
reference_url https://usn.ubuntu.com/5564-1/
reference_id USN-5564-1
reference_type
scores
url https://usn.ubuntu.com/5564-1/
fixed_packages
aliases CVE-2022-0500
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g688-fq6a-abas
70
url VCID-ge2g-2ct8-4bdk
vulnerability_id VCID-ge2g-2ct8-4bdk
summary kernel: ALSA: ac97: Fix possible NULL dereference in snd_ac97_mixer
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53648.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53648.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53648
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02683
published_at 2026-04-24T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02576
published_at 2026-04-16T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02584
published_at 2026-04-18T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02693
published_at 2026-04-21T12:55:00Z
4
value 0.00029
scoring_system epss
scoring_elements 0.08273
published_at 2026-04-07T12:55:00Z
5
value 0.00029
scoring_system epss
scoring_elements 0.08354
published_at 2026-04-09T12:55:00Z
6
value 0.00029
scoring_system epss
scoring_elements 0.08345
published_at 2026-04-11T12:55:00Z
7
value 0.00029
scoring_system epss
scoring_elements 0.08325
published_at 2026-04-12T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08308
published_at 2026-04-13T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.08337
published_at 2026-04-08T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08276
published_at 2026-04-02T12:55:00Z
11
value 0.00029
scoring_system epss
scoring_elements 0.08328
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53648
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53648
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2402287
reference_id 2402287
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2402287
5
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53648
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ge2g-2ct8-4bdk
71
url VCID-gfcn-m7gp-2qh7
vulnerability_id VCID-gfcn-m7gp-2qh7
summary kernel: local dos vulnerability in scatterwalk_copychunks
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6176.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6176.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6176
reference_id
reference_type
scores
0
value 0.0001
scoring_system epss
scoring_elements 0.01067
published_at 2026-04-24T12:55:00Z
1
value 0.0001
scoring_system epss
scoring_elements 0.01013
published_at 2026-04-02T12:55:00Z
2
value 0.0001
scoring_system epss
scoring_elements 0.01026
published_at 2026-04-09T12:55:00Z
3
value 0.0001
scoring_system epss
scoring_elements 0.01011
published_at 2026-04-11T12:55:00Z
4
value 0.0001
scoring_system epss
scoring_elements 0.01006
published_at 2026-04-13T12:55:00Z
5
value 0.0001
scoring_system epss
scoring_elements 0.00999
published_at 2026-04-16T12:55:00Z
6
value 0.0001
scoring_system epss
scoring_elements 0.01009
published_at 2026-04-18T12:55:00Z
7
value 0.0001
scoring_system epss
scoring_elements 0.01015
published_at 2026-04-04T12:55:00Z
8
value 0.0001
scoring_system epss
scoring_elements 0.01023
published_at 2026-04-07T12:55:00Z
9
value 0.0001
scoring_system epss
scoring_elements 0.01028
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6176
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6176
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2219359
reference_id 2219359
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-17T17:18:19Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2219359
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv
reference_id cpe:/a:redhat:enterprise_linux:8::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime
reference_id cpe:/a:redhat:enterprise_linux:8::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv
reference_id cpe:/a:redhat:enterprise_linux:9::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime
reference_id cpe:/a:redhat:enterprise_linux:9::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
17
reference_url https://access.redhat.com/security/cve/CVE-2023-6176
reference_id CVE-2023-6176
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-17T17:18:19Z/
url https://access.redhat.com/security/cve/CVE-2023-6176
18
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cfaa80c91f6f99b9342b6557f0f0e1143e434066
reference_id ?id=cfaa80c91f6f99b9342b6557f0f0e1143e434066
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-17T17:18:19Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cfaa80c91f6f99b9342b6557f0f0e1143e434066
19
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-17T17:18:19Z/
url https://access.redhat.com/errata/RHSA-2024:2394
20
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-17T17:18:19Z/
url https://access.redhat.com/errata/RHSA-2024:2950
21
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-17T17:18:19Z/
url https://access.redhat.com/errata/RHSA-2024:3138
22
reference_url https://usn.ubuntu.com/6548-1/
reference_id USN-6548-1
reference_type
scores
url https://usn.ubuntu.com/6548-1/
23
reference_url https://usn.ubuntu.com/6548-2/
reference_id USN-6548-2
reference_type
scores
url https://usn.ubuntu.com/6548-2/
24
reference_url https://usn.ubuntu.com/6548-3/
reference_id USN-6548-3
reference_type
scores
url https://usn.ubuntu.com/6548-3/
25
reference_url https://usn.ubuntu.com/6548-4/
reference_id USN-6548-4
reference_type
scores
url https://usn.ubuntu.com/6548-4/
26
reference_url https://usn.ubuntu.com/6548-5/
reference_id USN-6548-5
reference_type
scores
url https://usn.ubuntu.com/6548-5/
27
reference_url https://usn.ubuntu.com/6624-1/
reference_id USN-6624-1
reference_type
scores
url https://usn.ubuntu.com/6624-1/
28
reference_url https://usn.ubuntu.com/6626-1/
reference_id USN-6626-1
reference_type
scores
url https://usn.ubuntu.com/6626-1/
29
reference_url https://usn.ubuntu.com/6626-2/
reference_id USN-6626-2
reference_type
scores
url https://usn.ubuntu.com/6626-2/
30
reference_url https://usn.ubuntu.com/6626-3/
reference_id USN-6626-3
reference_type
scores
url https://usn.ubuntu.com/6626-3/
31
reference_url https://usn.ubuntu.com/6628-1/
reference_id USN-6628-1
reference_type
scores
url https://usn.ubuntu.com/6628-1/
32
reference_url https://usn.ubuntu.com/6628-2/
reference_id USN-6628-2
reference_type
scores
url https://usn.ubuntu.com/6628-2/
33
reference_url https://usn.ubuntu.com/6652-1/
reference_id USN-6652-1
reference_type
scores
url https://usn.ubuntu.com/6652-1/
fixed_packages
aliases CVE-2023-6176
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gfcn-m7gp-2qh7
72
url VCID-gfzy-amh8-cbd3
vulnerability_id VCID-gfzy-amh8-cbd3
summary kernel: scsi: qla2xxx: Pointer may be dereferenced
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53150.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53150.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53150
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03051
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03065
published_at 2026-04-04T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03066
published_at 2026-04-07T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03069
published_at 2026-04-08T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03094
published_at 2026-04-09T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.02922
published_at 2026-04-11T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.02902
published_at 2026-04-12T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.02895
published_at 2026-04-13T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.02875
published_at 2026-04-16T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.02885
published_at 2026-04-18T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03004
published_at 2026-04-21T12:55:00Z
11
value 0.00015
scoring_system epss
scoring_elements 0.02998
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53150
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53150
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53150
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2395327
reference_id 2395327
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2395327
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53150
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gfzy-amh8-cbd3
73
url VCID-ghzf-wqx1-dyhc
vulnerability_id VCID-ghzf-wqx1-dyhc
summary kernel: KVM: information leak in KVM_GET_DEBUGREGS ioctl on 32-bit systems
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1513.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1513.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1513
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05567
published_at 2026-04-04T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05531
published_at 2026-04-02T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05628
published_at 2026-04-09T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05603
published_at 2026-04-08T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05565
published_at 2026-04-07T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06632
published_at 2026-04-24T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06543
published_at 2026-04-11T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06537
published_at 2026-04-12T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06527
published_at 2026-04-13T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06463
published_at 2026-04-16T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06471
published_at 2026-04-18T12:55:00Z
11
value 0.00024
scoring_system epss
scoring_elements 0.06621
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1513
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1513
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lore.kernel.org/kvm/20230214103304.3689213-1-gregkh%40linuxfoundation.org/
reference_id 20230214103304.3689213-1-gregkh%40linuxfoundation.org
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-25T19:33:05Z/
url https://lore.kernel.org/kvm/20230214103304.3689213-1-gregkh%40linuxfoundation.org/
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2179892
reference_id 2179892
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-25T19:33:05Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2179892
6
reference_url https://github.com/torvalds/linux/commit/2c10b61421a28e95a46ab489fd56c0f442ff6952
reference_id 2c10b61421a28e95a46ab489fd56c0f442ff6952
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-25T19:33:05Z/
url https://github.com/torvalds/linux/commit/2c10b61421a28e95a46ab489fd56c0f442ff6952
7
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-25T19:33:05Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
8
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-25T19:33:05Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
9
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
10
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
11
reference_url https://usn.ubuntu.com/6079-1/
reference_id USN-6079-1
reference_type
scores
url https://usn.ubuntu.com/6079-1/
12
reference_url https://usn.ubuntu.com/6080-1/
reference_id USN-6080-1
reference_type
scores
url https://usn.ubuntu.com/6080-1/
13
reference_url https://usn.ubuntu.com/6081-1/
reference_id USN-6081-1
reference_type
scores
url https://usn.ubuntu.com/6081-1/
14
reference_url https://usn.ubuntu.com/6084-1/
reference_id USN-6084-1
reference_type
scores
url https://usn.ubuntu.com/6084-1/
15
reference_url https://usn.ubuntu.com/6085-1/
reference_id USN-6085-1
reference_type
scores
url https://usn.ubuntu.com/6085-1/
16
reference_url https://usn.ubuntu.com/6090-1/
reference_id USN-6090-1
reference_type
scores
url https://usn.ubuntu.com/6090-1/
17
reference_url https://usn.ubuntu.com/6091-1/
reference_id USN-6091-1
reference_type
scores
url https://usn.ubuntu.com/6091-1/
18
reference_url https://usn.ubuntu.com/6092-1/
reference_id USN-6092-1
reference_type
scores
url https://usn.ubuntu.com/6092-1/
19
reference_url https://usn.ubuntu.com/6094-1/
reference_id USN-6094-1
reference_type
scores
url https://usn.ubuntu.com/6094-1/
20
reference_url https://usn.ubuntu.com/6095-1/
reference_id USN-6095-1
reference_type
scores
url https://usn.ubuntu.com/6095-1/
21
reference_url https://usn.ubuntu.com/6096-1/
reference_id USN-6096-1
reference_type
scores
url https://usn.ubuntu.com/6096-1/
22
reference_url https://usn.ubuntu.com/6109-1/
reference_id USN-6109-1
reference_type
scores
url https://usn.ubuntu.com/6109-1/
23
reference_url https://usn.ubuntu.com/6118-1/
reference_id USN-6118-1
reference_type
scores
url https://usn.ubuntu.com/6118-1/
24
reference_url https://usn.ubuntu.com/6132-1/
reference_id USN-6132-1
reference_type
scores
url https://usn.ubuntu.com/6132-1/
25
reference_url https://usn.ubuntu.com/6133-1/
reference_id USN-6133-1
reference_type
scores
url https://usn.ubuntu.com/6133-1/
26
reference_url https://usn.ubuntu.com/6134-1/
reference_id USN-6134-1
reference_type
scores
url https://usn.ubuntu.com/6134-1/
27
reference_url https://usn.ubuntu.com/6222-1/
reference_id USN-6222-1
reference_type
scores
url https://usn.ubuntu.com/6222-1/
28
reference_url https://usn.ubuntu.com/6256-1/
reference_id USN-6256-1
reference_type
scores
url https://usn.ubuntu.com/6256-1/
fixed_packages
aliases CVE-2023-1513
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ghzf-wqx1-dyhc
74
url VCID-gjpd-7pcg-87bq
vulnerability_id VCID-gjpd-7pcg-87bq
summary kernel: Linux kernel: ACPICA undefined behavior due to zero offset to null pointer
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53182.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53182.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53182
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02476
published_at 2026-04-02T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02488
published_at 2026-04-07T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02491
published_at 2026-04-08T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02512
published_at 2026-04-09T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02402
published_at 2026-04-11T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02392
published_at 2026-04-13T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02376
published_at 2026-04-16T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02381
published_at 2026-04-18T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.0248
published_at 2026-04-21T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02467
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53182
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53182
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2395248
reference_id 2395248
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2395248
5
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
6
reference_url https://access.redhat.com/errata/RHSA-2024:9315
reference_id RHSA-2024:9315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9315
fixed_packages
aliases CVE-2023-53182
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gjpd-7pcg-87bq
75
url VCID-h9yg-t4f4-xkde
vulnerability_id VCID-h9yg-t4f4-xkde
summary kernel: null_blk: Always check queue mode setting from configfs
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53576.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53576.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53576
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.02895
published_at 2026-04-12T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.0291
published_at 2026-04-04T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.02919
published_at 2026-04-07T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.0292
published_at 2026-04-08T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.02945
published_at 2026-04-09T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.02915
published_at 2026-04-11T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.02887
published_at 2026-04-13T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.02868
published_at 2026-04-16T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.02879
published_at 2026-04-18T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.02998
published_at 2026-04-21T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.02992
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53576
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53576
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2401524
reference_id 2401524
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2401524
5
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53576
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h9yg-t4f4-xkde
76
url VCID-hucp-gu2u-97e1
vulnerability_id VCID-hucp-gu2u-97e1
summary hw: amd: Instruction raise #VC exception at exit
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-25743.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-25743.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-25743
reference_id
reference_type
scores
0
value 0.00127
scoring_system epss
scoring_elements 0.31891
published_at 2026-04-24T12:55:00Z
1
value 0.00127
scoring_system epss
scoring_elements 0.32138
published_at 2026-04-09T12:55:00Z
2
value 0.00127
scoring_system epss
scoring_elements 0.32142
published_at 2026-04-11T12:55:00Z
3
value 0.00127
scoring_system epss
scoring_elements 0.32104
published_at 2026-04-12T12:55:00Z
4
value 0.00127
scoring_system epss
scoring_elements 0.32073
published_at 2026-04-13T12:55:00Z
5
value 0.00127
scoring_system epss
scoring_elements 0.32106
published_at 2026-04-16T12:55:00Z
6
value 0.00127
scoring_system epss
scoring_elements 0.32084
published_at 2026-04-18T12:55:00Z
7
value 0.00127
scoring_system epss
scoring_elements 0.32056
published_at 2026-04-21T12:55:00Z
8
value 0.00127
scoring_system epss
scoring_elements 0.32197
published_at 2026-04-02T12:55:00Z
9
value 0.00127
scoring_system epss
scoring_elements 0.32235
published_at 2026-04-04T12:55:00Z
10
value 0.00127
scoring_system epss
scoring_elements 0.3206
published_at 2026-04-07T12:55:00Z
11
value 0.00127
scoring_system epss
scoring_elements 0.32111
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-25743
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25743
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270836
reference_id 2270836
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-23T19:06:44Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2270836
5
reference_url https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3008.html
reference_id amd-sb-3008.html
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-23T19:06:44Z/
url https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3008.html
6
reference_url https://access.redhat.com/errata/RHSA-2024:2627
reference_id RHSA-2024:2627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2627
7
reference_url https://access.redhat.com/errata/RHSA-2024:2628
reference_id RHSA-2024:2628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2628
8
reference_url https://access.redhat.com/errata/RHSA-2024:2758
reference_id RHSA-2024:2758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2758
9
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
10
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
11
reference_url https://access.redhat.com/errata/RHSA-2024:3421
reference_id RHSA-2024:3421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3421
12
reference_url https://access.redhat.com/errata/RHSA-2024:3810
reference_id RHSA-2024:3810
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3810
13
reference_url https://bugzilla.suse.com/show_bug.cgi?id=1223307
reference_id show_bug.cgi?id=1223307
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-23T19:06:44Z/
url https://bugzilla.suse.com/show_bug.cgi?id=1223307
fixed_packages
aliases CVE-2024-25743
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hucp-gu2u-97e1
77
url VCID-hvwv-k9qk-gfar
vulnerability_id VCID-hvwv-k9qk-gfar
summary kernel: ip6_vti: fix slab-use-after-free in decode_session6
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53821.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53821.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53821
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10911
published_at 2026-04-02T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10975
published_at 2026-04-04T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.108
published_at 2026-04-07T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10876
published_at 2026-04-08T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10929
published_at 2026-04-09T12:55:00Z
5
value 0.00047
scoring_system epss
scoring_elements 0.14454
published_at 2026-04-21T12:55:00Z
6
value 0.00047
scoring_system epss
scoring_elements 0.14487
published_at 2026-04-24T12:55:00Z
7
value 0.00047
scoring_system epss
scoring_elements 0.14588
published_at 2026-04-11T12:55:00Z
8
value 0.00047
scoring_system epss
scoring_elements 0.14549
published_at 2026-04-12T12:55:00Z
9
value 0.00047
scoring_system epss
scoring_elements 0.14491
published_at 2026-04-13T12:55:00Z
10
value 0.00047
scoring_system epss
scoring_elements 0.14383
published_at 2026-04-16T12:55:00Z
11
value 0.00047
scoring_system epss
scoring_elements 0.14384
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53821
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53821
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53821
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2420329
reference_id 2420329
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2420329
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
7
reference_url https://access.redhat.com/errata/RHSA-2026:3267
reference_id RHSA-2026:3267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3267
8
reference_url https://access.redhat.com/errata/RHSA-2026:3268
reference_id RHSA-2026:3268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3268
9
reference_url https://access.redhat.com/errata/RHSA-2026:3277
reference_id RHSA-2026:3277
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3277
10
reference_url https://access.redhat.com/errata/RHSA-2026:3293
reference_id RHSA-2026:3293
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3293
11
reference_url https://access.redhat.com/errata/RHSA-2026:3358
reference_id RHSA-2026:3358
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3358
12
reference_url https://access.redhat.com/errata/RHSA-2026:3360
reference_id RHSA-2026:3360
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3360
13
reference_url https://access.redhat.com/errata/RHSA-2026:3375
reference_id RHSA-2026:3375
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3375
14
reference_url https://access.redhat.com/errata/RHSA-2026:3388
reference_id RHSA-2026:3388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3388
fixed_packages
aliases CVE-2023-53821
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hvwv-k9qk-gfar
78
url VCID-j1et-eghs-mfdx
vulnerability_id VCID-j1et-eghs-mfdx
summary kernel: net/mlx5e: Move representor neigh cleanup to profile cleanup_tx
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54148.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54148.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-54148
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.06793
published_at 2026-04-02T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.0684
published_at 2026-04-04T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06822
published_at 2026-04-07T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.06874
published_at 2026-04-08T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.06907
published_at 2026-04-09T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.069
published_at 2026-04-11T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.06893
published_at 2026-04-12T12:55:00Z
7
value 0.00025
scoring_system epss
scoring_elements 0.06888
published_at 2026-04-13T12:55:00Z
8
value 0.00025
scoring_system epss
scoring_elements 0.0683
published_at 2026-04-16T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.06811
published_at 2026-04-18T12:55:00Z
10
value 0.00025
scoring_system epss
scoring_elements 0.06956
published_at 2026-04-21T12:55:00Z
11
value 0.00025
scoring_system epss
scoring_elements 0.06938
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-54148
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2425103
reference_id 2425103
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2425103
4
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
5
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-54148
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j1et-eghs-mfdx
79
url VCID-j2y7-nwcd-5qh7
vulnerability_id VCID-j2y7-nwcd-5qh7
summary kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong con2fb_map assignment
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38409.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38409.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38409
reference_id
reference_type
scores
0
value 6e-05
scoring_system epss
scoring_elements 0.00387
published_at 2026-04-04T12:55:00Z
1
value 6e-05
scoring_system epss
scoring_elements 0.00389
published_at 2026-04-24T12:55:00Z
2
value 6e-05
scoring_system epss
scoring_elements 0.00367
published_at 2026-04-18T12:55:00Z
3
value 6e-05
scoring_system epss
scoring_elements 0.00362
published_at 2026-04-16T12:55:00Z
4
value 6e-05
scoring_system epss
scoring_elements 0.0039
published_at 2026-04-21T12:55:00Z
5
value 6e-05
scoring_system epss
scoring_elements 0.00376
published_at 2026-04-07T12:55:00Z
6
value 6e-05
scoring_system epss
scoring_elements 0.00373
published_at 2026-04-09T12:55:00Z
7
value 6e-05
scoring_system epss
scoring_elements 0.00372
published_at 2026-04-11T12:55:00Z
8
value 6e-05
scoring_system epss
scoring_elements 0.00368
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38409
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2230042
reference_id 2230042
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2230042
4
reference_url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.12
reference_id ChangeLog-6.2.12
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:58:04Z/
url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.12
5
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=fffb0b52d5258554c645c966c6cbef7de50b851d
reference_id commit?id=fffb0b52d5258554c645c966c6cbef7de50b851d
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:58:04Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=fffb0b52d5258554c645c966c6cbef7de50b851d
6
reference_url https://access.redhat.com/errata/RHSA-2023:7539
reference_id RHSA-2023:7539
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7539
7
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
8
reference_url https://access.redhat.com/errata/RHSA-2024:0439
reference_id RHSA-2024:0439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0439
9
reference_url https://access.redhat.com/errata/RHSA-2024:0448
reference_id RHSA-2024:0448
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0448
10
reference_url https://access.redhat.com/errata/RHSA-2024:0461
reference_id RHSA-2024:0461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0461
11
reference_url https://access.redhat.com/errata/RHSA-2024:0562
reference_id RHSA-2024:0562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0562
12
reference_url https://access.redhat.com/errata/RHSA-2024:0563
reference_id RHSA-2024:0563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0563
13
reference_url https://access.redhat.com/errata/RHSA-2024:1249
reference_id RHSA-2024:1249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1249
14
reference_url https://access.redhat.com/errata/RHSA-2024:1250
reference_id RHSA-2024:1250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1250
15
reference_url https://access.redhat.com/errata/RHSA-2024:1268
reference_id RHSA-2024:1268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1268
16
reference_url https://access.redhat.com/errata/RHSA-2024:1269
reference_id RHSA-2024:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1269
17
reference_url https://access.redhat.com/errata/RHSA-2024:1306
reference_id RHSA-2024:1306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1306
18
reference_url https://access.redhat.com/errata/RHSA-2024:1332
reference_id RHSA-2024:1332
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1332
19
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
20
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-38409
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j2y7-nwcd-5qh7
80
url VCID-j6kj-8t9f-gkfj
vulnerability_id VCID-j6kj-8t9f-gkfj
summary kernel: gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52448.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52448.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-52448
reference_id
reference_type
scores
0
value 9e-05
scoring_system epss
scoring_elements 0.00923
published_at 2026-04-04T12:55:00Z
1
value 9e-05
scoring_system epss
scoring_elements 0.0097
published_at 2026-04-24T12:55:00Z
2
value 9e-05
scoring_system epss
scoring_elements 0.0093
published_at 2026-04-08T12:55:00Z
3
value 9e-05
scoring_system epss
scoring_elements 0.00926
published_at 2026-04-09T12:55:00Z
4
value 9e-05
scoring_system epss
scoring_elements 0.00915
published_at 2026-04-11T12:55:00Z
5
value 9e-05
scoring_system epss
scoring_elements 0.0091
published_at 2026-04-12T12:55:00Z
6
value 9e-05
scoring_system epss
scoring_elements 0.00912
published_at 2026-04-13T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.00908
published_at 2026-04-16T12:55:00Z
8
value 9e-05
scoring_system epss
scoring_elements 0.00916
published_at 2026-04-18T12:55:00Z
9
value 9e-05
scoring_system epss
scoring_elements 0.00967
published_at 2026-04-21T12:55:00Z
10
value 9e-05
scoring_system epss
scoring_elements 0.00927
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-52448
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52448
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/067a7c48c2c70f05f9460d6f0e8423e234729f05
reference_id 067a7c48c2c70f05f9460d6f0e8423e234729f05
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-28T18:52:46Z/
url https://git.kernel.org/stable/c/067a7c48c2c70f05f9460d6f0e8423e234729f05
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2265653
reference_id 2265653
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2265653
6
reference_url https://git.kernel.org/stable/c/5c28478af371a1c3fdb570ca67f110e1ae60fc37
reference_id 5c28478af371a1c3fdb570ca67f110e1ae60fc37
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-28T18:52:46Z/
url https://git.kernel.org/stable/c/5c28478af371a1c3fdb570ca67f110e1ae60fc37
7
reference_url https://git.kernel.org/stable/c/8877243beafa7c6bfc42022cbfdf9e39b25bd4fa
reference_id 8877243beafa7c6bfc42022cbfdf9e39b25bd4fa
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-28T18:52:46Z/
url https://git.kernel.org/stable/c/8877243beafa7c6bfc42022cbfdf9e39b25bd4fa
8
reference_url https://git.kernel.org/stable/c/c323efd620c741168c8e0cc6fc0be04ab57e331a
reference_id c323efd620c741168c8e0cc6fc0be04ab57e331a
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-28T18:52:46Z/
url https://git.kernel.org/stable/c/c323efd620c741168c8e0cc6fc0be04ab57e331a
9
reference_url https://git.kernel.org/stable/c/d69d7804cf9e2ba171a27e5f98bc266f13d0414a
reference_id d69d7804cf9e2ba171a27e5f98bc266f13d0414a
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-28T18:52:46Z/
url https://git.kernel.org/stable/c/d69d7804cf9e2ba171a27e5f98bc266f13d0414a
10
reference_url https://git.kernel.org/stable/c/ee0586d73cbaf0e7058bc640d62a9daf2dfa9178
reference_id ee0586d73cbaf0e7058bc640d62a9daf2dfa9178
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-28T18:52:46Z/
url https://git.kernel.org/stable/c/ee0586d73cbaf0e7058bc640d62a9daf2dfa9178
11
reference_url https://git.kernel.org/stable/c/efc8ef87ab9185a23d5676f2f7d986022d91bcde
reference_id efc8ef87ab9185a23d5676f2f7d986022d91bcde
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-28T18:52:46Z/
url https://git.kernel.org/stable/c/efc8ef87ab9185a23d5676f2f7d986022d91bcde
12
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
13
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
14
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
15
reference_url https://access.redhat.com/errata/RHSA-2024:5255
reference_id RHSA-2024:5255
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5255
16
reference_url https://access.redhat.com/errata/RHSA-2024:5281
reference_id RHSA-2024:5281
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5281
17
reference_url https://access.redhat.com/errata/RHSA-2024:5364
reference_id RHSA-2024:5364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5364
18
reference_url https://access.redhat.com/errata/RHSA-2024:5365
reference_id RHSA-2024:5365
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5365
19
reference_url https://usn.ubuntu.com/6688-1/
reference_id USN-6688-1
reference_type
scores
url https://usn.ubuntu.com/6688-1/
20
reference_url https://usn.ubuntu.com/6725-1/
reference_id USN-6725-1
reference_type
scores
url https://usn.ubuntu.com/6725-1/
21
reference_url https://usn.ubuntu.com/6725-2/
reference_id USN-6725-2
reference_type
scores
url https://usn.ubuntu.com/6725-2/
22
reference_url https://usn.ubuntu.com/6726-1/
reference_id USN-6726-1
reference_type
scores
url https://usn.ubuntu.com/6726-1/
23
reference_url https://usn.ubuntu.com/6726-2/
reference_id USN-6726-2
reference_type
scores
url https://usn.ubuntu.com/6726-2/
24
reference_url https://usn.ubuntu.com/6726-3/
reference_id USN-6726-3
reference_type
scores
url https://usn.ubuntu.com/6726-3/
25
reference_url https://usn.ubuntu.com/6818-1/
reference_id USN-6818-1
reference_type
scores
url https://usn.ubuntu.com/6818-1/
26
reference_url https://usn.ubuntu.com/6818-2/
reference_id USN-6818-2
reference_type
scores
url https://usn.ubuntu.com/6818-2/
27
reference_url https://usn.ubuntu.com/6818-3/
reference_id USN-6818-3
reference_type
scores
url https://usn.ubuntu.com/6818-3/
28
reference_url https://usn.ubuntu.com/6818-4/
reference_id USN-6818-4
reference_type
scores
url https://usn.ubuntu.com/6818-4/
29
reference_url https://usn.ubuntu.com/6819-1/
reference_id USN-6819-1
reference_type
scores
url https://usn.ubuntu.com/6819-1/
30
reference_url https://usn.ubuntu.com/6819-2/
reference_id USN-6819-2
reference_type
scores
url https://usn.ubuntu.com/6819-2/
31
reference_url https://usn.ubuntu.com/6819-3/
reference_id USN-6819-3
reference_type
scores
url https://usn.ubuntu.com/6819-3/
32
reference_url https://usn.ubuntu.com/6819-4/
reference_id USN-6819-4
reference_type
scores
url https://usn.ubuntu.com/6819-4/
fixed_packages
aliases CVE-2023-52448
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j6kj-8t9f-gkfj
81
url VCID-j8v6-gx44-67ge
vulnerability_id VCID-j8v6-gx44-67ge
summary kernel: Linux kernel: Denial of Service due to memory leak in IP address deletion
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53995.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53995.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53995
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10911
published_at 2026-04-02T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10975
published_at 2026-04-04T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.108
published_at 2026-04-07T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10876
published_at 2026-04-08T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10929
published_at 2026-04-09T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.1093
published_at 2026-04-11T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10897
published_at 2026-04-12T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10874
published_at 2026-04-21T12:55:00Z
8
value 0.00036
scoring_system epss
scoring_elements 0.10734
published_at 2026-04-16T12:55:00Z
9
value 0.00036
scoring_system epss
scoring_elements 0.10747
published_at 2026-04-18T12:55:00Z
10
value 0.00036
scoring_system epss
scoring_elements 0.10834
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53995
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53995
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2424967
reference_id 2424967
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2424967
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53995
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j8v6-gx44-67ge
82
url VCID-jjh6-3jy7-sucy
vulnerability_id VCID-jjh6-3jy7-sucy
summary kernel: md/raid5-cache: fix a deadlock in r5l_exit_log()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53848.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53848.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53848
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07346
published_at 2026-04-02T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.0739
published_at 2026-04-04T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.07372
published_at 2026-04-07T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07427
published_at 2026-04-08T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.07451
published_at 2026-04-09T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.10007
published_at 2026-04-21T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.10037
published_at 2026-04-24T12:55:00Z
7
value 0.00034
scoring_system epss
scoring_elements 0.10071
published_at 2026-04-11T12:55:00Z
8
value 0.00034
scoring_system epss
scoring_elements 0.1003
published_at 2026-04-12T12:55:00Z
9
value 0.00034
scoring_system epss
scoring_elements 0.10009
published_at 2026-04-13T12:55:00Z
10
value 0.00034
scoring_system epss
scoring_elements 0.09883
published_at 2026-04-16T12:55:00Z
11
value 0.00034
scoring_system epss
scoring_elements 0.09858
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53848
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2420331
reference_id 2420331
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2420331
4
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
5
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53848
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jjh6-3jy7-sucy
83
url VCID-jw26-mazb-afag
vulnerability_id VCID-jw26-mazb-afag
summary kernel: netfilter: nf_tables: disallow timeout for anonymous sets
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52620.json
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52620.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-52620
reference_id
reference_type
scores
0
value 9e-05
scoring_system epss
scoring_elements 0.00874
published_at 2026-04-02T12:55:00Z
1
value 9e-05
scoring_system epss
scoring_elements 0.00919
published_at 2026-04-24T12:55:00Z
2
value 9e-05
scoring_system epss
scoring_elements 0.00875
published_at 2026-04-04T12:55:00Z
3
value 9e-05
scoring_system epss
scoring_elements 0.00877
published_at 2026-04-07T12:55:00Z
4
value 9e-05
scoring_system epss
scoring_elements 0.00881
published_at 2026-04-08T12:55:00Z
5
value 9e-05
scoring_system epss
scoring_elements 0.00879
published_at 2026-04-09T12:55:00Z
6
value 9e-05
scoring_system epss
scoring_elements 0.00868
published_at 2026-04-18T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.00861
published_at 2026-04-12T12:55:00Z
8
value 9e-05
scoring_system epss
scoring_elements 0.00863
published_at 2026-04-13T12:55:00Z
9
value 9e-05
scoring_system epss
scoring_elements 0.00862
published_at 2026-04-16T12:55:00Z
10
value 9e-05
scoring_system epss
scoring_elements 0.00916
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-52620
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47233
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47233
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52429
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52429
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52434
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52435
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52458
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52458
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52482
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52486
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52489
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52491
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52492
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52493
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52498
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52587
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52587
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52594
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52595
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52597
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52598
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52599
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52600
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52601
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52602
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52603
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52604
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52606
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52615
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52616
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52617
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52618
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52619
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52622
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52623
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52627
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52627
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52635
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52637
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52642
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0340
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0607
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1151
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23849
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851
58
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24857
59
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24858
60
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24861
61
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26581
62
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26593
63
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26600
64
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601
65
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602
66
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26606
67
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26610
68
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614
69
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615
70
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26622
71
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26625
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26625
72
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26627
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26627
73
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26635
74
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26636
75
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26640
76
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641
77
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642
78
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643
79
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26644
80
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26645
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26645
81
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651
82
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26654
83
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26659
84
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663
85
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26664
86
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26665
87
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26671
88
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26673
89
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675
90
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26679
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26679
91
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26684
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26684
92
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26685
93
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26687
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26687
94
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688
95
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689
96
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26695
97
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26696
98
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26697
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26697
99
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26698
100
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26702
101
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704
102
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26707
103
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26712
104
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26722
105
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26727
106
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733
107
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735
108
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26736
109
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743
110
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744
111
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747
112
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26748
113
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26749
114
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26751
115
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26752
116
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26753
117
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754
118
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763
119
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764
120
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766
121
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771
122
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772
123
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773
124
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26776
125
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777
126
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778
127
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779
128
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26781
129
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782
130
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26787
131
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26788
132
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26790
133
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791
134
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793
135
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26795
136
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801
137
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804
138
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805
139
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26808
140
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26809
141
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26810
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26810
142
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26812
143
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26813
144
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26814
145
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816
146
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817
147
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26820
148
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26825
149
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26833
150
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26835
151
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839
152
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840
153
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26843
154
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26845
155
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26846
156
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26851
157
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852
158
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855
159
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857
160
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859
161
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26861
162
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26862
163
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863
164
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26870
165
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26872
166
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26874
167
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26875
168
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26877
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26877
169
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878
170
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26880
171
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26882
172
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883
173
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884
174
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885
175
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889
176
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891
177
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26894
178
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26895
179
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26897
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26897
180
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898
181
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901
182
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903
183
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906
184
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907
185
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26910
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26910
186
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26917
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26917
187
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922
188
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923
189
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26924
190
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925
191
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26926
192
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931
193
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26934
194
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935
195
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26937
196
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26950
197
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26951
198
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26955
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26955
199
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26956
200
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26957
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26957
201
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26958
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26958
202
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960
203
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961
204
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26965
205
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26966
206
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26969
207
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26970
208
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26973
209
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974
210
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976
211
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26978
212
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26981
213
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26984
214
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26988
215
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993
216
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26994
217
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26997
218
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26999
219
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27000
220
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27001
221
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27004
222
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008
223
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013
224
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020
225
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27024
226
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27025
227
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27028
228
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27030
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27030
229
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27038
230
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043
231
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27044
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27044
232
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27045
233
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046
234
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27047
235
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051
236
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27052
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27052
237
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27053
238
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27059
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27059
239
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065
240
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073
241
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074
242
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075
243
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27076
244
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27077
245
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078
246
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388
247
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437
248
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
249
reference_url https://git.kernel.org/stable/c/00b19ee0dcc1aef06294471ab489bae26d94524e
reference_id 00b19ee0dcc1aef06294471ab489bae26d94524e
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T20:33:31Z/
url https://git.kernel.org/stable/c/00b19ee0dcc1aef06294471ab489bae26d94524e
250
reference_url https://git.kernel.org/stable/c/116b0e8e4673a5faa8a739a19b467010c4d3058c
reference_id 116b0e8e4673a5faa8a739a19b467010c4d3058c
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T20:33:31Z/
url https://git.kernel.org/stable/c/116b0e8e4673a5faa8a739a19b467010c4d3058c
251
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270883
reference_id 2270883
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270883
252
reference_url https://git.kernel.org/stable/c/49ce99ae43314d887153e07cec8bb6a647a19268
reference_id 49ce99ae43314d887153e07cec8bb6a647a19268
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T20:33:31Z/
url https://git.kernel.org/stable/c/49ce99ae43314d887153e07cec8bb6a647a19268
253
reference_url https://git.kernel.org/stable/c/6f3ae02bbb62f151b19162d5fdc9fe3d48450323
reference_id 6f3ae02bbb62f151b19162d5fdc9fe3d48450323
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T20:33:31Z/
url https://git.kernel.org/stable/c/6f3ae02bbb62f151b19162d5fdc9fe3d48450323
254
reference_url https://git.kernel.org/stable/c/b7be6c737a179a76901c872f6b4c1d00552d9a1b
reference_id b7be6c737a179a76901c872f6b4c1d00552d9a1b
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T20:33:31Z/
url https://git.kernel.org/stable/c/b7be6c737a179a76901c872f6b4c1d00552d9a1b
255
reference_url https://git.kernel.org/stable/c/e26d3009efda338f19016df4175f354a9bd0a4ab
reference_id e26d3009efda338f19016df4175f354a9bd0a4ab
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T20:33:31Z/
url https://git.kernel.org/stable/c/e26d3009efda338f19016df4175f354a9bd0a4ab
256
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
257
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
258
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
259
reference_url https://usn.ubuntu.com/6820-1/
reference_id USN-6820-1
reference_type
scores
url https://usn.ubuntu.com/6820-1/
260
reference_url https://usn.ubuntu.com/6820-2/
reference_id USN-6820-2
reference_type
scores
url https://usn.ubuntu.com/6820-2/
261
reference_url https://usn.ubuntu.com/6821-1/
reference_id USN-6821-1
reference_type
scores
url https://usn.ubuntu.com/6821-1/
262
reference_url https://usn.ubuntu.com/6821-2/
reference_id USN-6821-2
reference_type
scores
url https://usn.ubuntu.com/6821-2/
263
reference_url https://usn.ubuntu.com/6821-3/
reference_id USN-6821-3
reference_type
scores
url https://usn.ubuntu.com/6821-3/
264
reference_url https://usn.ubuntu.com/6821-4/
reference_id USN-6821-4
reference_type
scores
url https://usn.ubuntu.com/6821-4/
265
reference_url https://usn.ubuntu.com/6828-1/
reference_id USN-6828-1
reference_type
scores
url https://usn.ubuntu.com/6828-1/
266
reference_url https://usn.ubuntu.com/6871-1/
reference_id USN-6871-1
reference_type
scores
url https://usn.ubuntu.com/6871-1/
267
reference_url https://usn.ubuntu.com/6892-1/
reference_id USN-6892-1
reference_type
scores
url https://usn.ubuntu.com/6892-1/
268
reference_url https://usn.ubuntu.com/6896-1/
reference_id USN-6896-1
reference_type
scores
url https://usn.ubuntu.com/6896-1/
269
reference_url https://usn.ubuntu.com/6896-2/
reference_id USN-6896-2
reference_type
scores
url https://usn.ubuntu.com/6896-2/
270
reference_url https://usn.ubuntu.com/6896-3/
reference_id USN-6896-3
reference_type
scores
url https://usn.ubuntu.com/6896-3/
271
reference_url https://usn.ubuntu.com/6896-4/
reference_id USN-6896-4
reference_type
scores
url https://usn.ubuntu.com/6896-4/
272
reference_url https://usn.ubuntu.com/6896-5/
reference_id USN-6896-5
reference_type
scores
url https://usn.ubuntu.com/6896-5/
273
reference_url https://usn.ubuntu.com/6919-1/
reference_id USN-6919-1
reference_type
scores
url https://usn.ubuntu.com/6919-1/
274
reference_url https://usn.ubuntu.com/6926-1/
reference_id USN-6926-1
reference_type
scores
url https://usn.ubuntu.com/6926-1/
275
reference_url https://usn.ubuntu.com/6926-2/
reference_id USN-6926-2
reference_type
scores
url https://usn.ubuntu.com/6926-2/
276
reference_url https://usn.ubuntu.com/6926-3/
reference_id USN-6926-3
reference_type
scores
url https://usn.ubuntu.com/6926-3/
277
reference_url https://usn.ubuntu.com/6938-1/
reference_id USN-6938-1
reference_type
scores
url https://usn.ubuntu.com/6938-1/
fixed_packages
aliases CVE-2023-52620
risk_score 1.7
exploitability 0.5
weighted_severity 3.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jw26-mazb-afag
84
url VCID-jzf5-bz4d-affq
vulnerability_id VCID-jzf5-bz4d-affq
summary kernel: xsk: fix refcount underflow in error path
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53698.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53698.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53698
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07644
published_at 2026-04-02T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07686
published_at 2026-04-04T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07655
published_at 2026-04-07T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07715
published_at 2026-04-08T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07734
published_at 2026-04-09T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07732
published_at 2026-04-11T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07719
published_at 2026-04-12T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07703
published_at 2026-04-13T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07629
published_at 2026-04-16T12:55:00Z
9
value 0.00033
scoring_system epss
scoring_elements 0.09721
published_at 2026-04-24T12:55:00Z
10
value 0.00033
scoring_system epss
scoring_elements 0.09523
published_at 2026-04-18T12:55:00Z
11
value 0.00033
scoring_system epss
scoring_elements 0.09673
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53698
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2405730
reference_id 2405730
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2405730
4
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53698
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jzf5-bz4d-affq
85
url VCID-jzfn-k82f-s3fw
vulnerability_id VCID-jzfn-k82f-s3fw
summary kernel: race condition between HCIUARTSETPROTO and HCIUARTGETPROTO in hci_uart_tty_ioctl
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-31083.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-31083.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-31083
reference_id
reference_type
scores
0
value 6e-05
scoring_system epss
scoring_elements 0.00428
published_at 2026-04-02T12:55:00Z
1
value 6e-05
scoring_system epss
scoring_elements 0.00427
published_at 2026-04-04T12:55:00Z
2
value 6e-05
scoring_system epss
scoring_elements 0.0042
published_at 2026-04-07T12:55:00Z
3
value 6e-05
scoring_system epss
scoring_elements 0.00416
published_at 2026-04-08T12:55:00Z
4
value 6e-05
scoring_system epss
scoring_elements 0.00418
published_at 2026-04-11T12:55:00Z
5
value 6e-05
scoring_system epss
scoring_elements 0.00414
published_at 2026-04-12T12:55:00Z
6
value 6e-05
scoring_system epss
scoring_elements 0.00412
published_at 2026-04-18T12:55:00Z
7
value 6e-05
scoring_system epss
scoring_elements 0.00407
published_at 2026-04-16T12:55:00Z
8
value 6e-05
scoring_system epss
scoring_elements 0.00437
published_at 2026-04-21T12:55:00Z
9
value 6e-05
scoring_system epss
scoring_elements 0.00438
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-31083
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31083
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31083
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2213132
reference_id 2213132
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2213132
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
7
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
8
reference_url https://usn.ubuntu.com/6439-1/
reference_id USN-6439-1
reference_type
scores
url https://usn.ubuntu.com/6439-1/
9
reference_url https://usn.ubuntu.com/6439-2/
reference_id USN-6439-2
reference_type
scores
url https://usn.ubuntu.com/6439-2/
10
reference_url https://usn.ubuntu.com/6440-1/
reference_id USN-6440-1
reference_type
scores
url https://usn.ubuntu.com/6440-1/
11
reference_url https://usn.ubuntu.com/6440-2/
reference_id USN-6440-2
reference_type
scores
url https://usn.ubuntu.com/6440-2/
12
reference_url https://usn.ubuntu.com/6440-3/
reference_id USN-6440-3
reference_type
scores
url https://usn.ubuntu.com/6440-3/
13
reference_url https://usn.ubuntu.com/6462-1/
reference_id USN-6462-1
reference_type
scores
url https://usn.ubuntu.com/6462-1/
14
reference_url https://usn.ubuntu.com/6462-2/
reference_id USN-6462-2
reference_type
scores
url https://usn.ubuntu.com/6462-2/
15
reference_url https://usn.ubuntu.com/6464-1/
reference_id USN-6464-1
reference_type
scores
url https://usn.ubuntu.com/6464-1/
16
reference_url https://usn.ubuntu.com/6465-1/
reference_id USN-6465-1
reference_type
scores
url https://usn.ubuntu.com/6465-1/
17
reference_url https://usn.ubuntu.com/6465-2/
reference_id USN-6465-2
reference_type
scores
url https://usn.ubuntu.com/6465-2/
18
reference_url https://usn.ubuntu.com/6465-3/
reference_id USN-6465-3
reference_type
scores
url https://usn.ubuntu.com/6465-3/
19
reference_url https://usn.ubuntu.com/6466-1/
reference_id USN-6466-1
reference_type
scores
url https://usn.ubuntu.com/6466-1/
20
reference_url https://usn.ubuntu.com/6516-1/
reference_id USN-6516-1
reference_type
scores
url https://usn.ubuntu.com/6516-1/
21
reference_url https://usn.ubuntu.com/6520-1/
reference_id USN-6520-1
reference_type
scores
url https://usn.ubuntu.com/6520-1/
fixed_packages
aliases CVE-2023-31083
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jzfn-k82f-s3fw
86
url VCID-k21p-aq3s-dbfu
vulnerability_id VCID-k21p-aq3s-dbfu
summary kernel: Linux kernel: Denial of service or memory corruption due to a data race in ALSA PCM memory allocation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54072.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54072.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-54072
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10911
published_at 2026-04-02T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10975
published_at 2026-04-04T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.108
published_at 2026-04-07T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10876
published_at 2026-04-08T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10929
published_at 2026-04-09T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.1093
published_at 2026-04-11T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10897
published_at 2026-04-12T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10874
published_at 2026-04-21T12:55:00Z
8
value 0.00036
scoring_system epss
scoring_elements 0.10734
published_at 2026-04-16T12:55:00Z
9
value 0.00036
scoring_system epss
scoring_elements 0.10747
published_at 2026-04-18T12:55:00Z
10
value 0.00036
scoring_system epss
scoring_elements 0.10834
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-54072
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54072
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54072
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2425014
reference_id 2425014
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2425014
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-54072
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k21p-aq3s-dbfu
87
url VCID-k7ag-ncz2-rfbn
vulnerability_id VCID-k7ag-ncz2-rfbn
summary kernel: ext4: fix delayed allocation bug in ext4_clu_mapped for bigalloc + inline
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50286.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50286.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50286
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02476
published_at 2026-04-02T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02488
published_at 2026-04-07T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02491
published_at 2026-04-08T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02512
published_at 2026-04-09T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02402
published_at 2026-04-11T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02392
published_at 2026-04-13T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02376
published_at 2026-04-16T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02381
published_at 2026-04-18T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.0248
published_at 2026-04-21T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02467
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50286
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50286
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2395325
reference_id 2395325
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2395325
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2022-50286
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k7ag-ncz2-rfbn
88
url VCID-kgkm-shnu-97fc
vulnerability_id VCID-kgkm-shnu-97fc
summary kernel: ext4: fix uninititialized value in 'ext4_evict_inode'
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50546.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50546.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50546
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03107
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.0312
published_at 2026-04-07T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03125
published_at 2026-04-08T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.0315
published_at 2026-04-09T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03109
published_at 2026-04-11T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03083
published_at 2026-04-12T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.0307
published_at 2026-04-13T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03045
published_at 2026-04-16T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.03054
published_at 2026-04-18T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03175
published_at 2026-04-24T12:55:00Z
10
value 0.00016
scoring_system epss
scoring_elements 0.03499
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50546
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50546
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2402240
reference_id 2402240
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2402240
5
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2022-50546
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kgkm-shnu-97fc
89
url VCID-ksyu-mqmf-b3g1
vulnerability_id VCID-ksyu-mqmf-b3g1
summary kernel: platform/x86/amd: pmc: Fix memory leak in amd_pmc_stb_debugfs_open_v2()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54320.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54320.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-54320
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07747
published_at 2026-04-02T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07792
published_at 2026-04-24T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07749
published_at 2026-04-07T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07809
published_at 2026-04-08T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07826
published_at 2026-04-09T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07821
published_at 2026-04-11T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07808
published_at 2026-04-12T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07794
published_at 2026-04-13T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07708
published_at 2026-04-16T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07684
published_at 2026-04-18T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07837
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-54320
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2426195
reference_id 2426195
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2426195
4
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
5
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-54320
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ksyu-mqmf-b3g1
90
url VCID-kt61-914s-3fe1
vulnerability_id VCID-kt61-914s-3fe1
summary kernel: net: openvswitch: reject negative ifindex
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53843.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53843.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53843
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.06793
published_at 2026-04-02T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.0684
published_at 2026-04-04T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06822
published_at 2026-04-07T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.06874
published_at 2026-04-08T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.06907
published_at 2026-04-09T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09299
published_at 2026-04-21T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09349
published_at 2026-04-24T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09303
published_at 2026-04-11T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.09273
published_at 2026-04-12T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.09259
published_at 2026-04-13T12:55:00Z
10
value 0.00032
scoring_system epss
scoring_elements 0.09152
published_at 2026-04-16T12:55:00Z
11
value 0.00032
scoring_system epss
scoring_elements 0.09144
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53843
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2420327
reference_id 2420327
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2420327
4
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
5
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53843
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kt61-914s-3fe1
91
url VCID-mbng-7v9u-53bu
vulnerability_id VCID-mbng-7v9u-53bu
summary kernel: md/raid10: fix null-ptr-deref of mreplace in raid10_sync_request
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53380.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53380.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53380
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.02951
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.02927
published_at 2026-04-13T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.02937
published_at 2026-04-12T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.0296
published_at 2026-04-11T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03
published_at 2026-04-09T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.02975
published_at 2026-04-08T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.02965
published_at 2026-04-04T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.02973
published_at 2026-04-07T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.04166
published_at 2026-04-24T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.04019
published_at 2026-04-16T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.04031
published_at 2026-04-18T12:55:00Z
11
value 0.00017
scoring_system epss
scoring_elements 0.04154
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53380
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53380
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/144c7fd008e0072b0b565f1157eec618de54ca8a
reference_id 144c7fd008e0072b0b565f1157eec618de54ca8a
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:56:06Z/
url https://git.kernel.org/stable/c/144c7fd008e0072b0b565f1157eec618de54ca8a
5
reference_url https://git.kernel.org/stable/c/222cc459d59857ee28a5366dc225ab42b22f9272
reference_id 222cc459d59857ee28a5366dc225ab42b22f9272
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:56:06Z/
url https://git.kernel.org/stable/c/222cc459d59857ee28a5366dc225ab42b22f9272
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2396425
reference_id 2396425
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2396425
7
reference_url https://git.kernel.org/stable/c/2990e2ece18dd4cca71b3109c80517ad94adb065
reference_id 2990e2ece18dd4cca71b3109c80517ad94adb065
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:56:06Z/
url https://git.kernel.org/stable/c/2990e2ece18dd4cca71b3109c80517ad94adb065
8
reference_url https://git.kernel.org/stable/c/34817a2441747b48e444cb0e05d84e14bc9443da
reference_id 34817a2441747b48e444cb0e05d84e14bc9443da
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:56:06Z/
url https://git.kernel.org/stable/c/34817a2441747b48e444cb0e05d84e14bc9443da
9
reference_url https://git.kernel.org/stable/c/45fa023b3334a7ae6f6c4eb977295804222dfa28
reference_id 45fa023b3334a7ae6f6c4eb977295804222dfa28
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:56:06Z/
url https://git.kernel.org/stable/c/45fa023b3334a7ae6f6c4eb977295804222dfa28
10
reference_url https://git.kernel.org/stable/c/b5015b97adda6a24dd3e713c63e521ecbeff25c6
reference_id b5015b97adda6a24dd3e713c63e521ecbeff25c6
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:56:06Z/
url https://git.kernel.org/stable/c/b5015b97adda6a24dd3e713c63e521ecbeff25c6
11
reference_url https://git.kernel.org/stable/c/f4368a462b1f9a8ecc2fdb09a28c3d4cad302a4f
reference_id f4368a462b1f9a8ecc2fdb09a28c3d4cad302a4f
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:56:06Z/
url https://git.kernel.org/stable/c/f4368a462b1f9a8ecc2fdb09a28c3d4cad302a4f
12
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
13
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53380
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mbng-7v9u-53bu
92
url VCID-mfad-yumu-hyce
vulnerability_id VCID-mfad-yumu-hyce
summary kernel: ext4: fix task hung in ext4_xattr_delete_inode
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53089.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53089.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53089
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.12256
published_at 2026-04-02T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.12302
published_at 2026-04-04T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.121
published_at 2026-04-07T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.12181
published_at 2026-04-08T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.12232
published_at 2026-04-09T12:55:00Z
5
value 0.0004
scoring_system epss
scoring_elements 0.12241
published_at 2026-04-11T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.12203
published_at 2026-04-12T12:55:00Z
7
value 0.0004
scoring_system epss
scoring_elements 0.12168
published_at 2026-04-13T12:55:00Z
8
value 0.0004
scoring_system epss
scoring_elements 0.12037
published_at 2026-04-16T12:55:00Z
9
value 0.0004
scoring_system epss
scoring_elements 0.1204
published_at 2026-04-18T12:55:00Z
10
value 0.0004
scoring_system epss
scoring_elements 0.12155
published_at 2026-04-21T12:55:00Z
11
value 0.0004
scoring_system epss
scoring_elements 0.1213
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53089
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53089
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2363736
reference_id 2363736
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2363736
5
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53089
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mfad-yumu-hyce
93
url VCID-mgq1-styv-duak
vulnerability_id VCID-mgq1-styv-duak
summary kernel: s390/vfio-ap: fix memory leak in vfio_ap device driver
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53746.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53746.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53746
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10975
published_at 2026-04-04T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.108
published_at 2026-04-07T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.10876
published_at 2026-04-08T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10911
published_at 2026-04-02T12:55:00Z
4
value 0.00047
scoring_system epss
scoring_elements 0.14383
published_at 2026-04-16T12:55:00Z
5
value 0.00047
scoring_system epss
scoring_elements 0.14384
published_at 2026-04-18T12:55:00Z
6
value 0.00047
scoring_system epss
scoring_elements 0.14454
published_at 2026-04-21T12:55:00Z
7
value 0.00047
scoring_system epss
scoring_elements 0.14487
published_at 2026-04-24T12:55:00Z
8
value 0.00047
scoring_system epss
scoring_elements 0.14628
published_at 2026-04-09T12:55:00Z
9
value 0.00047
scoring_system epss
scoring_elements 0.14588
published_at 2026-04-11T12:55:00Z
10
value 0.00047
scoring_system epss
scoring_elements 0.14549
published_at 2026-04-12T12:55:00Z
11
value 0.00047
scoring_system epss
scoring_elements 0.14491
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53746
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53746
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2419839
reference_id 2419839
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2419839
5
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53746
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mgq1-styv-duak
94
url VCID-mxyb-81yh-e7gs
vulnerability_id VCID-mxyb-81yh-e7gs
summary kernel: a race out-of-bound read in vt
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3753.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3753.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3753
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03356
published_at 2026-04-01T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03443
published_at 2026-04-24T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03373
published_at 2026-04-12T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03351
published_at 2026-04-13T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03327
published_at 2026-04-16T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03339
published_at 2026-04-18T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03457
published_at 2026-04-21T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03405
published_at 2026-04-02T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03399
published_at 2026-04-04T12:55:00Z
9
value 0.00016
scoring_system epss
scoring_elements 0.03416
published_at 2026-04-07T12:55:00Z
10
value 0.00016
scoring_system epss
scoring_elements 0.03419
published_at 2026-04-08T12:55:00Z
11
value 0.00016
scoring_system epss
scoring_elements 0.0344
published_at 2026-04-09T12:55:00Z
12
value 0.00016
scoring_system epss
scoring_elements 0.03401
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3753
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16119
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16119
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3702
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3653
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3656
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3679
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3679
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3732
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3739
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3743
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3753
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37576
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38160
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38160
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38166
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38199
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40490
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41073
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1999589
reference_id 1999589
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1999589
19
reference_url https://security.archlinux.org/AVG-2346
reference_id AVG-2346
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2346
20
reference_url https://security.archlinux.org/AVG-2347
reference_id AVG-2347
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2347
21
reference_url https://security.archlinux.org/AVG-2348
reference_id AVG-2348
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2348
22
reference_url https://security.archlinux.org/AVG-2349
reference_id AVG-2349
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2349
23
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
24
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
25
reference_url https://usn.ubuntu.com/5113-1/
reference_id USN-5113-1
reference_type
scores
url https://usn.ubuntu.com/5113-1/
26
reference_url https://usn.ubuntu.com/5115-1/
reference_id USN-5115-1
reference_type
scores
url https://usn.ubuntu.com/5115-1/
27
reference_url https://usn.ubuntu.com/5117-1/
reference_id USN-5117-1
reference_type
scores
url https://usn.ubuntu.com/5117-1/
28
reference_url https://usn.ubuntu.com/5136-1/
reference_id USN-5136-1
reference_type
scores
url https://usn.ubuntu.com/5136-1/
29
reference_url https://usn.ubuntu.com/5137-1/
reference_id USN-5137-1
reference_type
scores
url https://usn.ubuntu.com/5137-1/
30
reference_url https://usn.ubuntu.com/5137-2/
reference_id USN-5137-2
reference_type
scores
url https://usn.ubuntu.com/5137-2/
31
reference_url https://usn.ubuntu.com/6221-1/
reference_id USN-6221-1
reference_type
scores
url https://usn.ubuntu.com/6221-1/
fixed_packages
aliases CVE-2021-3753
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mxyb-81yh-e7gs
95
url VCID-myf8-auba-aqe1
vulnerability_id VCID-myf8-auba-aqe1
summary kernel: use-after-free in IPv4 IGMP
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6932.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6932.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6932
reference_id
reference_type
scores
0
value 0.00056
scoring_system epss
scoring_elements 0.17843
published_at 2026-04-02T12:55:00Z
1
value 0.00056
scoring_system epss
scoring_elements 0.17896
published_at 2026-04-04T12:55:00Z
2
value 0.00056
scoring_system epss
scoring_elements 0.17599
published_at 2026-04-07T12:55:00Z
3
value 0.00056
scoring_system epss
scoring_elements 0.17687
published_at 2026-04-08T12:55:00Z
4
value 0.00056
scoring_system epss
scoring_elements 0.17749
published_at 2026-04-09T12:55:00Z
5
value 0.00056
scoring_system epss
scoring_elements 0.17767
published_at 2026-04-11T12:55:00Z
6
value 0.00056
scoring_system epss
scoring_elements 0.17721
published_at 2026-04-12T12:55:00Z
7
value 0.00056
scoring_system epss
scoring_elements 0.1767
published_at 2026-04-13T12:55:00Z
8
value 0.00056
scoring_system epss
scoring_elements 0.17615
published_at 2026-04-16T12:55:00Z
9
value 0.00056
scoring_system epss
scoring_elements 0.17623
published_at 2026-04-18T12:55:00Z
10
value 0.00056
scoring_system epss
scoring_elements 0.1766
published_at 2026-04-21T12:55:00Z
11
value 0.00056
scoring_system epss
scoring_elements 0.1757
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6932
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255283
reference_id 2255283
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255283
22
reference_url https://access.redhat.com/errata/RHSA-2024:0723
reference_id RHSA-2024:0723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0723
23
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
24
reference_url https://access.redhat.com/errata/RHSA-2024:0725
reference_id RHSA-2024:0725
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0725
25
reference_url https://access.redhat.com/errata/RHSA-2024:1250
reference_id RHSA-2024:1250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1250
26
reference_url https://access.redhat.com/errata/RHSA-2024:1306
reference_id RHSA-2024:1306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1306
27
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
28
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
29
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
30
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
31
reference_url https://usn.ubuntu.com/6601-1/
reference_id USN-6601-1
reference_type
scores
url https://usn.ubuntu.com/6601-1/
32
reference_url https://usn.ubuntu.com/6602-1/
reference_id USN-6602-1
reference_type
scores
url https://usn.ubuntu.com/6602-1/
33
reference_url https://usn.ubuntu.com/6603-1/
reference_id USN-6603-1
reference_type
scores
url https://usn.ubuntu.com/6603-1/
34
reference_url https://usn.ubuntu.com/6604-1/
reference_id USN-6604-1
reference_type
scores
url https://usn.ubuntu.com/6604-1/
35
reference_url https://usn.ubuntu.com/6604-2/
reference_id USN-6604-2
reference_type
scores
url https://usn.ubuntu.com/6604-2/
36
reference_url https://usn.ubuntu.com/6605-1/
reference_id USN-6605-1
reference_type
scores
url https://usn.ubuntu.com/6605-1/
37
reference_url https://usn.ubuntu.com/6605-2/
reference_id USN-6605-2
reference_type
scores
url https://usn.ubuntu.com/6605-2/
38
reference_url https://usn.ubuntu.com/6607-1/
reference_id USN-6607-1
reference_type
scores
url https://usn.ubuntu.com/6607-1/
39
reference_url https://usn.ubuntu.com/6608-1/
reference_id USN-6608-1
reference_type
scores
url https://usn.ubuntu.com/6608-1/
40
reference_url https://usn.ubuntu.com/6608-2/
reference_id USN-6608-2
reference_type
scores
url https://usn.ubuntu.com/6608-2/
41
reference_url https://usn.ubuntu.com/6609-1/
reference_id USN-6609-1
reference_type
scores
url https://usn.ubuntu.com/6609-1/
42
reference_url https://usn.ubuntu.com/6609-2/
reference_id USN-6609-2
reference_type
scores
url https://usn.ubuntu.com/6609-2/
43
reference_url https://usn.ubuntu.com/6609-3/
reference_id USN-6609-3
reference_type
scores
url https://usn.ubuntu.com/6609-3/
44
reference_url https://usn.ubuntu.com/6628-1/
reference_id USN-6628-1
reference_type
scores
url https://usn.ubuntu.com/6628-1/
45
reference_url https://usn.ubuntu.com/6628-2/
reference_id USN-6628-2
reference_type
scores
url https://usn.ubuntu.com/6628-2/
46
reference_url https://usn.ubuntu.com/6635-1/
reference_id USN-6635-1
reference_type
scores
url https://usn.ubuntu.com/6635-1/
47
reference_url https://usn.ubuntu.com/6639-1/
reference_id USN-6639-1
reference_type
scores
url https://usn.ubuntu.com/6639-1/
fixed_packages
aliases CVE-2023-6932
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-myf8-auba-aqe1
96
url VCID-n1w6-27yz-dfer
vulnerability_id VCID-n1w6-27yz-dfer
summary kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51779.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51779.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-51779
reference_id
reference_type
scores
0
value 0.00102
scoring_system epss
scoring_elements 0.28149
published_at 2026-04-02T12:55:00Z
1
value 0.00102
scoring_system epss
scoring_elements 0.28056
published_at 2026-04-08T12:55:00Z
2
value 0.00102
scoring_system epss
scoring_elements 0.28192
published_at 2026-04-04T12:55:00Z
3
value 0.00102
scoring_system epss
scoring_elements 0.27988
published_at 2026-04-07T12:55:00Z
4
value 0.00102
scoring_system epss
scoring_elements 0.28098
published_at 2026-04-09T12:55:00Z
5
value 0.00102
scoring_system epss
scoring_elements 0.28105
published_at 2026-04-11T12:55:00Z
6
value 0.00102
scoring_system epss
scoring_elements 0.28062
published_at 2026-04-12T12:55:00Z
7
value 0.00102
scoring_system epss
scoring_elements 0.28004
published_at 2026-04-13T12:55:00Z
8
value 0.00126
scoring_system epss
scoring_elements 0.31866
published_at 2026-04-21T12:55:00Z
9
value 0.00126
scoring_system epss
scoring_elements 0.31914
published_at 2026-04-16T12:55:00Z
10
value 0.00126
scoring_system epss
scoring_elements 0.31893
published_at 2026-04-18T12:55:00Z
11
value 0.0013
scoring_system epss
scoring_elements 0.3222
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-51779
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51779
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2256822
reference_id 2256822
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2256822
5
reference_url https://github.com/torvalds/linux/commit/2e07e8348ea454615e268222ae3fc240421be768
reference_id 2e07e8348ea454615e268222ae3fc240421be768
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-05T17:06:18Z/
url https://github.com/torvalds/linux/commit/2e07e8348ea454615e268222ae3fc240421be768
6
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
reference_id msg00016.html
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-05T17:06:18Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
7
reference_url https://access.redhat.com/errata/RHSA-2024:10941
reference_id RHSA-2024:10941
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10941
8
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
9
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
10
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
11
reference_url https://access.redhat.com/errata/RHSA-2024:3854
reference_id RHSA-2024:3854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3854
12
reference_url https://access.redhat.com/errata/RHSA-2024:3855
reference_id RHSA-2024:3855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3855
13
reference_url https://access.redhat.com/errata/RHSA-2024:3859
reference_id RHSA-2024:3859
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3859
14
reference_url https://usn.ubuntu.com/6606-1/
reference_id USN-6606-1
reference_type
scores
url https://usn.ubuntu.com/6606-1/
15
reference_url https://usn.ubuntu.com/6680-1/
reference_id USN-6680-1
reference_type
scores
url https://usn.ubuntu.com/6680-1/
16
reference_url https://usn.ubuntu.com/6680-2/
reference_id USN-6680-2
reference_type
scores
url https://usn.ubuntu.com/6680-2/
17
reference_url https://usn.ubuntu.com/6680-3/
reference_id USN-6680-3
reference_type
scores
url https://usn.ubuntu.com/6680-3/
18
reference_url https://usn.ubuntu.com/6681-1/
reference_id USN-6681-1
reference_type
scores
url https://usn.ubuntu.com/6681-1/
19
reference_url https://usn.ubuntu.com/6681-2/
reference_id USN-6681-2
reference_type
scores
url https://usn.ubuntu.com/6681-2/
20
reference_url https://usn.ubuntu.com/6681-3/
reference_id USN-6681-3
reference_type
scores
url https://usn.ubuntu.com/6681-3/
21
reference_url https://usn.ubuntu.com/6681-4/
reference_id USN-6681-4
reference_type
scores
url https://usn.ubuntu.com/6681-4/
22
reference_url https://usn.ubuntu.com/6686-1/
reference_id USN-6686-1
reference_type
scores
url https://usn.ubuntu.com/6686-1/
23
reference_url https://usn.ubuntu.com/6686-2/
reference_id USN-6686-2
reference_type
scores
url https://usn.ubuntu.com/6686-2/
24
reference_url https://usn.ubuntu.com/6686-3/
reference_id USN-6686-3
reference_type
scores
url https://usn.ubuntu.com/6686-3/
25
reference_url https://usn.ubuntu.com/6686-4/
reference_id USN-6686-4
reference_type
scores
url https://usn.ubuntu.com/6686-4/
26
reference_url https://usn.ubuntu.com/6686-5/
reference_id USN-6686-5
reference_type
scores
url https://usn.ubuntu.com/6686-5/
27
reference_url https://usn.ubuntu.com/6705-1/
reference_id USN-6705-1
reference_type
scores
url https://usn.ubuntu.com/6705-1/
28
reference_url https://usn.ubuntu.com/6716-1/
reference_id USN-6716-1
reference_type
scores
url https://usn.ubuntu.com/6716-1/
29
reference_url https://usn.ubuntu.com/6739-1/
reference_id USN-6739-1
reference_type
scores
url https://usn.ubuntu.com/6739-1/
30
reference_url https://usn.ubuntu.com/6740-1/
reference_id USN-6740-1
reference_type
scores
url https://usn.ubuntu.com/6740-1/
fixed_packages
aliases CVE-2023-51779
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n1w6-27yz-dfer
97
url VCID-n21r-funt-2faf
vulnerability_id VCID-n21r-funt-2faf
summary kernel: netfilter: nf_tables: memory leak when more than 255 elements expired
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52581.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52581.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-52581
reference_id
reference_type
scores
0
value 9e-05
scoring_system epss
scoring_elements 0.00825
published_at 2026-04-04T12:55:00Z
1
value 9e-05
scoring_system epss
scoring_elements 0.00863
published_at 2026-04-24T12:55:00Z
2
value 9e-05
scoring_system epss
scoring_elements 0.00826
published_at 2026-04-07T12:55:00Z
3
value 9e-05
scoring_system epss
scoring_elements 0.00831
published_at 2026-04-08T12:55:00Z
4
value 9e-05
scoring_system epss
scoring_elements 0.00828
published_at 2026-04-09T12:55:00Z
5
value 9e-05
scoring_system epss
scoring_elements 0.00817
published_at 2026-04-11T12:55:00Z
6
value 9e-05
scoring_system epss
scoring_elements 0.00811
published_at 2026-04-12T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.00812
published_at 2026-04-16T12:55:00Z
8
value 9e-05
scoring_system epss
scoring_elements 0.00816
published_at 2026-04-18T12:55:00Z
9
value 9e-05
scoring_system epss
scoring_elements 0.00862
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-52581
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://git.kernel.org/stable/c/09c85f2d21ab6b5acba31a037985b13e8e6565b8
reference_id 09c85f2d21ab6b5acba31a037985b13e8e6565b8
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-05T20:19:37Z/
url https://git.kernel.org/stable/c/09c85f2d21ab6b5acba31a037985b13e8e6565b8
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2267761
reference_id 2267761
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2267761
5
reference_url https://git.kernel.org/stable/c/4aea243b6853d06c1d160a9955b759189aa02b14
reference_id 4aea243b6853d06c1d160a9955b759189aa02b14
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-05T20:19:37Z/
url https://git.kernel.org/stable/c/4aea243b6853d06c1d160a9955b759189aa02b14
6
reference_url https://git.kernel.org/stable/c/7cf055b43756b10aa2b851c927c940f5ed652125
reference_id 7cf055b43756b10aa2b851c927c940f5ed652125
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-05T20:19:37Z/
url https://git.kernel.org/stable/c/7cf055b43756b10aa2b851c927c940f5ed652125
7
reference_url https://git.kernel.org/stable/c/7e5d732e6902eb6a37b35480796838a145ae5f07
reference_id 7e5d732e6902eb6a37b35480796838a145ae5f07
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-05T20:19:37Z/
url https://git.kernel.org/stable/c/7e5d732e6902eb6a37b35480796838a145ae5f07
8
reference_url https://git.kernel.org/stable/c/a995a68e8a3b48533e47c856865d109a1f1a9d01
reference_id a995a68e8a3b48533e47c856865d109a1f1a9d01
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-05T20:19:37Z/
url https://git.kernel.org/stable/c/a995a68e8a3b48533e47c856865d109a1f1a9d01
9
reference_url https://git.kernel.org/stable/c/cf5000a7787cbc10341091d37245a42c119d26c5
reference_id cf5000a7787cbc10341091d37245a42c119d26c5
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-05T20:19:37Z/
url https://git.kernel.org/stable/c/cf5000a7787cbc10341091d37245a42c119d26c5
10
reference_url https://git.kernel.org/stable/c/ef99506eaf1dc31feff1adfcfd68bc5535a22171
reference_id ef99506eaf1dc31feff1adfcfd68bc5535a22171
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-05T20:19:37Z/
url https://git.kernel.org/stable/c/ef99506eaf1dc31feff1adfcfd68bc5535a22171
11
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
12
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
13
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-52581
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n21r-funt-2faf
98
url VCID-n4c6-4174-5fhz
vulnerability_id VCID-n4c6-4174-5fhz
summary kernel: KVM: s390: fix setting of fpc register
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52597.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52597.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-52597
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05503
published_at 2026-04-02T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.0571
published_at 2026-04-24T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05538
published_at 2026-04-04T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05537
published_at 2026-04-07T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05575
published_at 2026-04-08T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05599
published_at 2026-04-09T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05571
published_at 2026-04-11T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05559
published_at 2026-04-12T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05553
published_at 2026-04-13T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.05501
published_at 2026-04-16T12:55:00Z
10
value 0.00021
scoring_system epss
scoring_elements 0.05511
published_at 2026-04-18T12:55:00Z
11
value 0.00021
scoring_system epss
scoring_elements 0.05675
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-52597
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47233
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47233
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52429
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52429
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52434
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52435
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52458
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52458
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52482
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52486
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52489
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52491
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52492
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52493
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52498
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52587
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52587
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52594
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52595
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52597
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52598
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52599
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52600
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52601
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52602
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52603
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52604
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52606
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52615
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52616
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52617
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52618
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52619
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52622
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52623
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52627
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52627
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52635
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52637
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52642
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0340
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0607
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1151
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23849
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851
58
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24857
59
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24858
60
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24861
61
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26581
62
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26593
63
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26600
64
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601
65
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602
66
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26606
67
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26610
68
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614
69
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615
70
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26622
71
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26625
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26625
72
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26627
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26627
73
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26635
74
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26636
75
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26640
76
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641
77
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642
78
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643
79
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26644
80
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26645
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26645
81
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651
82
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26654
83
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26659
84
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663
85
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26664
86
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26665
87
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26671
88
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26673
89
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675
90
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26679
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26679
91
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26684
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26684
92
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26685
93
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26687
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26687
94
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688
95
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689
96
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26695
97
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26696
98
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26697
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26697
99
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26698
100
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26702
101
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704
102
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26707
103
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26712
104
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26722
105
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26727
106
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733
107
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735
108
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26736
109
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743
110
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744
111
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747
112
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26748
113
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26749
114
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26751
115
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26752
116
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26753
117
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754
118
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763
119
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764
120
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766
121
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771
122
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772
123
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773
124
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26776
125
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777
126
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778
127
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779
128
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26781
129
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782
130
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26787
131
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26788
132
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26790
133
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791
134
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793
135
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26795
136
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801
137
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804
138
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805
139
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26808
140
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26809
141
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26810
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26810
142
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26812
143
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26813
144
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26814
145
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816
146
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817
147
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26820
148
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26825
149
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26833
150
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26835
151
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839
152
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840
153
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26843
154
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26845
155
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26846
156
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26851
157
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852
158
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855
159
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857
160
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859
161
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26861
162
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26862
163
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863
164
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26870
165
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26872
166
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26874
167
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26875
168
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26877
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26877
169
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878
170
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26880
171
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26882
172
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883
173
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884
174
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885
175
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889
176
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891
177
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26894
178
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26895
179
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26897
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26897
180
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898
181
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901
182
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903
183
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906
184
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907
185
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26910
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26910
186
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26917
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26917
187
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922
188
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923
189
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26924
190
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925
191
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26926
192
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931
193
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26934
194
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935
195
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26937
196
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26950
197
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26951
198
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26955
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26955
199
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26956
200
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26957
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26957
201
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26958
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26958
202
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960
203
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961
204
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26965
205
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26966
206
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26969
207
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26970
208
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26973
209
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974
210
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976
211
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26978
212
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26981
213
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26984
214
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26988
215
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993
216
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26994
217
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26997
218
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26999
219
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27000
220
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27001
221
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27004
222
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008
223
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013
224
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020
225
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27024
226
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27025
227
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27028
228
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27030
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27030
229
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27038
230
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043
231
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27044
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27044
232
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27045
233
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046
234
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27047
235
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051
236
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27052
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27052
237
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27053
238
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27059
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27059
239
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065
240
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073
241
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074
242
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075
243
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27076
244
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27077
245
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078
246
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388
247
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437
248
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
249
reference_url https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
reference_id 0671f42a9c1084db10d68ac347d08dbf6689ecb3
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-06T15:59:20Z/
url https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
250
reference_url https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
reference_id 150a3a3871490e8c454ffbac2e60abeafcecff99
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-06T15:59:20Z/
url https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
251
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2268311
reference_id 2268311
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2268311
252
reference_url https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
reference_id 2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-06T15:59:20Z/
url https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
253
reference_url https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
reference_id 3a04410b0bc7e056e0843ac598825dd359246d18
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-06T15:59:20Z/
url https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
254
reference_url https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
reference_id 5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-06T15:59:20Z/
url https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
255
reference_url https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
reference_id 732a3bea7aba5b15026ea42d14953c3425cc7dc2
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-06T15:59:20Z/
url https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
256
reference_url https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
reference_id b988b1bb0053c0dcd26187d29ef07566a565cf55
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-06T15:59:20Z/
url https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
257
reference_url https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
reference_id c87d7d910775a025e230fd6359b60627e392460f
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-06T15:59:20Z/
url https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
258
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
259
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
260
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
261
reference_url https://usn.ubuntu.com/6688-1/
reference_id USN-6688-1
reference_type
scores
url https://usn.ubuntu.com/6688-1/
262
reference_url https://usn.ubuntu.com/6766-1/
reference_id USN-6766-1
reference_type
scores
url https://usn.ubuntu.com/6766-1/
263
reference_url https://usn.ubuntu.com/6766-2/
reference_id USN-6766-2
reference_type
scores
url https://usn.ubuntu.com/6766-2/
264
reference_url https://usn.ubuntu.com/6766-3/
reference_id USN-6766-3
reference_type
scores
url https://usn.ubuntu.com/6766-3/
265
reference_url https://usn.ubuntu.com/6767-1/
reference_id USN-6767-1
reference_type
scores
url https://usn.ubuntu.com/6767-1/
266
reference_url https://usn.ubuntu.com/6767-2/
reference_id USN-6767-2
reference_type
scores
url https://usn.ubuntu.com/6767-2/
267
reference_url https://usn.ubuntu.com/6795-1/
reference_id USN-6795-1
reference_type
scores
url https://usn.ubuntu.com/6795-1/
268
reference_url https://usn.ubuntu.com/6818-1/
reference_id USN-6818-1
reference_type
scores
url https://usn.ubuntu.com/6818-1/
269
reference_url https://usn.ubuntu.com/6818-2/
reference_id USN-6818-2
reference_type
scores
url https://usn.ubuntu.com/6818-2/
270
reference_url https://usn.ubuntu.com/6818-3/
reference_id USN-6818-3
reference_type
scores
url https://usn.ubuntu.com/6818-3/
271
reference_url https://usn.ubuntu.com/6818-4/
reference_id USN-6818-4
reference_type
scores
url https://usn.ubuntu.com/6818-4/
272
reference_url https://usn.ubuntu.com/6819-1/
reference_id USN-6819-1
reference_type
scores
url https://usn.ubuntu.com/6819-1/
273
reference_url https://usn.ubuntu.com/6819-2/
reference_id USN-6819-2
reference_type
scores
url https://usn.ubuntu.com/6819-2/
274
reference_url https://usn.ubuntu.com/6819-3/
reference_id USN-6819-3
reference_type
scores
url https://usn.ubuntu.com/6819-3/
275
reference_url https://usn.ubuntu.com/6819-4/
reference_id USN-6819-4
reference_type
scores
url https://usn.ubuntu.com/6819-4/
276
reference_url https://usn.ubuntu.com/6828-1/
reference_id USN-6828-1
reference_type
scores
url https://usn.ubuntu.com/6828-1/
fixed_packages
aliases CVE-2023-52597
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n4c6-4174-5fhz
99
url VCID-n53a-ps37-bbf3
vulnerability_id VCID-n53a-ps37-bbf3
summary kernel: out of bounds read in drivers/media/usb/dvb-usb/technisat-usb2.c
references
0
reference_url http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15505.json
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15505.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-15505
reference_id
reference_type
scores
0
value 0.0098
scoring_system epss
scoring_elements 0.76702
published_at 2026-04-01T12:55:00Z
1
value 0.0098
scoring_system epss
scoring_elements 0.76829
published_at 2026-04-24T12:55:00Z
2
value 0.0098
scoring_system epss
scoring_elements 0.768
published_at 2026-04-16T12:55:00Z
3
value 0.0098
scoring_system epss
scoring_elements 0.76806
published_at 2026-04-18T12:55:00Z
4
value 0.0098
scoring_system epss
scoring_elements 0.76797
published_at 2026-04-21T12:55:00Z
5
value 0.0098
scoring_system epss
scoring_elements 0.76706
published_at 2026-04-02T12:55:00Z
6
value 0.0098
scoring_system epss
scoring_elements 0.76734
published_at 2026-04-04T12:55:00Z
7
value 0.0098
scoring_system epss
scoring_elements 0.76716
published_at 2026-04-07T12:55:00Z
8
value 0.0098
scoring_system epss
scoring_elements 0.76748
published_at 2026-04-08T12:55:00Z
9
value 0.0098
scoring_system epss
scoring_elements 0.76759
published_at 2026-04-13T12:55:00Z
10
value 0.0098
scoring_system epss
scoring_elements 0.76787
published_at 2026-04-11T12:55:00Z
11
value 0.0098
scoring_system epss
scoring_elements 0.76767
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-15505
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15505
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://git.linuxtv.org/media_tree.git/commit/?id=0c4df39e504bf925ab666132ac3c98d6cbbe380b
reference_id
reference_type
scores
url https://git.linuxtv.org/media_tree.git/commit/?id=0c4df39e504bf925ab666132ac3c98d6cbbe380b
6
reference_url https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
7
reference_url https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3RUDQJXRJQVGHCGR4YZWTQ3ECBI7TXH/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3RUDQJXRJQVGHCGR4YZWTQ3ECBI7TXH/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4JZ6AEUKFWBHQAROGMQARJ274PQP2QP/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4JZ6AEUKFWBHQAROGMQARJ274PQP2QP/
10
reference_url https://lore.kernel.org/linux-media/20190821104408.w7krumcglxo6fz5q%40gofer.mess.org/
reference_id
reference_type
scores
url https://lore.kernel.org/linux-media/20190821104408.w7krumcglxo6fz5q%40gofer.mess.org/
11
reference_url https://lore.kernel.org/lkml/b9b256cb-95f2-5fa1-9956-5a602a017c11%40gmail.com/
reference_id
reference_type
scores
url https://lore.kernel.org/lkml/b9b256cb-95f2-5fa1-9956-5a602a017c11%40gmail.com/
12
reference_url https://seclists.org/bugtraq/2019/Nov/11
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Nov/11
13
reference_url https://security.netapp.com/advisory/ntap-20190905-0002/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190905-0002/
14
reference_url https://support.f5.com/csp/article/K28222050
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K28222050
15
reference_url https://support.f5.com/csp/article/K28222050?utm_source=f5support&amp%3Butm_medium=RSS
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K28222050?utm_source=f5support&amp%3Butm_medium=RSS
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1746732
reference_id 1746732
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1746732
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-15505
reference_id CVE-2019-15505
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-15505
24
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
25
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
26
reference_url https://usn.ubuntu.com/4157-1/
reference_id USN-4157-1
reference_type
scores
url https://usn.ubuntu.com/4157-1/
27
reference_url https://usn.ubuntu.com/4157-2/
reference_id USN-4157-2
reference_type
scores
url https://usn.ubuntu.com/4157-2/
28
reference_url https://usn.ubuntu.com/4162-1/
reference_id USN-4162-1
reference_type
scores
url https://usn.ubuntu.com/4162-1/
29
reference_url https://usn.ubuntu.com/4162-2/
reference_id USN-4162-2
reference_type
scores
url https://usn.ubuntu.com/4162-2/
30
reference_url https://usn.ubuntu.com/4163-1/
reference_id USN-4163-1
reference_type
scores
url https://usn.ubuntu.com/4163-1/
31
reference_url https://usn.ubuntu.com/4163-2/
reference_id USN-4163-2
reference_type
scores
url https://usn.ubuntu.com/4163-2/
fixed_packages
aliases CVE-2019-15505
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n53a-ps37-bbf3
100
url VCID-ngut-28y7-fbbq
vulnerability_id VCID-ngut-28y7-fbbq
summary kernel: lib/kobject.c vulnerable to fill_kobj_path out-of-bounds write
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45863.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45863.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-45863
reference_id
reference_type
scores
0
value 0.0001
scoring_system epss
scoring_elements 0.0116
published_at 2026-04-02T12:55:00Z
1
value 0.0001
scoring_system epss
scoring_elements 0.01166
published_at 2026-04-04T12:55:00Z
2
value 0.0001
scoring_system epss
scoring_elements 0.01179
published_at 2026-04-07T12:55:00Z
3
value 0.0001
scoring_system epss
scoring_elements 0.01185
published_at 2026-04-08T12:55:00Z
4
value 0.0001
scoring_system epss
scoring_elements 0.01186
published_at 2026-04-09T12:55:00Z
5
value 0.0001
scoring_system epss
scoring_elements 0.01155
published_at 2026-04-16T12:55:00Z
6
value 0.0001
scoring_system epss
scoring_elements 0.01237
published_at 2026-04-21T12:55:00Z
7
value 0.0001
scoring_system epss
scoring_elements 0.0117
published_at 2026-04-11T12:55:00Z
8
value 0.0001
scoring_system epss
scoring_elements 0.01163
published_at 2026-04-12T12:55:00Z
9
value 0.0001
scoring_system epss
scoring_elements 0.01167
published_at 2026-04-18T12:55:00Z
10
value 0.00011
scoring_system epss
scoring_elements 0.01516
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-45863
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2244720
reference_id 2244720
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2244720
22
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
23
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
24
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
25
reference_url https://usn.ubuntu.com/6577-1/
reference_id USN-6577-1
reference_type
scores
url https://usn.ubuntu.com/6577-1/
26
reference_url https://usn.ubuntu.com/6602-1/
reference_id USN-6602-1
reference_type
scores
url https://usn.ubuntu.com/6602-1/
27
reference_url https://usn.ubuntu.com/6604-1/
reference_id USN-6604-1
reference_type
scores
url https://usn.ubuntu.com/6604-1/
28
reference_url https://usn.ubuntu.com/6604-2/
reference_id USN-6604-2
reference_type
scores
url https://usn.ubuntu.com/6604-2/
29
reference_url https://usn.ubuntu.com/6625-1/
reference_id USN-6625-1
reference_type
scores
url https://usn.ubuntu.com/6625-1/
30
reference_url https://usn.ubuntu.com/6625-2/
reference_id USN-6625-2
reference_type
scores
url https://usn.ubuntu.com/6625-2/
31
reference_url https://usn.ubuntu.com/6625-3/
reference_id USN-6625-3
reference_type
scores
url https://usn.ubuntu.com/6625-3/
fixed_packages
aliases CVE-2023-45863
risk_score 2.9
exploitability 0.5
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ngut-28y7-fbbq
101
url VCID-nnck-829f-e3gm
vulnerability_id VCID-nnck-829f-e3gm
summary Kernel: double free in hci_conn_cleanup of the bluetooth subsystem
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28464.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28464.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-28464
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03439
published_at 2026-04-02T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03452
published_at 2026-04-04T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03465
published_at 2026-04-07T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03467
published_at 2026-04-08T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.0349
published_at 2026-04-09T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03446
published_at 2026-04-11T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03419
published_at 2026-04-12T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03394
published_at 2026-04-13T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03371
published_at 2026-04-16T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.04642
published_at 2026-04-18T12:55:00Z
10
value 0.00019
scoring_system epss
scoring_elements 0.0532
published_at 2026-04-24T12:55:00Z
11
value 0.00019
scoring_system epss
scoring_elements 0.05283
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-28464
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2177759
reference_id 2177759
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2177759
4
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
5
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-28464
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nnck-829f-e3gm
102
url VCID-nt4s-u8z2-73d7
vulnerability_id VCID-nt4s-u8z2-73d7
summary kernel: RDMA/efa: Fix wrong resources deallocation order
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54201.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54201.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-54201
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07346
published_at 2026-04-02T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.0739
published_at 2026-04-04T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.07372
published_at 2026-04-07T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07427
published_at 2026-04-08T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.07451
published_at 2026-04-09T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.07437
published_at 2026-04-11T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.07424
published_at 2026-04-12T12:55:00Z
7
value 0.00026
scoring_system epss
scoring_elements 0.07413
published_at 2026-04-13T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.07341
published_at 2026-04-16T12:55:00Z
9
value 0.00026
scoring_system epss
scoring_elements 0.07329
published_at 2026-04-18T12:55:00Z
10
value 0.00026
scoring_system epss
scoring_elements 0.07456
published_at 2026-04-21T12:55:00Z
11
value 0.00026
scoring_system epss
scoring_elements 0.07417
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-54201
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54201
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2426049
reference_id 2426049
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2426049
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-54201
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nt4s-u8z2-73d7
103
url VCID-nwjz-2g6n-5bhc
vulnerability_id VCID-nwjz-2g6n-5bhc
summary kernel: RDMA/cxgb4: Fix potential null-ptr-deref in pass_establish()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53335.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53335.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53335
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03188
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03198
published_at 2026-04-04T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03201
published_at 2026-04-07T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03205
published_at 2026-04-08T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03231
published_at 2026-04-09T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03185
published_at 2026-04-11T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.03158
published_at 2026-04-12T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.04362
published_at 2026-04-21T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.04227
published_at 2026-04-16T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.04236
published_at 2026-04-18T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.04377
published_at 2026-04-24T12:55:00Z
11
value 0.00017
scoring_system epss
scoring_elements 0.04256
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53335
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53335
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53335
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2396111
reference_id 2396111
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2396111
5
reference_url https://git.kernel.org/stable/c/283861a4c52c1ea4df3dd1b6fc75a50796ce3524
reference_id 283861a4c52c1ea4df3dd1b6fc75a50796ce3524
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:37:23Z/
url https://git.kernel.org/stable/c/283861a4c52c1ea4df3dd1b6fc75a50796ce3524
6
reference_url https://git.kernel.org/stable/c/2cfc00e974d75a3aa8155f2660f57d342e1f67ca
reference_id 2cfc00e974d75a3aa8155f2660f57d342e1f67ca
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:37:23Z/
url https://git.kernel.org/stable/c/2cfc00e974d75a3aa8155f2660f57d342e1f67ca
7
reference_url https://git.kernel.org/stable/c/9dca64042d855a24b0bd81ce242e5dc7e939f6eb
reference_id 9dca64042d855a24b0bd81ce242e5dc7e939f6eb
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:37:23Z/
url https://git.kernel.org/stable/c/9dca64042d855a24b0bd81ce242e5dc7e939f6eb
8
reference_url https://git.kernel.org/stable/c/9ddc77eefb2a567b705c3c86ab2ddabe43cadf1b
reference_id 9ddc77eefb2a567b705c3c86ab2ddabe43cadf1b
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:37:23Z/
url https://git.kernel.org/stable/c/9ddc77eefb2a567b705c3c86ab2ddabe43cadf1b
9
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
10
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53335
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nwjz-2g6n-5bhc
104
url VCID-nxkh-as3r-cufe
vulnerability_id VCID-nxkh-as3r-cufe
summary kernel: net/mlx5e: Check for NOT_READY flag state after locking
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53581.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53581.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53581
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.0145
published_at 2026-04-02T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01453
published_at 2026-04-04T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.0146
published_at 2026-04-11T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01465
published_at 2026-04-08T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01467
published_at 2026-04-09T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01454
published_at 2026-04-13T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01443
published_at 2026-04-16T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.01457
published_at 2026-04-18T12:55:00Z
8
value 0.00012
scoring_system epss
scoring_elements 0.01544
published_at 2026-04-21T12:55:00Z
9
value 0.00012
scoring_system epss
scoring_elements 0.01552
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53581
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53581
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2401545
reference_id 2401545
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2401545
5
reference_url https://access.redhat.com/errata/RHSA-2020:1769
reference_id RHSA-2020:1769
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1769
6
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
7
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
8
reference_url https://access.redhat.com/errata/RHSA-2026:0537
reference_id RHSA-2026:0537
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0537
9
reference_url https://access.redhat.com/errata/RHSA-2026:0576
reference_id RHSA-2026:0576
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0576
10
reference_url https://access.redhat.com/errata/RHSA-2026:1441
reference_id RHSA-2026:1441
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1441
11
reference_url https://access.redhat.com/errata/RHSA-2026:1443
reference_id RHSA-2026:1443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1443
12
reference_url https://access.redhat.com/errata/RHSA-2026:1445
reference_id RHSA-2026:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1445
13
reference_url https://access.redhat.com/errata/RHSA-2026:2490
reference_id RHSA-2026:2490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2490
14
reference_url https://access.redhat.com/errata/RHSA-2026:2664
reference_id RHSA-2026:2664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2664
15
reference_url https://access.redhat.com/errata/RHSA-2026:3360
reference_id RHSA-2026:3360
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3360
fixed_packages
aliases CVE-2023-53581
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nxkh-as3r-cufe
105
url VCID-p2zm-56uv-kqa9
vulnerability_id VCID-p2zm-56uv-kqa9
summary kernel: iommu/amd/iommu_v2: Fix pasid_state refcount dec hit 0 warning on pasid unbind
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53501.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53501.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53501
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.02895
published_at 2026-04-12T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.0291
published_at 2026-04-04T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.02919
published_at 2026-04-07T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.0292
published_at 2026-04-08T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.02945
published_at 2026-04-09T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.02915
published_at 2026-04-11T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.02887
published_at 2026-04-13T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.02868
published_at 2026-04-16T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.02879
published_at 2026-04-18T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.02998
published_at 2026-04-21T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.02992
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53501
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2400711
reference_id 2400711
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2400711
4
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
5
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53501
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p2zm-56uv-kqa9
106
url VCID-punv-whvx-7ydr
vulnerability_id VCID-punv-whvx-7ydr
summary kernel: ipv4: NULL pointer dereference in ipv4_send_dest_unreach()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42754.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42754.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42754
reference_id
reference_type
scores
0
value 0.0001
scoring_system epss
scoring_elements 0.01072
published_at 2026-04-02T12:55:00Z
1
value 0.0001
scoring_system epss
scoring_elements 0.01075
published_at 2026-04-04T12:55:00Z
2
value 0.0001
scoring_system epss
scoring_elements 0.01082
published_at 2026-04-07T12:55:00Z
3
value 0.0001
scoring_system epss
scoring_elements 0.01087
published_at 2026-04-09T12:55:00Z
4
value 0.0001
scoring_system epss
scoring_elements 0.01071
published_at 2026-04-11T12:55:00Z
5
value 0.0001
scoring_system epss
scoring_elements 0.01065
published_at 2026-04-12T12:55:00Z
6
value 0.0001
scoring_system epss
scoring_elements 0.01066
published_at 2026-04-13T12:55:00Z
7
value 0.0001
scoring_system epss
scoring_elements 0.01059
published_at 2026-04-16T12:55:00Z
8
value 0.0001
scoring_system epss
scoring_elements 0.01068
published_at 2026-04-18T12:55:00Z
9
value 0.0001
scoring_system epss
scoring_elements 0.01132
published_at 2026-04-21T12:55:00Z
10
value 0.0001
scoring_system epss
scoring_elements 0.01133
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42754
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42754
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2239845
reference_id 2239845
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2239845
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
7
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
8
reference_url https://usn.ubuntu.com/6461-1/
reference_id USN-6461-1
reference_type
scores
url https://usn.ubuntu.com/6461-1/
9
reference_url https://usn.ubuntu.com/6494-1/
reference_id USN-6494-1
reference_type
scores
url https://usn.ubuntu.com/6494-1/
10
reference_url https://usn.ubuntu.com/6494-2/
reference_id USN-6494-2
reference_type
scores
url https://usn.ubuntu.com/6494-2/
11
reference_url https://usn.ubuntu.com/6532-1/
reference_id USN-6532-1
reference_type
scores
url https://usn.ubuntu.com/6532-1/
12
reference_url https://usn.ubuntu.com/6534-1/
reference_id USN-6534-1
reference_type
scores
url https://usn.ubuntu.com/6534-1/
13
reference_url https://usn.ubuntu.com/6534-2/
reference_id USN-6534-2
reference_type
scores
url https://usn.ubuntu.com/6534-2/
14
reference_url https://usn.ubuntu.com/6534-3/
reference_id USN-6534-3
reference_type
scores
url https://usn.ubuntu.com/6534-3/
15
reference_url https://usn.ubuntu.com/6536-1/
reference_id USN-6536-1
reference_type
scores
url https://usn.ubuntu.com/6536-1/
16
reference_url https://usn.ubuntu.com/6537-1/
reference_id USN-6537-1
reference_type
scores
url https://usn.ubuntu.com/6537-1/
17
reference_url https://usn.ubuntu.com/6548-1/
reference_id USN-6548-1
reference_type
scores
url https://usn.ubuntu.com/6548-1/
18
reference_url https://usn.ubuntu.com/6548-2/
reference_id USN-6548-2
reference_type
scores
url https://usn.ubuntu.com/6548-2/
19
reference_url https://usn.ubuntu.com/6548-3/
reference_id USN-6548-3
reference_type
scores
url https://usn.ubuntu.com/6548-3/
20
reference_url https://usn.ubuntu.com/6548-4/
reference_id USN-6548-4
reference_type
scores
url https://usn.ubuntu.com/6548-4/
21
reference_url https://usn.ubuntu.com/6548-5/
reference_id USN-6548-5
reference_type
scores
url https://usn.ubuntu.com/6548-5/
22
reference_url https://usn.ubuntu.com/6549-1/
reference_id USN-6549-1
reference_type
scores
url https://usn.ubuntu.com/6549-1/
23
reference_url https://usn.ubuntu.com/6549-2/
reference_id USN-6549-2
reference_type
scores
url https://usn.ubuntu.com/6549-2/
24
reference_url https://usn.ubuntu.com/6549-3/
reference_id USN-6549-3
reference_type
scores
url https://usn.ubuntu.com/6549-3/
25
reference_url https://usn.ubuntu.com/6549-4/
reference_id USN-6549-4
reference_type
scores
url https://usn.ubuntu.com/6549-4/
26
reference_url https://usn.ubuntu.com/6549-5/
reference_id USN-6549-5
reference_type
scores
url https://usn.ubuntu.com/6549-5/
27
reference_url https://usn.ubuntu.com/6573-1/
reference_id USN-6573-1
reference_type
scores
url https://usn.ubuntu.com/6573-1/
28
reference_url https://usn.ubuntu.com/6635-1/
reference_id USN-6635-1
reference_type
scores
url https://usn.ubuntu.com/6635-1/
fixed_packages
aliases CVE-2023-42754
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-punv-whvx-7ydr
107
url VCID-pwsz-e7j6-nbch
vulnerability_id VCID-pwsz-e7j6-nbch
summary kernel: mptcp: use the workqueue to destroy unaccepted sockets
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53072.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53072.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53072
reference_id
reference_type
scores
0
value 0.00052
scoring_system epss
scoring_elements 0.16289
published_at 2026-04-02T12:55:00Z
1
value 0.00052
scoring_system epss
scoring_elements 0.16351
published_at 2026-04-04T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.1615
published_at 2026-04-07T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.16236
published_at 2026-04-08T12:55:00Z
4
value 0.00052
scoring_system epss
scoring_elements 0.16302
published_at 2026-04-09T12:55:00Z
5
value 0.00052
scoring_system epss
scoring_elements 0.16284
published_at 2026-04-11T12:55:00Z
6
value 0.00052
scoring_system epss
scoring_elements 0.16244
published_at 2026-04-12T12:55:00Z
7
value 0.00052
scoring_system epss
scoring_elements 0.16176
published_at 2026-04-13T12:55:00Z
8
value 0.00052
scoring_system epss
scoring_elements 0.16114
published_at 2026-04-16T12:55:00Z
9
value 0.00052
scoring_system epss
scoring_elements 0.16132
published_at 2026-04-18T12:55:00Z
10
value 0.00052
scoring_system epss
scoring_elements 0.1617
published_at 2026-04-21T12:55:00Z
11
value 0.00052
scoring_system epss
scoring_elements 0.16059
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53072
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53072
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53072
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2363749
reference_id 2363749
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2363749
5
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53072
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pwsz-e7j6-nbch
108
url VCID-pxt2-nr7c-5kcz
vulnerability_id VCID-pxt2-nr7c-5kcz
summary kernel: Bluetooth Forward and Future Secrecy Attacks and Defenses
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-24023.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-24023.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-24023
reference_id
reference_type
scores
0
value 0.00203
scoring_system epss
scoring_elements 0.42394
published_at 2026-04-02T12:55:00Z
1
value 0.00203
scoring_system epss
scoring_elements 0.42261
published_at 2026-04-24T12:55:00Z
2
value 0.00203
scoring_system epss
scoring_elements 0.4241
published_at 2026-04-08T12:55:00Z
3
value 0.00203
scoring_system epss
scoring_elements 0.42418
published_at 2026-04-09T12:55:00Z
4
value 0.00203
scoring_system epss
scoring_elements 0.42441
published_at 2026-04-11T12:55:00Z
5
value 0.00203
scoring_system epss
scoring_elements 0.42405
published_at 2026-04-12T12:55:00Z
6
value 0.00203
scoring_system epss
scoring_elements 0.42375
published_at 2026-04-13T12:55:00Z
7
value 0.00203
scoring_system epss
scoring_elements 0.42398
published_at 2026-04-18T12:55:00Z
8
value 0.00203
scoring_system epss
scoring_elements 0.42424
published_at 2026-04-16T12:55:00Z
9
value 0.00203
scoring_system epss
scoring_elements 0.42362
published_at 2026-04-07T12:55:00Z
10
value 0.00208
scoring_system epss
scoring_elements 0.43218
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-24023
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24023
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2254961
reference_id 2254961
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2254961
5
reference_url https://dl.acm.org/doi/10.1145/3576915.3623066
reference_id 3576915.3623066
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-01T03:55:58Z/
url https://dl.acm.org/doi/10.1145/3576915.3623066
6
reference_url https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/bluffs-vulnerability/
reference_id bluffs-vulnerability
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-01T03:55:58Z/
url https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/bluffs-vulnerability/
7
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
8
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
9
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
10
reference_url https://usn.ubuntu.com/6739-1/
reference_id USN-6739-1
reference_type
scores
url https://usn.ubuntu.com/6739-1/
11
reference_url https://usn.ubuntu.com/6740-1/
reference_id USN-6740-1
reference_type
scores
url https://usn.ubuntu.com/6740-1/
12
reference_url https://usn.ubuntu.com/6741-1/
reference_id USN-6741-1
reference_type
scores
url https://usn.ubuntu.com/6741-1/
13
reference_url https://usn.ubuntu.com/6742-1/
reference_id USN-6742-1
reference_type
scores
url https://usn.ubuntu.com/6742-1/
14
reference_url https://usn.ubuntu.com/6742-2/
reference_id USN-6742-2
reference_type
scores
url https://usn.ubuntu.com/6742-2/
fixed_packages
aliases CVE-2023-24023
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pxt2-nr7c-5kcz
109
url VCID-qhpj-sbnc-t3af
vulnerability_id VCID-qhpj-sbnc-t3af
summary kernel: x86/platform/uv: Use alternate source for socket to node data
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53496.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53496.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53496
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04741
published_at 2026-04-02T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04764
published_at 2026-04-04T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04779
published_at 2026-04-07T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04812
published_at 2026-04-11T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04825
published_at 2026-04-09T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.0479
published_at 2026-04-12T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.0477
published_at 2026-04-13T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04723
published_at 2026-04-16T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04731
published_at 2026-04-18T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.04875
published_at 2026-04-21T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04912
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53496
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2400813
reference_id 2400813
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2400813
4
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
5
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
6
reference_url https://access.redhat.com/errata/RHSA-2024:4108
reference_id RHSA-2024:4108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4108
fixed_packages
aliases CVE-2023-53496
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qhpj-sbnc-t3af
110
url VCID-qp7s-fafn-a3fe
vulnerability_id VCID-qp7s-fafn-a3fe
summary kernel: ixgbe: Fix panic during XDP_TX with > 64 CPUs
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54090.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54090.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-54090
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07346
published_at 2026-04-02T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.0739
published_at 2026-04-04T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.07372
published_at 2026-04-07T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07427
published_at 2026-04-08T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.07451
published_at 2026-04-09T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.07437
published_at 2026-04-11T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.07424
published_at 2026-04-12T12:55:00Z
7
value 0.00026
scoring_system epss
scoring_elements 0.07413
published_at 2026-04-13T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.07341
published_at 2026-04-16T12:55:00Z
9
value 0.00026
scoring_system epss
scoring_elements 0.07329
published_at 2026-04-18T12:55:00Z
10
value 0.00026
scoring_system epss
scoring_elements 0.07456
published_at 2026-04-21T12:55:00Z
11
value 0.00026
scoring_system epss
scoring_elements 0.07417
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-54090
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2425098
reference_id 2425098
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2425098
4
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
5
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-54090
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qp7s-fafn-a3fe
111
url VCID-qtv9-fm5u-7bbg
vulnerability_id VCID-qtv9-fm5u-7bbg
summary kernel: scsi: qla2xxx: Check valid rport returned by fc_bsg_to_rport()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54014.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54014.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-54014
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10911
published_at 2026-04-02T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10975
published_at 2026-04-04T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.108
published_at 2026-04-07T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10876
published_at 2026-04-08T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10929
published_at 2026-04-09T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.1093
published_at 2026-04-11T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10897
published_at 2026-04-12T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10874
published_at 2026-04-21T12:55:00Z
8
value 0.00036
scoring_system epss
scoring_elements 0.10734
published_at 2026-04-16T12:55:00Z
9
value 0.00036
scoring_system epss
scoring_elements 0.10747
published_at 2026-04-18T12:55:00Z
10
value 0.00036
scoring_system epss
scoring_elements 0.10834
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-54014
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54014
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54014
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2424950
reference_id 2424950
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2424950
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-54014
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qtv9-fm5u-7bbg
112
url VCID-qu5p-6z4k-pbe4
vulnerability_id VCID-qu5p-6z4k-pbe4
summary kernel: ext4: Fix function prototype mismatch for ext4_feat_ktype
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53224.json
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53224.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53224
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.02965
published_at 2026-04-04T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.02951
published_at 2026-04-02T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03
published_at 2026-04-09T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.02975
published_at 2026-04-08T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.02973
published_at 2026-04-07T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.04166
published_at 2026-04-24T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.04067
published_at 2026-04-11T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.04056
published_at 2026-04-12T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.0403
published_at 2026-04-13T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.04019
published_at 2026-04-16T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.04031
published_at 2026-04-18T12:55:00Z
11
value 0.00017
scoring_system epss
scoring_elements 0.04154
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53224
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53224
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53224
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/0a1394e07c5d6bf1bfc25db8589ff1b1bfb6f46a
reference_id 0a1394e07c5d6bf1bfc25db8589ff1b1bfb6f46a
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:50:53Z/
url https://git.kernel.org/stable/c/0a1394e07c5d6bf1bfc25db8589ff1b1bfb6f46a
5
reference_url https://git.kernel.org/stable/c/118901ad1f25d2334255b3d50512fa20591531cd
reference_id 118901ad1f25d2334255b3d50512fa20591531cd
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:50:53Z/
url https://git.kernel.org/stable/c/118901ad1f25d2334255b3d50512fa20591531cd
6
reference_url https://git.kernel.org/stable/c/1ba10d3640e9783dad811fe4e24d55465c37c64d
reference_id 1ba10d3640e9783dad811fe4e24d55465c37c64d
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:50:53Z/
url https://git.kernel.org/stable/c/1ba10d3640e9783dad811fe4e24d55465c37c64d
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2395241
reference_id 2395241
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2395241
8
reference_url https://git.kernel.org/stable/c/2b69cdd9f9a7f596e3dd31f05f9852940d177924
reference_id 2b69cdd9f9a7f596e3dd31f05f9852940d177924
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:50:53Z/
url https://git.kernel.org/stable/c/2b69cdd9f9a7f596e3dd31f05f9852940d177924
9
reference_url https://git.kernel.org/stable/c/94d8de83286fb1827340eba35b61c308f6b46ead
reference_id 94d8de83286fb1827340eba35b61c308f6b46ead
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:50:53Z/
url https://git.kernel.org/stable/c/94d8de83286fb1827340eba35b61c308f6b46ead
10
reference_url https://git.kernel.org/stable/c/99e3fd21f8fc975c95e8cf76fbf6a3d2656f8f71
reference_id 99e3fd21f8fc975c95e8cf76fbf6a3d2656f8f71
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:50:53Z/
url https://git.kernel.org/stable/c/99e3fd21f8fc975c95e8cf76fbf6a3d2656f8f71
11
reference_url https://git.kernel.org/stable/c/c98077f7598a562f51051eec043be0cb3e1b1b5e
reference_id c98077f7598a562f51051eec043be0cb3e1b1b5e
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:50:53Z/
url https://git.kernel.org/stable/c/c98077f7598a562f51051eec043be0cb3e1b1b5e
12
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
13
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53224
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qu5p-6z4k-pbe4
113
url VCID-qwzq-jrtt-7yhk
vulnerability_id VCID-qwzq-jrtt-7yhk
summary kernel: net/mlx5e: fix memory leak in mlx5e_ptp_open
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54169.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54169.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-54169
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07346
published_at 2026-04-02T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.0739
published_at 2026-04-04T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.07372
published_at 2026-04-07T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07427
published_at 2026-04-08T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.07451
published_at 2026-04-09T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.07437
published_at 2026-04-11T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.07424
published_at 2026-04-12T12:55:00Z
7
value 0.00026
scoring_system epss
scoring_elements 0.07413
published_at 2026-04-13T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.07341
published_at 2026-04-16T12:55:00Z
9
value 0.00026
scoring_system epss
scoring_elements 0.07329
published_at 2026-04-18T12:55:00Z
10
value 0.00026
scoring_system epss
scoring_elements 0.07456
published_at 2026-04-21T12:55:00Z
11
value 0.00026
scoring_system epss
scoring_elements 0.07417
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-54169
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2426227
reference_id 2426227
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2426227
4
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
5
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-54169
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qwzq-jrtt-7yhk
114
url VCID-rekt-2vyj-z7g8
vulnerability_id VCID-rekt-2vyj-z7g8
summary kernel: dm: fix a race condition in retrieve_deps
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54324.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54324.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-54324
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.06793
published_at 2026-04-02T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.0684
published_at 2026-04-04T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06822
published_at 2026-04-07T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.06874
published_at 2026-04-08T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.06907
published_at 2026-04-09T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.069
published_at 2026-04-11T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.06893
published_at 2026-04-12T12:55:00Z
7
value 0.00025
scoring_system epss
scoring_elements 0.06888
published_at 2026-04-13T12:55:00Z
8
value 0.00025
scoring_system epss
scoring_elements 0.0683
published_at 2026-04-16T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.06811
published_at 2026-04-18T12:55:00Z
10
value 0.00025
scoring_system epss
scoring_elements 0.06956
published_at 2026-04-21T12:55:00Z
11
value 0.00025
scoring_system epss
scoring_elements 0.06938
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-54324
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54324
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2426236
reference_id 2426236
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2426236
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-54324
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rekt-2vyj-z7g8
115
url VCID-rw4x-nvsd-8ucb
vulnerability_id VCID-rw4x-nvsd-8ucb
summary kernel: hugetlbfs: Null pointer dereference in hugetlbfs_fill_super function
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0841.json
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0841.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0841
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01536
published_at 2026-04-24T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01425
published_at 2026-04-16T12:55:00Z
2
value 0.00011
scoring_system epss
scoring_elements 0.01439
published_at 2026-04-18T12:55:00Z
3
value 0.00011
scoring_system epss
scoring_elements 0.01527
published_at 2026-04-21T12:55:00Z
4
value 0.00011
scoring_system epss
scoring_elements 0.01433
published_at 2026-04-12T12:55:00Z
5
value 0.00011
scoring_system epss
scoring_elements 0.01438
published_at 2026-04-04T12:55:00Z
6
value 0.00011
scoring_system epss
scoring_elements 0.01443
published_at 2026-04-07T12:55:00Z
7
value 0.00011
scoring_system epss
scoring_elements 0.01447
published_at 2026-04-08T12:55:00Z
8
value 0.00011
scoring_system epss
scoring_elements 0.0145
published_at 2026-04-09T12:55:00Z
9
value 0.00011
scoring_system epss
scoring_elements 0.01442
published_at 2026-04-11T12:55:00Z
10
value 0.00011
scoring_system epss
scoring_elements 0.01434
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0841
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47233
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47233
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52429
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52429
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52434
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52435
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52458
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52458
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52482
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52486
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52489
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52491
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52492
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52493
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52498
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52587
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52587
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52594
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52595
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52597
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52598
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52599
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52600
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52601
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52602
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52603
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52604
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52606
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52615
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52616
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52617
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52618
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52619
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52622
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52623
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52627
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52627
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52635
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52637
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52642
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0340
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0607
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1151
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23849
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851
58
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24857
59
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24858
60
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24861
61
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26581
62
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26593
63
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26600
64
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601
65
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602
66
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26606
67
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26610
68
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614
69
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615
70
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26622
71
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26625
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26625
72
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26627
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26627
73
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26635
74
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26636
75
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26640
76
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641
77
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642
78
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643
79
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26644
80
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26645
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26645
81
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651
82
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26654
83
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26659
84
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663
85
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26664
86
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26665
87
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26671
88
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26673
89
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675
90
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26679
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26679
91
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26684
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26684
92
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26685
93
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26687
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26687
94
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688
95
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689
96
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26695
97
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26696
98
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26697
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26697
99
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26698
100
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26702
101
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704
102
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26707
103
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26712
104
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26722
105
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26727
106
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733
107
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735
108
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26736
109
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743
110
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744
111
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747
112
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26748
113
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26749
114
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26751
115
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26752
116
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26753
117
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754
118
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763
119
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764
120
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766
121
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771
122
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772
123
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773
124
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26776
125
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777
126
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778
127
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779
128
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26781
129
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782
130
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26787
131
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26788
132
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26790
133
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791
134
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793
135
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26795
136
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801
137
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804
138
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805
139
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26808
140
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26809
141
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26810
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26810
142
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26812
143
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26813
144
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26814
145
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816
146
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817
147
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26820
148
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26825
149
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26833
150
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26835
151
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839
152
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840
153
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26843
154
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26845
155
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26846
156
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26851
157
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852
158
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855
159
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857
160
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859
161
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26861
162
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26862
163
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863
164
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26870
165
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26872
166
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26874
167
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26875
168
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26877
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26877
169
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878
170
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26880
171
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26882
172
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883
173
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884
174
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885
175
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889
176
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891
177
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26894
178
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26895
179
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26897
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26897
180
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898
181
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901
182
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903
183
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906
184
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907
185
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26910
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26910
186
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26917
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26917
187
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922
188
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923
189
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26924
190
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925
191
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26926
192
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931
193
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26934
194
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935
195
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26937
196
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26950
197
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26951
198
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26955
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26955
199
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26956
200
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26957
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26957
201
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26958
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26958
202
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960
203
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961
204
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26965
205
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26966
206
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26969
207
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26970
208
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26973
209
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974
210
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976
211
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26978
212
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26981
213
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26984
214
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26988
215
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993
216
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26994
217
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26997
218
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26999
219
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27000
220
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27001
221
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27004
222
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008
223
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013
224
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020
225
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27024
226
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27025
227
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27028
228
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27030
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27030
229
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27038
230
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043
231
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27044
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27044
232
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27045
233
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046
234
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27047
235
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051
236
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27052
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27052
237
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27053
238
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27059
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27059
239
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065
240
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073
241
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074
242
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075
243
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27076
244
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27077
245
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078
246
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388
247
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437
248
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
249
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2256490
reference_id 2256490
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T15:50:50Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2256490
250
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
251
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv
reference_id cpe:/a:redhat:enterprise_linux:8::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv
252
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime
reference_id cpe:/a:redhat:enterprise_linux:8::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime
253
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
254
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
255
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv
reference_id cpe:/a:redhat:enterprise_linux:9::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv
256
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime
reference_id cpe:/a:redhat:enterprise_linux:9::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime
257
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
258
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
259
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
260
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
261
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
262
reference_url https://access.redhat.com/security/cve/CVE-2024-0841
reference_id CVE-2024-0841
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T15:50:50Z/
url https://access.redhat.com/security/cve/CVE-2024-0841
263
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T15:50:50Z/
url https://access.redhat.com/errata/RHSA-2024:2394
264
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T15:50:50Z/
url https://access.redhat.com/errata/RHSA-2024:2950
265
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T15:50:50Z/
url https://access.redhat.com/errata/RHSA-2024:3138
266
reference_url https://usn.ubuntu.com/6820-1/
reference_id USN-6820-1
reference_type
scores
url https://usn.ubuntu.com/6820-1/
267
reference_url https://usn.ubuntu.com/6820-2/
reference_id USN-6820-2
reference_type
scores
url https://usn.ubuntu.com/6820-2/
268
reference_url https://usn.ubuntu.com/6821-1/
reference_id USN-6821-1
reference_type
scores
url https://usn.ubuntu.com/6821-1/
269
reference_url https://usn.ubuntu.com/6821-2/
reference_id USN-6821-2
reference_type
scores
url https://usn.ubuntu.com/6821-2/
270
reference_url https://usn.ubuntu.com/6821-3/
reference_id USN-6821-3
reference_type
scores
url https://usn.ubuntu.com/6821-3/
271
reference_url https://usn.ubuntu.com/6821-4/
reference_id USN-6821-4
reference_type
scores
url https://usn.ubuntu.com/6821-4/
272
reference_url https://usn.ubuntu.com/6828-1/
reference_id USN-6828-1
reference_type
scores
url https://usn.ubuntu.com/6828-1/
273
reference_url https://usn.ubuntu.com/6831-1/
reference_id USN-6831-1
reference_type
scores
url https://usn.ubuntu.com/6831-1/
274
reference_url https://usn.ubuntu.com/6867-1/
reference_id USN-6867-1
reference_type
scores
url https://usn.ubuntu.com/6867-1/
275
reference_url https://usn.ubuntu.com/6871-1/
reference_id USN-6871-1
reference_type
scores
url https://usn.ubuntu.com/6871-1/
276
reference_url https://usn.ubuntu.com/6892-1/
reference_id USN-6892-1
reference_type
scores
url https://usn.ubuntu.com/6892-1/
277
reference_url https://usn.ubuntu.com/6895-1/
reference_id USN-6895-1
reference_type
scores
url https://usn.ubuntu.com/6895-1/
278
reference_url https://usn.ubuntu.com/6895-2/
reference_id USN-6895-2
reference_type
scores
url https://usn.ubuntu.com/6895-2/
279
reference_url https://usn.ubuntu.com/6895-3/
reference_id USN-6895-3
reference_type
scores
url https://usn.ubuntu.com/6895-3/
280
reference_url https://usn.ubuntu.com/6895-4/
reference_id USN-6895-4
reference_type
scores
url https://usn.ubuntu.com/6895-4/
281
reference_url https://usn.ubuntu.com/6900-1/
reference_id USN-6900-1
reference_type
scores
url https://usn.ubuntu.com/6900-1/
282
reference_url https://usn.ubuntu.com/6919-1/
reference_id USN-6919-1
reference_type
scores
url https://usn.ubuntu.com/6919-1/
fixed_packages
aliases CVE-2024-0841
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rw4x-nvsd-8ucb
116
url VCID-s4zv-a972-6udg
vulnerability_id VCID-s4zv-a972-6udg
summary kernel: VMCI: Use threaded irqs instead of tasklets
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49759.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49759.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49759
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06046
published_at 2026-04-02T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06258
published_at 2026-04-24T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06128
published_at 2026-04-12T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06121
published_at 2026-04-13T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06082
published_at 2026-04-16T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06094
published_at 2026-04-18T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06242
published_at 2026-04-21T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06079
published_at 2026-04-04T12:55:00Z
8
value 0.00023
scoring_system epss
scoring_elements 0.06062
published_at 2026-04-07T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06102
published_at 2026-04-08T12:55:00Z
10
value 0.00023
scoring_system epss
scoring_elements 0.06142
published_at 2026-04-09T12:55:00Z
11
value 0.00023
scoring_system epss
scoring_elements 0.06133
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49759
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2355497
reference_id 2355497
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2355497
4
reference_url https://git.kernel.org/stable/c/3daed6345d5880464f46adab871d208e1baa2f3a
reference_id 3daed6345d5880464f46adab871d208e1baa2f3a
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:22:23Z/
url https://git.kernel.org/stable/c/3daed6345d5880464f46adab871d208e1baa2f3a
5
reference_url https://git.kernel.org/stable/c/548ea9dd5e01b0ecf53d2563004c80abd636743d
reference_id 548ea9dd5e01b0ecf53d2563004c80abd636743d
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T17:22:23Z/
url https://git.kernel.org/stable/c/548ea9dd5e01b0ecf53d2563004c80abd636743d
6
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
7
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2022-49759
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s4zv-a972-6udg
117
url VCID-sc4h-g6yp-cud9
vulnerability_id VCID-sc4h-g6yp-cud9
summary kernel: scsi: core: Remove the /proc/scsi/${proc_name} directory earlier
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53140.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53140.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53140
reference_id
reference_type
scores
0
value 0.00092
scoring_system epss
scoring_elements 0.25922
published_at 2026-04-02T12:55:00Z
1
value 0.00092
scoring_system epss
scoring_elements 0.25964
published_at 2026-04-04T12:55:00Z
2
value 0.00092
scoring_system epss
scoring_elements 0.2573
published_at 2026-04-07T12:55:00Z
3
value 0.00092
scoring_system epss
scoring_elements 0.25802
published_at 2026-04-08T12:55:00Z
4
value 0.00092
scoring_system epss
scoring_elements 0.25853
published_at 2026-04-09T12:55:00Z
5
value 0.00092
scoring_system epss
scoring_elements 0.25864
published_at 2026-04-11T12:55:00Z
6
value 0.00092
scoring_system epss
scoring_elements 0.25823
published_at 2026-04-12T12:55:00Z
7
value 0.00092
scoring_system epss
scoring_elements 0.25767
published_at 2026-04-13T12:55:00Z
8
value 0.00092
scoring_system epss
scoring_elements 0.25768
published_at 2026-04-16T12:55:00Z
9
value 0.00092
scoring_system epss
scoring_elements 0.25751
published_at 2026-04-18T12:55:00Z
10
value 0.00092
scoring_system epss
scoring_elements 0.25723
published_at 2026-04-21T12:55:00Z
11
value 0.00092
scoring_system epss
scoring_elements 0.25668
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53140
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53140
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2363767
reference_id 2363767
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2363767
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53140
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sc4h-g6yp-cud9
118
url VCID-sv6b-1fxf-2ygx
vulnerability_id VCID-sv6b-1fxf-2ygx
summary kernel: vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52973.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52973.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-52973
reference_id
reference_type
scores
0
value 0.00028
scoring_system epss
scoring_elements 0.07882
published_at 2026-04-02T12:55:00Z
1
value 0.00028
scoring_system epss
scoring_elements 0.07839
published_at 2026-04-16T12:55:00Z
2
value 0.00028
scoring_system epss
scoring_elements 0.07922
published_at 2026-04-13T12:55:00Z
3
value 0.00028
scoring_system epss
scoring_elements 0.07936
published_at 2026-04-12T12:55:00Z
4
value 0.00028
scoring_system epss
scoring_elements 0.07953
published_at 2026-04-11T12:55:00Z
5
value 0.00028
scoring_system epss
scoring_elements 0.07964
published_at 2026-04-09T12:55:00Z
6
value 0.00028
scoring_system epss
scoring_elements 0.07944
published_at 2026-04-08T12:55:00Z
7
value 0.00028
scoring_system epss
scoring_elements 0.07929
published_at 2026-04-04T12:55:00Z
8
value 0.00028
scoring_system epss
scoring_elements 0.07886
published_at 2026-04-07T12:55:00Z
9
value 0.00043
scoring_system epss
scoring_elements 0.13298
published_at 2026-04-24T12:55:00Z
10
value 0.00043
scoring_system epss
scoring_elements 0.1321
published_at 2026-04-18T12:55:00Z
11
value 0.00043
scoring_system epss
scoring_elements 0.13291
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-52973
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52973
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/226fae124b2dac217ea5436060d623ff3385bc34
reference_id 226fae124b2dac217ea5436060d623ff3385bc34
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-27T16:59:54Z/
url https://git.kernel.org/stable/c/226fae124b2dac217ea5436060d623ff3385bc34
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2355433
reference_id 2355433
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2355433
6
reference_url https://git.kernel.org/stable/c/55515d7d8743b71b80bfe68e89eb9d92630626ab
reference_id 55515d7d8743b71b80bfe68e89eb9d92630626ab
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-27T16:59:54Z/
url https://git.kernel.org/stable/c/55515d7d8743b71b80bfe68e89eb9d92630626ab
7
reference_url https://git.kernel.org/stable/c/6332f52f44b9776568bf3c0b714ddfb0bb175e78
reference_id 6332f52f44b9776568bf3c0b714ddfb0bb175e78
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-27T16:59:54Z/
url https://git.kernel.org/stable/c/6332f52f44b9776568bf3c0b714ddfb0bb175e78
8
reference_url https://git.kernel.org/stable/c/8506f16aae9daf354e3732bcfd447e2a97f023df
reference_id 8506f16aae9daf354e3732bcfd447e2a97f023df
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-27T16:59:54Z/
url https://git.kernel.org/stable/c/8506f16aae9daf354e3732bcfd447e2a97f023df
9
reference_url https://git.kernel.org/stable/c/af79ea9a2443016f64d8fd8d72020cc874f0e066
reference_id af79ea9a2443016f64d8fd8d72020cc874f0e066
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-27T16:59:54Z/
url https://git.kernel.org/stable/c/af79ea9a2443016f64d8fd8d72020cc874f0e066
10
reference_url https://git.kernel.org/stable/c/d0332cbf53dad06a22189cc341391237f4ea6d9f
reference_id d0332cbf53dad06a22189cc341391237f4ea6d9f
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-27T16:59:54Z/
url https://git.kernel.org/stable/c/d0332cbf53dad06a22189cc341391237f4ea6d9f
11
reference_url https://git.kernel.org/stable/c/fc9e27f3ba083534b8bbf72ab0f5c810ffdc7d18
reference_id fc9e27f3ba083534b8bbf72ab0f5c810ffdc7d18
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-27T16:59:54Z/
url https://git.kernel.org/stable/c/fc9e27f3ba083534b8bbf72ab0f5c810ffdc7d18
12
reference_url https://access.redhat.com/errata/RHSA-2024:0439
reference_id RHSA-2024:0439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0439
13
reference_url https://access.redhat.com/errata/RHSA-2024:0448
reference_id RHSA-2024:0448
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0448
14
reference_url https://access.redhat.com/errata/RHSA-2024:0575
reference_id RHSA-2024:0575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0575
15
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
16
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-52973
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sv6b-1fxf-2ygx
119
url VCID-t2jg-dbdj-r3av
vulnerability_id VCID-t2jg-dbdj-r3av
summary kernel: ICMPv6 “Packet Too Big” packets force a DoS of the Linux kernel by forcing 100% CPU
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52340.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52340.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-52340
reference_id
reference_type
scores
0
value 0.00084
scoring_system epss
scoring_elements 0.24572
published_at 2026-04-02T12:55:00Z
1
value 0.00084
scoring_system epss
scoring_elements 0.24267
published_at 2026-04-24T12:55:00Z
2
value 0.00084
scoring_system epss
scoring_elements 0.2447
published_at 2026-04-12T12:55:00Z
3
value 0.00084
scoring_system epss
scoring_elements 0.24412
published_at 2026-04-13T12:55:00Z
4
value 0.00084
scoring_system epss
scoring_elements 0.24428
published_at 2026-04-16T12:55:00Z
5
value 0.00084
scoring_system epss
scoring_elements 0.24419
published_at 2026-04-18T12:55:00Z
6
value 0.00084
scoring_system epss
scoring_elements 0.24393
published_at 2026-04-21T12:55:00Z
7
value 0.00084
scoring_system epss
scoring_elements 0.24608
published_at 2026-04-04T12:55:00Z
8
value 0.00084
scoring_system epss
scoring_elements 0.24385
published_at 2026-04-07T12:55:00Z
9
value 0.00084
scoring_system epss
scoring_elements 0.24454
published_at 2026-04-08T12:55:00Z
10
value 0.00084
scoring_system epss
scoring_elements 0.24498
published_at 2026-04-09T12:55:00Z
11
value 0.00084
scoring_system epss
scoring_elements 0.24514
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-52340
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52340
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257979
reference_id 2257979
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2257979
5
reference_url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3
reference_id ChangeLog-6.3
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-05T13:36:20Z/
url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3
6
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=af6d10345ca76670c1b7c37799f0d5576ccef277
reference_id commit?id=af6d10345ca76670c1b7c37799f0d5576ccef277
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-05T13:36:20Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=af6d10345ca76670c1b7c37799f0d5576ccef277
7
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
8
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
9
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
10
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
11
reference_url https://usn.ubuntu.com/6725-1/
reference_id USN-6725-1
reference_type
scores
url https://usn.ubuntu.com/6725-1/
12
reference_url https://usn.ubuntu.com/6725-2/
reference_id USN-6725-2
reference_type
scores
url https://usn.ubuntu.com/6725-2/
13
reference_url https://usn.ubuntu.com/6726-1/
reference_id USN-6726-1
reference_type
scores
url https://usn.ubuntu.com/6726-1/
14
reference_url https://usn.ubuntu.com/6726-2/
reference_id USN-6726-2
reference_type
scores
url https://usn.ubuntu.com/6726-2/
15
reference_url https://usn.ubuntu.com/6726-3/
reference_id USN-6726-3
reference_type
scores
url https://usn.ubuntu.com/6726-3/
fixed_packages
aliases CVE-2023-52340
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t2jg-dbdj-r3av
120
url VCID-t37x-b4vt-6kd7
vulnerability_id VCID-t37x-b4vt-6kd7
summary kernel: RDMA/cma: Allow UD qp_type to join multicast only
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53525.json
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53525.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53525
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.02895
published_at 2026-04-12T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.0291
published_at 2026-04-04T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.02919
published_at 2026-04-07T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.0292
published_at 2026-04-08T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.02945
published_at 2026-04-09T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.02915
published_at 2026-04-11T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.02887
published_at 2026-04-13T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.02868
published_at 2026-04-16T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.02879
published_at 2026-04-18T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.02998
published_at 2026-04-21T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.02992
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53525
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53525
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53525
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2400694
reference_id 2400694
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2400694
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53525
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t37x-b4vt-6kd7
121
url VCID-t6vp-xgs3-cqda
vulnerability_id VCID-t6vp-xgs3-cqda
summary kernel: igb: Fix igb_down hung on surprise removal
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53148.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53148.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53148
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03613
published_at 2026-04-02T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03629
published_at 2026-04-04T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03638
published_at 2026-04-07T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.0364
published_at 2026-04-08T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03661
published_at 2026-04-09T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03497
published_at 2026-04-11T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03469
published_at 2026-04-12T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03444
published_at 2026-04-13T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03417
published_at 2026-04-16T12:55:00Z
9
value 0.00016
scoring_system epss
scoring_elements 0.03428
published_at 2026-04-18T12:55:00Z
10
value 0.00016
scoring_system epss
scoring_elements 0.03548
published_at 2026-04-21T12:55:00Z
11
value 0.00016
scoring_system epss
scoring_elements 0.03556
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53148
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53148
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53148
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2395231
reference_id 2395231
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2395231
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53148
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t6vp-xgs3-cqda
122
url VCID-t976-sdzs-jybn
vulnerability_id VCID-t976-sdzs-jybn
summary kernel: ACPI: processor: Check for null return of devm_kzalloc() in fch_misc_setup()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53483.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53483.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53483
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01826
published_at 2026-04-02T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01838
published_at 2026-04-04T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.0184
published_at 2026-04-07T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01843
published_at 2026-04-08T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01857
published_at 2026-04-09T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01844
published_at 2026-04-11T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01829
published_at 2026-04-12T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.01824
published_at 2026-04-13T12:55:00Z
8
value 0.00012
scoring_system epss
scoring_elements 0.01807
published_at 2026-04-16T12:55:00Z
9
value 0.00012
scoring_system epss
scoring_elements 0.01806
published_at 2026-04-18T12:55:00Z
10
value 0.00012
scoring_system epss
scoring_elements 0.01887
published_at 2026-04-21T12:55:00Z
11
value 0.00012
scoring_system epss
scoring_elements 0.0188
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53483
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2400788
reference_id 2400788
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2400788
4
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
5
reference_url https://access.redhat.com/errata/RHSA-2024:9315
reference_id RHSA-2024:9315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9315
fixed_packages
aliases CVE-2023-53483
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t976-sdzs-jybn
123
url VCID-tcr1-maek-3qed
vulnerability_id VCID-tcr1-maek-3qed
summary kernel: use-after-free in read in vt_do_kdgkb_ioctl
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25656.json
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25656.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25656
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01337
published_at 2026-04-01T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01347
published_at 2026-04-02T12:55:00Z
2
value 0.00011
scoring_system epss
scoring_elements 0.01353
published_at 2026-04-04T12:55:00Z
3
value 0.00011
scoring_system epss
scoring_elements 0.01362
published_at 2026-04-07T12:55:00Z
4
value 0.00011
scoring_system epss
scoring_elements 0.01367
published_at 2026-04-08T12:55:00Z
5
value 0.00011
scoring_system epss
scoring_elements 0.01366
published_at 2026-04-09T12:55:00Z
6
value 0.00011
scoring_system epss
scoring_elements 0.01355
published_at 2026-04-11T12:55:00Z
7
value 0.00011
scoring_system epss
scoring_elements 0.0135
published_at 2026-04-12T12:55:00Z
8
value 0.00011
scoring_system epss
scoring_elements 0.01351
published_at 2026-04-13T12:55:00Z
9
value 0.00019
scoring_system epss
scoring_elements 0.05047
published_at 2026-04-24T12:55:00Z
10
value 0.00019
scoring_system epss
scoring_elements 0.04863
published_at 2026-04-16T12:55:00Z
11
value 0.00019
scoring_system epss
scoring_elements 0.04871
published_at 2026-04-18T12:55:00Z
12
value 0.00019
scoring_system epss
scoring_elements 0.05017
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25656
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25656
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1888726
reference_id 1888726
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1888726
5
reference_url https://access.redhat.com/errata/RHSA-2021:0856
reference_id RHSA-2021:0856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0856
6
reference_url https://access.redhat.com/errata/RHSA-2021:0857
reference_id RHSA-2021:0857
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0857
7
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
8
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
9
reference_url https://usn.ubuntu.com/4679-1/
reference_id USN-4679-1
reference_type
scores
url https://usn.ubuntu.com/4679-1/
10
reference_url https://usn.ubuntu.com/4680-1/
reference_id USN-4680-1
reference_type
scores
url https://usn.ubuntu.com/4680-1/
11
reference_url https://usn.ubuntu.com/4681-1/
reference_id USN-4681-1
reference_type
scores
url https://usn.ubuntu.com/4681-1/
12
reference_url https://usn.ubuntu.com/4751-1/
reference_id USN-4751-1
reference_type
scores
url https://usn.ubuntu.com/4751-1/
fixed_packages
aliases CVE-2020-25656
risk_score 1.9
exploitability 0.5
weighted_severity 3.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tcr1-maek-3qed
124
url VCID-tm9p-gvrt-yqa3
vulnerability_id VCID-tm9p-gvrt-yqa3
summary kernel: igc: Fix Kernel Panic during ndo_tx_timeout callback
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54166.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54166.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-54166
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07346
published_at 2026-04-02T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.0739
published_at 2026-04-04T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.07372
published_at 2026-04-07T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07427
published_at 2026-04-08T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.07451
published_at 2026-04-09T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.07437
published_at 2026-04-11T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.07424
published_at 2026-04-12T12:55:00Z
7
value 0.00026
scoring_system epss
scoring_elements 0.07413
published_at 2026-04-13T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.07341
published_at 2026-04-16T12:55:00Z
9
value 0.00026
scoring_system epss
scoring_elements 0.07329
published_at 2026-04-18T12:55:00Z
10
value 0.00026
scoring_system epss
scoring_elements 0.07456
published_at 2026-04-21T12:55:00Z
11
value 0.00026
scoring_system epss
scoring_elements 0.07417
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-54166
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2426051
reference_id 2426051
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2426051
4
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
5
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-54166
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tm9p-gvrt-yqa3
125
url VCID-tsrm-wf4b-yydy
vulnerability_id VCID-tsrm-wf4b-yydy
summary kernel: jbd2: fix assertion 'jh->b_frozen_data == NULL' failure when journal aborted
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50126.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50126.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50126
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03716
published_at 2026-04-02T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03743
published_at 2026-04-04T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03757
published_at 2026-04-07T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.0376
published_at 2026-04-08T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03784
published_at 2026-04-09T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03744
published_at 2026-04-11T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03722
published_at 2026-04-12T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03696
published_at 2026-04-13T12:55:00Z
8
value 0.00043
scoring_system epss
scoring_elements 0.13297
published_at 2026-04-24T12:55:00Z
9
value 0.00043
scoring_system epss
scoring_elements 0.1321
published_at 2026-04-16T12:55:00Z
10
value 0.00043
scoring_system epss
scoring_elements 0.13209
published_at 2026-04-18T12:55:00Z
11
value 0.00043
scoring_system epss
scoring_elements 0.1329
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50126
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50126
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50126
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373442
reference_id 2373442
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373442
5
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2022-50126
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tsrm-wf4b-yydy
126
url VCID-tt8d-32cv-kuc9
vulnerability_id VCID-tt8d-32cv-kuc9
summary kernel: iw_cxgb4: Fix potential NULL dereference in c4iw_fill_res_cm_id_entry()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53476.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53476.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53476
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03188
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03198
published_at 2026-04-04T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03201
published_at 2026-04-07T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03205
published_at 2026-04-08T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03231
published_at 2026-04-09T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03185
published_at 2026-04-11T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.03158
published_at 2026-04-12T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03142
published_at 2026-04-13T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.03116
published_at 2026-04-16T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03123
published_at 2026-04-18T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03242
published_at 2026-04-21T12:55:00Z
11
value 0.00015
scoring_system epss
scoring_elements 0.03243
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53476
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53476
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2400821
reference_id 2400821
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2400821
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53476
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tt8d-32cv-kuc9
127
url VCID-u2wy-4dp3-nubj
vulnerability_id VCID-u2wy-4dp3-nubj
summary kernel: HID: intel-ish-hid: Fix kernel panic during warm reset
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53392.json
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53392.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53392
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01854
published_at 2026-04-12T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01866
published_at 2026-04-04T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01868
published_at 2026-04-07T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01871
published_at 2026-04-08T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01884
published_at 2026-04-09T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.0187
published_at 2026-04-11T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01849
published_at 2026-04-13T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02592
published_at 2026-04-24T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02494
published_at 2026-04-16T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02499
published_at 2026-04-18T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02606
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53392
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2396427
reference_id 2396427
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2396427
4
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
5
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53392
risk_score 1.9
exploitability 0.5
weighted_severity 3.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u2wy-4dp3-nubj
128
url VCID-uakf-nme4-nufu
vulnerability_id VCID-uakf-nme4-nufu
summary kernel: use-after-free in net/atm/ioctl.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51780.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51780.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-51780
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.05826
published_at 2026-04-02T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.05861
published_at 2026-04-04T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.05855
published_at 2026-04-07T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.05893
published_at 2026-04-12T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.05924
published_at 2026-04-09T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.05903
published_at 2026-04-11T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.05886
published_at 2026-04-13T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.0585
published_at 2026-04-16T12:55:00Z
8
value 0.00022
scoring_system epss
scoring_elements 0.05862
published_at 2026-04-18T12:55:00Z
9
value 0.00022
scoring_system epss
scoring_elements 0.06015
published_at 2026-04-21T12:55:00Z
10
value 0.00022
scoring_system epss
scoring_elements 0.06046
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-51780
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257682
reference_id 2257682
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2257682
22
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
23
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
24
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
25
reference_url https://usn.ubuntu.com/6639-1/
reference_id USN-6639-1
reference_type
scores
url https://usn.ubuntu.com/6639-1/
26
reference_url https://usn.ubuntu.com/6646-1/
reference_id USN-6646-1
reference_type
scores
url https://usn.ubuntu.com/6646-1/
27
reference_url https://usn.ubuntu.com/6647-1/
reference_id USN-6647-1
reference_type
scores
url https://usn.ubuntu.com/6647-1/
28
reference_url https://usn.ubuntu.com/6647-2/
reference_id USN-6647-2
reference_type
scores
url https://usn.ubuntu.com/6647-2/
29
reference_url https://usn.ubuntu.com/6651-1/
reference_id USN-6651-1
reference_type
scores
url https://usn.ubuntu.com/6651-1/
30
reference_url https://usn.ubuntu.com/6651-2/
reference_id USN-6651-2
reference_type
scores
url https://usn.ubuntu.com/6651-2/
31
reference_url https://usn.ubuntu.com/6651-3/
reference_id USN-6651-3
reference_type
scores
url https://usn.ubuntu.com/6651-3/
32
reference_url https://usn.ubuntu.com/6652-1/
reference_id USN-6652-1
reference_type
scores
url https://usn.ubuntu.com/6652-1/
33
reference_url https://usn.ubuntu.com/6653-1/
reference_id USN-6653-1
reference_type
scores
url https://usn.ubuntu.com/6653-1/
34
reference_url https://usn.ubuntu.com/6653-2/
reference_id USN-6653-2
reference_type
scores
url https://usn.ubuntu.com/6653-2/
35
reference_url https://usn.ubuntu.com/6653-3/
reference_id USN-6653-3
reference_type
scores
url https://usn.ubuntu.com/6653-3/
36
reference_url https://usn.ubuntu.com/6653-4/
reference_id USN-6653-4
reference_type
scores
url https://usn.ubuntu.com/6653-4/
37
reference_url https://usn.ubuntu.com/6681-1/
reference_id USN-6681-1
reference_type
scores
url https://usn.ubuntu.com/6681-1/
38
reference_url https://usn.ubuntu.com/6681-2/
reference_id USN-6681-2
reference_type
scores
url https://usn.ubuntu.com/6681-2/
39
reference_url https://usn.ubuntu.com/6681-3/
reference_id USN-6681-3
reference_type
scores
url https://usn.ubuntu.com/6681-3/
40
reference_url https://usn.ubuntu.com/6681-4/
reference_id USN-6681-4
reference_type
scores
url https://usn.ubuntu.com/6681-4/
41
reference_url https://usn.ubuntu.com/6716-1/
reference_id USN-6716-1
reference_type
scores
url https://usn.ubuntu.com/6716-1/
fixed_packages
aliases CVE-2023-51780
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uakf-nme4-nufu
129
url VCID-upx2-tk53-pyb1
vulnerability_id VCID-upx2-tk53-pyb1
summary kernel: RDMA/srpt: Add a check for valid 'mad_agent' pointer
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54274.json
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54274.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-54274
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10911
published_at 2026-04-02T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10975
published_at 2026-04-04T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.108
published_at 2026-04-07T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10876
published_at 2026-04-08T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10929
published_at 2026-04-09T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.1093
published_at 2026-04-11T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10897
published_at 2026-04-12T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10874
published_at 2026-04-21T12:55:00Z
8
value 0.00036
scoring_system epss
scoring_elements 0.10734
published_at 2026-04-16T12:55:00Z
9
value 0.00036
scoring_system epss
scoring_elements 0.10747
published_at 2026-04-18T12:55:00Z
10
value 0.00036
scoring_system epss
scoring_elements 0.10834
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-54274
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54274
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54274
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2426026
reference_id 2426026
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2426026
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-54274
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-upx2-tk53-pyb1
130
url VCID-uv78-72se-9uaw
vulnerability_id VCID-uv78-72se-9uaw
summary kernel: scsi: target: iscsit: Free cmds before session free
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54184.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54184.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-54184
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10911
published_at 2026-04-02T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10975
published_at 2026-04-04T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.108
published_at 2026-04-07T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10876
published_at 2026-04-08T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10929
published_at 2026-04-09T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.1093
published_at 2026-04-11T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10897
published_at 2026-04-12T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10874
published_at 2026-04-21T12:55:00Z
8
value 0.00036
scoring_system epss
scoring_elements 0.10734
published_at 2026-04-16T12:55:00Z
9
value 0.00036
scoring_system epss
scoring_elements 0.10747
published_at 2026-04-18T12:55:00Z
10
value 0.00036
scoring_system epss
scoring_elements 0.10834
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-54184
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54184
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2426090
reference_id 2426090
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2426090
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-54184
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uv78-72se-9uaw
131
url VCID-v7gh-5ztd-wufc
vulnerability_id VCID-v7gh-5ztd-wufc
summary kernel: bonding: restore bond's IFF_SLAVE flag if a non-eth dev enslave fails
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53103.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53103.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53103
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20248
published_at 2026-04-02T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20306
published_at 2026-04-04T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.2003
published_at 2026-04-07T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.2011
published_at 2026-04-08T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.20168
published_at 2026-04-09T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.20193
published_at 2026-04-11T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.20149
published_at 2026-04-12T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.2009
published_at 2026-04-13T12:55:00Z
8
value 0.00065
scoring_system epss
scoring_elements 0.20082
published_at 2026-04-16T12:55:00Z
9
value 0.00065
scoring_system epss
scoring_elements 0.20086
published_at 2026-04-18T12:55:00Z
10
value 0.00065
scoring_system epss
scoring_elements 0.20084
published_at 2026-04-21T12:55:00Z
11
value 0.00065
scoring_system epss
scoring_elements 0.19968
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53103
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53103
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53103
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2363728
reference_id 2363728
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2363728
5
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53103
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v7gh-5ztd-wufc
132
url VCID-v9uq-1unx-mug6
vulnerability_id VCID-v9uq-1unx-mug6
summary kernel: bpf: cpumap: Fix memory leak in cpu_map_update_elem
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53441.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53441.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53441
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03188
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03198
published_at 2026-04-04T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03201
published_at 2026-04-07T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03205
published_at 2026-04-08T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03231
published_at 2026-04-09T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03185
published_at 2026-04-11T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.03158
published_at 2026-04-12T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03142
published_at 2026-04-13T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.04377
published_at 2026-04-24T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.04227
published_at 2026-04-16T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.04236
published_at 2026-04-18T12:55:00Z
11
value 0.00017
scoring_system epss
scoring_elements 0.04362
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53441
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53441
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2396508
reference_id 2396508
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2396508
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53441
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v9uq-1unx-mug6
133
url VCID-va52-3n1k-vugn
vulnerability_id VCID-va52-3n1k-vugn
summary kernel: ext4: fix null-ptr-deref in ext4_write_info
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50344.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50344.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50344
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.02191
published_at 2026-04-08T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02129
published_at 2026-04-24T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.02195
published_at 2026-04-04T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02189
published_at 2026-04-07T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02212
published_at 2026-04-09T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02188
published_at 2026-04-11T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02093
published_at 2026-04-12T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02089
published_at 2026-04-13T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.02063
published_at 2026-04-16T12:55:00Z
9
value 0.00013
scoring_system epss
scoring_elements 0.02075
published_at 2026-04-18T12:55:00Z
10
value 0.00013
scoring_system epss
scoring_elements 0.02161
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50344
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50344
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2395860
reference_id 2395860
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2395860
5
reference_url https://git.kernel.org/stable/c/3638aa1c7d87c0ca0aef23cf58cae2c48e7daca4
reference_id 3638aa1c7d87c0ca0aef23cf58cae2c48e7daca4
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:20:39Z/
url https://git.kernel.org/stable/c/3638aa1c7d87c0ca0aef23cf58cae2c48e7daca4
6
reference_url https://git.kernel.org/stable/c/4a657319cfabd6199fd0b7b65bbebf6ded7a11c1
reference_id 4a657319cfabd6199fd0b7b65bbebf6ded7a11c1
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:20:39Z/
url https://git.kernel.org/stable/c/4a657319cfabd6199fd0b7b65bbebf6ded7a11c1
7
reference_url https://git.kernel.org/stable/c/533c60a0b97cee5daab376933f486207e6680fb7
reference_id 533c60a0b97cee5daab376933f486207e6680fb7
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:20:39Z/
url https://git.kernel.org/stable/c/533c60a0b97cee5daab376933f486207e6680fb7
8
reference_url https://git.kernel.org/stable/c/947264e00c46de19a016fd81218118c708fed2f3
reference_id 947264e00c46de19a016fd81218118c708fed2f3
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:20:39Z/
url https://git.kernel.org/stable/c/947264e00c46de19a016fd81218118c708fed2f3
9
reference_url https://git.kernel.org/stable/c/bb420e8afc854d2a1caaa23a0c129839acfb7888
reference_id bb420e8afc854d2a1caaa23a0c129839acfb7888
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:20:39Z/
url https://git.kernel.org/stable/c/bb420e8afc854d2a1caaa23a0c129839acfb7888
10
reference_url https://git.kernel.org/stable/c/dc451578446afd03c0c21913993c08898a691435
reference_id dc451578446afd03c0c21913993c08898a691435
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:20:39Z/
url https://git.kernel.org/stable/c/dc451578446afd03c0c21913993c08898a691435
11
reference_url https://git.kernel.org/stable/c/f34ab95162763cd7352f46df169296eec28b688d
reference_id f34ab95162763cd7352f46df169296eec28b688d
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:20:39Z/
url https://git.kernel.org/stable/c/f34ab95162763cd7352f46df169296eec28b688d
12
reference_url https://git.kernel.org/stable/c/f4b5ff0b794aa94afac7269c494550ca2f66511b
reference_id f4b5ff0b794aa94afac7269c494550ca2f66511b
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:20:39Z/
url https://git.kernel.org/stable/c/f4b5ff0b794aa94afac7269c494550ca2f66511b
13
reference_url https://git.kernel.org/stable/c/f9c1f248607d5546075d3f731e7607d5571f2b60
reference_id f9c1f248607d5546075d3f731e7607d5571f2b60
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:20:39Z/
url https://git.kernel.org/stable/c/f9c1f248607d5546075d3f731e7607d5571f2b60
14
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
15
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2022-50344
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-va52-3n1k-vugn
134
url VCID-vjuw-dju4-97cj
vulnerability_id VCID-vjuw-dju4-97cj
summary kernel: netfilter: xtables sctp out-of-bounds read in match_flags()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39193.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39193.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39193
reference_id
reference_type
scores
0
value 8e-05
scoring_system epss
scoring_elements 0.0082
published_at 2026-04-24T12:55:00Z
1
value 8e-05
scoring_system epss
scoring_elements 0.00693
published_at 2026-04-02T12:55:00Z
2
value 8e-05
scoring_system epss
scoring_elements 0.00679
published_at 2026-04-11T12:55:00Z
3
value 8e-05
scoring_system epss
scoring_elements 0.00672
published_at 2026-04-13T12:55:00Z
4
value 8e-05
scoring_system epss
scoring_elements 0.00666
published_at 2026-04-16T12:55:00Z
5
value 8e-05
scoring_system epss
scoring_elements 0.0067
published_at 2026-04-18T12:55:00Z
6
value 8e-05
scoring_system epss
scoring_elements 0.00819
published_at 2026-04-21T12:55:00Z
7
value 8e-05
scoring_system epss
scoring_elements 0.00685
published_at 2026-04-04T12:55:00Z
8
value 8e-05
scoring_system epss
scoring_elements 0.00687
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39193
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39193
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2226787
reference_id 2226787
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-29T19:59:34Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2226787
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv
reference_id cpe:/a:redhat:enterprise_linux:8::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime
reference_id cpe:/a:redhat:enterprise_linux:8::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv
reference_id cpe:/a:redhat:enterprise_linux:9::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime
reference_id cpe:/a:redhat:enterprise_linux:9::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
17
reference_url https://access.redhat.com/security/cve/CVE-2023-39193
reference_id CVE-2023-39193
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-29T19:59:34Z/
url https://access.redhat.com/security/cve/CVE-2023-39193
18
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-29T19:59:34Z/
url https://access.redhat.com/errata/RHSA-2024:2394
19
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-29T19:59:34Z/
url https://access.redhat.com/errata/RHSA-2024:2950
20
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-29T19:59:34Z/
url https://access.redhat.com/errata/RHSA-2024:3138
21
reference_url https://usn.ubuntu.com/6494-1/
reference_id USN-6494-1
reference_type
scores
url https://usn.ubuntu.com/6494-1/
22
reference_url https://usn.ubuntu.com/6494-2/
reference_id USN-6494-2
reference_type
scores
url https://usn.ubuntu.com/6494-2/
23
reference_url https://usn.ubuntu.com/6532-1/
reference_id USN-6532-1
reference_type
scores
url https://usn.ubuntu.com/6532-1/
24
reference_url https://usn.ubuntu.com/6534-1/
reference_id USN-6534-1
reference_type
scores
url https://usn.ubuntu.com/6534-1/
25
reference_url https://usn.ubuntu.com/6534-2/
reference_id USN-6534-2
reference_type
scores
url https://usn.ubuntu.com/6534-2/
26
reference_url https://usn.ubuntu.com/6534-3/
reference_id USN-6534-3
reference_type
scores
url https://usn.ubuntu.com/6534-3/
27
reference_url https://usn.ubuntu.com/6548-1/
reference_id USN-6548-1
reference_type
scores
url https://usn.ubuntu.com/6548-1/
28
reference_url https://usn.ubuntu.com/6548-2/
reference_id USN-6548-2
reference_type
scores
url https://usn.ubuntu.com/6548-2/
29
reference_url https://usn.ubuntu.com/6548-3/
reference_id USN-6548-3
reference_type
scores
url https://usn.ubuntu.com/6548-3/
30
reference_url https://usn.ubuntu.com/6548-4/
reference_id USN-6548-4
reference_type
scores
url https://usn.ubuntu.com/6548-4/
31
reference_url https://usn.ubuntu.com/6548-5/
reference_id USN-6548-5
reference_type
scores
url https://usn.ubuntu.com/6548-5/
32
reference_url https://usn.ubuntu.com/6549-1/
reference_id USN-6549-1
reference_type
scores
url https://usn.ubuntu.com/6549-1/
33
reference_url https://usn.ubuntu.com/6549-2/
reference_id USN-6549-2
reference_type
scores
url https://usn.ubuntu.com/6549-2/
34
reference_url https://usn.ubuntu.com/6549-3/
reference_id USN-6549-3
reference_type
scores
url https://usn.ubuntu.com/6549-3/
35
reference_url https://usn.ubuntu.com/6549-4/
reference_id USN-6549-4
reference_type
scores
url https://usn.ubuntu.com/6549-4/
36
reference_url https://usn.ubuntu.com/6549-5/
reference_id USN-6549-5
reference_type
scores
url https://usn.ubuntu.com/6549-5/
37
reference_url https://usn.ubuntu.com/6635-1/
reference_id USN-6635-1
reference_type
scores
url https://usn.ubuntu.com/6635-1/
38
reference_url https://www.zerodayinitiative.com/advisories/ZDI-CAN-18866/
reference_id ZDI-CAN-18866
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-29T19:59:34Z/
url https://www.zerodayinitiative.com/advisories/ZDI-CAN-18866/
fixed_packages
aliases CVE-2023-39193
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vjuw-dju4-97cj
135
url VCID-wrhr-cgd4-4ycs
vulnerability_id VCID-wrhr-cgd4-4ycs
summary kernel: USB: usbtmc: Fix direction for 0-length ioctl control messages
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53761.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53761.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53761
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10975
published_at 2026-04-04T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.108
published_at 2026-04-07T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.10876
published_at 2026-04-08T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10911
published_at 2026-04-02T12:55:00Z
4
value 0.00047
scoring_system epss
scoring_elements 0.14383
published_at 2026-04-16T12:55:00Z
5
value 0.00047
scoring_system epss
scoring_elements 0.14384
published_at 2026-04-18T12:55:00Z
6
value 0.00047
scoring_system epss
scoring_elements 0.14454
published_at 2026-04-21T12:55:00Z
7
value 0.00047
scoring_system epss
scoring_elements 0.14487
published_at 2026-04-24T12:55:00Z
8
value 0.00047
scoring_system epss
scoring_elements 0.14628
published_at 2026-04-09T12:55:00Z
9
value 0.00047
scoring_system epss
scoring_elements 0.14588
published_at 2026-04-11T12:55:00Z
10
value 0.00047
scoring_system epss
scoring_elements 0.14549
published_at 2026-04-12T12:55:00Z
11
value 0.00047
scoring_system epss
scoring_elements 0.14491
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53761
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53761
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2419892
reference_id 2419892
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2419892
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53761
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wrhr-cgd4-4ycs
136
url VCID-wv8d-q36s-kyhh
vulnerability_id VCID-wv8d-q36s-kyhh
summary kernel: Linux kernel: Denial of Service via null pointer dereference in ACPI
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54010.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54010.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-54010
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10911
published_at 2026-04-02T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10975
published_at 2026-04-04T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.108
published_at 2026-04-07T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10876
published_at 2026-04-08T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10929
published_at 2026-04-09T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.1093
published_at 2026-04-11T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10897
published_at 2026-04-12T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10874
published_at 2026-04-21T12:55:00Z
8
value 0.00036
scoring_system epss
scoring_elements 0.10734
published_at 2026-04-16T12:55:00Z
9
value 0.00036
scoring_system epss
scoring_elements 0.10747
published_at 2026-04-18T12:55:00Z
10
value 0.00036
scoring_system epss
scoring_elements 0.10834
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-54010
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54010
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2424948
reference_id 2424948
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2424948
5
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
6
reference_url https://access.redhat.com/errata/RHSA-2024:9315
reference_id RHSA-2024:9315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9315
fixed_packages
aliases CVE-2023-54010
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wv8d-q36s-kyhh
137
url VCID-wvyb-y46r-rub3
vulnerability_id VCID-wvyb-y46r-rub3
summary kernel: irdma: Improper access control
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25775.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25775.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-25775
reference_id
reference_type
scores
0
value 0.00584
scoring_system epss
scoring_elements 0.6896
published_at 2026-04-07T12:55:00Z
1
value 0.00584
scoring_system epss
scoring_elements 0.6898
published_at 2026-04-04T12:55:00Z
2
value 0.00584
scoring_system epss
scoring_elements 0.6901
published_at 2026-04-08T12:55:00Z
3
value 0.00584
scoring_system epss
scoring_elements 0.6903
published_at 2026-04-09T12:55:00Z
4
value 0.00584
scoring_system epss
scoring_elements 0.69051
published_at 2026-04-11T12:55:00Z
5
value 0.00584
scoring_system epss
scoring_elements 0.69037
published_at 2026-04-21T12:55:00Z
6
value 0.00584
scoring_system epss
scoring_elements 0.69008
published_at 2026-04-13T12:55:00Z
7
value 0.00584
scoring_system epss
scoring_elements 0.69048
published_at 2026-04-16T12:55:00Z
8
value 0.00584
scoring_system epss
scoring_elements 0.69057
published_at 2026-04-18T12:55:00Z
9
value 0.00584
scoring_system epss
scoring_elements 0.69088
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-25775
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2231410
reference_id 2231410
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2231410
22
reference_url https://access.redhat.com/errata/RHSA-2024:2003
reference_id RHSA-2024:2003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2003
23
reference_url https://access.redhat.com/errata/RHSA-2024:2004
reference_id RHSA-2024:2004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2004
24
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
25
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
26
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
27
reference_url https://usn.ubuntu.com/6415-1/
reference_id USN-6415-1
reference_type
scores
url https://usn.ubuntu.com/6415-1/
28
reference_url https://usn.ubuntu.com/6496-1/
reference_id USN-6496-1
reference_type
scores
url https://usn.ubuntu.com/6496-1/
29
reference_url https://usn.ubuntu.com/6496-2/
reference_id USN-6496-2
reference_type
scores
url https://usn.ubuntu.com/6496-2/
30
reference_url https://usn.ubuntu.com/6502-1/
reference_id USN-6502-1
reference_type
scores
url https://usn.ubuntu.com/6502-1/
31
reference_url https://usn.ubuntu.com/6502-2/
reference_id USN-6502-2
reference_type
scores
url https://usn.ubuntu.com/6502-2/
32
reference_url https://usn.ubuntu.com/6502-3/
reference_id USN-6502-3
reference_type
scores
url https://usn.ubuntu.com/6502-3/
33
reference_url https://usn.ubuntu.com/6502-4/
reference_id USN-6502-4
reference_type
scores
url https://usn.ubuntu.com/6502-4/
34
reference_url https://usn.ubuntu.com/6516-1/
reference_id USN-6516-1
reference_type
scores
url https://usn.ubuntu.com/6516-1/
35
reference_url https://usn.ubuntu.com/6520-1/
reference_id USN-6520-1
reference_type
scores
url https://usn.ubuntu.com/6520-1/
fixed_packages
aliases CVE-2023-25775
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wvyb-y46r-rub3
138
url VCID-x537-rrdc-1qav
vulnerability_id VCID-x537-rrdc-1qav
summary kernel: Linux kernel igb driver: Denial of Service due to improper SR-IOV cleanup
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54070.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54070.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-54070
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07747
published_at 2026-04-02T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07792
published_at 2026-04-24T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07749
published_at 2026-04-07T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07809
published_at 2026-04-08T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07826
published_at 2026-04-09T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07821
published_at 2026-04-11T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07808
published_at 2026-04-12T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07794
published_at 2026-04-13T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07708
published_at 2026-04-16T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07684
published_at 2026-04-18T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07837
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-54070
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2425050
reference_id 2425050
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2425050
4
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
5
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-54070
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x537-rrdc-1qav
139
url VCID-x8jd-vket-qkec
vulnerability_id VCID-x8jd-vket-qkec
summary kernel: ipv6: Fix out-of-bounds access in ipv6_find_tlv()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53705.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53705.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53705
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.12252
published_at 2026-04-02T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.12297
published_at 2026-04-04T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.12095
published_at 2026-04-07T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.12177
published_at 2026-04-08T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.12228
published_at 2026-04-09T12:55:00Z
5
value 0.0004
scoring_system epss
scoring_elements 0.12236
published_at 2026-04-11T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.12199
published_at 2026-04-12T12:55:00Z
7
value 0.0004
scoring_system epss
scoring_elements 0.12163
published_at 2026-04-13T12:55:00Z
8
value 0.0004
scoring_system epss
scoring_elements 0.12033
published_at 2026-04-16T12:55:00Z
9
value 0.0004
scoring_system epss
scoring_elements 0.12035
published_at 2026-04-18T12:55:00Z
10
value 0.0004
scoring_system epss
scoring_elements 0.1215
published_at 2026-04-21T12:55:00Z
11
value 0.0004
scoring_system epss
scoring_elements 0.12126
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53705
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53705
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2405713
reference_id 2405713
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2405713
5
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
7
reference_url https://access.redhat.com/errata/RHSA-2026:0532
reference_id RHSA-2026:0532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0532
8
reference_url https://access.redhat.com/errata/RHSA-2026:0533
reference_id RHSA-2026:0533
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0533
9
reference_url https://access.redhat.com/errata/RHSA-2026:0537
reference_id RHSA-2026:0537
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0537
10
reference_url https://access.redhat.com/errata/RHSA-2026:0576
reference_id RHSA-2026:0576
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0576
11
reference_url https://access.redhat.com/errata/RHSA-2026:0754
reference_id RHSA-2026:0754
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0754
12
reference_url https://access.redhat.com/errata/RHSA-2026:0755
reference_id RHSA-2026:0755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0755
13
reference_url https://access.redhat.com/errata/RHSA-2026:1441
reference_id RHSA-2026:1441
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1441
14
reference_url https://access.redhat.com/errata/RHSA-2026:1442
reference_id RHSA-2026:1442
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1442
15
reference_url https://access.redhat.com/errata/RHSA-2026:1443
reference_id RHSA-2026:1443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1443
16
reference_url https://access.redhat.com/errata/RHSA-2026:1512
reference_id RHSA-2026:1512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1512
fixed_packages
aliases CVE-2023-53705
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x8jd-vket-qkec
140
url VCID-xbcy-wz8a-77ba
vulnerability_id VCID-xbcy-wz8a-77ba
summary kernel: Linux kernel: Information disclosure and denial of service via use-after-free in ACPI subsystem
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50423.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50423.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50423
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.027
published_at 2026-04-02T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02786
published_at 2026-04-24T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02714
published_at 2026-04-04T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02719
published_at 2026-04-07T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02722
published_at 2026-04-08T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02742
published_at 2026-04-09T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02713
published_at 2026-04-11T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02697
published_at 2026-04-12T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02694
published_at 2026-04-13T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02673
published_at 2026-04-16T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02681
published_at 2026-04-18T12:55:00Z
11
value 0.00014
scoring_system epss
scoring_elements 0.02795
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50423
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50423
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50423
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/01f2c2052ea50fb9a8ce12e4e83aed0267934ef0
reference_id 01f2c2052ea50fb9a8ce12e4e83aed0267934ef0
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T17:39:57Z/
url https://git.kernel.org/stable/c/01f2c2052ea50fb9a8ce12e4e83aed0267934ef0
5
reference_url https://git.kernel.org/stable/c/02617006b5a46f2ea55ac61f5693c7afd7bf9276
reference_id 02617006b5a46f2ea55ac61f5693c7afd7bf9276
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T17:39:57Z/
url https://git.kernel.org/stable/c/02617006b5a46f2ea55ac61f5693c7afd7bf9276
6
reference_url https://git.kernel.org/stable/c/02f237423c9c6a18e062de2d474f85d5659e4eb9
reference_id 02f237423c9c6a18e062de2d474f85d5659e4eb9
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T17:39:57Z/
url https://git.kernel.org/stable/c/02f237423c9c6a18e062de2d474f85d5659e4eb9
7
reference_url https://git.kernel.org/stable/c/133462d35dae95edb944af86b986d4c9dec59bd1
reference_id 133462d35dae95edb944af86b986d4c9dec59bd1
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T17:39:57Z/
url https://git.kernel.org/stable/c/133462d35dae95edb944af86b986d4c9dec59bd1
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2400780
reference_id 2400780
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2400780
9
reference_url https://git.kernel.org/stable/c/470188b09e92d83c5a997f25f0e8fb8cd2bc3469
reference_id 470188b09e92d83c5a997f25f0e8fb8cd2bc3469
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T17:39:57Z/
url https://git.kernel.org/stable/c/470188b09e92d83c5a997f25f0e8fb8cd2bc3469
10
reference_url https://git.kernel.org/stable/c/6fde666278f91b85d71545a0ebbf41d8d7af8074
reference_id 6fde666278f91b85d71545a0ebbf41d8d7af8074
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T17:39:57Z/
url https://git.kernel.org/stable/c/6fde666278f91b85d71545a0ebbf41d8d7af8074
11
reference_url https://git.kernel.org/stable/c/c9125b643fc51b8e662f2f614096ceb45a0adbc3
reference_id c9125b643fc51b8e662f2f614096ceb45a0adbc3
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T17:39:57Z/
url https://git.kernel.org/stable/c/c9125b643fc51b8e662f2f614096ceb45a0adbc3
12
reference_url https://git.kernel.org/stable/c/dfdde4d5138bc023897033a5ac653a84e94805be
reference_id dfdde4d5138bc023897033a5ac653a84e94805be
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T17:39:57Z/
url https://git.kernel.org/stable/c/dfdde4d5138bc023897033a5ac653a84e94805be
13
reference_url https://git.kernel.org/stable/c/f51b2235e4f320edc839c3e5cb0d1f8a6e8657c6
reference_id f51b2235e4f320edc839c3e5cb0d1f8a6e8657c6
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T17:39:57Z/
url https://git.kernel.org/stable/c/f51b2235e4f320edc839c3e5cb0d1f8a6e8657c6
14
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
15
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2022-50423
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xbcy-wz8a-77ba
141
url VCID-xewe-3q5z-wbfg
vulnerability_id VCID-xewe-3q5z-wbfg
summary kernel: PM: domains: fix memory leak with using debugfs_lookup()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53202.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53202.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53202
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04603
published_at 2026-04-02T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04627
published_at 2026-04-04T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04639
published_at 2026-04-07T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04673
published_at 2026-04-08T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04685
published_at 2026-04-09T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05697
published_at 2026-04-21T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05732
published_at 2026-04-24T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05594
published_at 2026-04-11T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05584
published_at 2026-04-12T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.05576
published_at 2026-04-13T12:55:00Z
10
value 0.00021
scoring_system epss
scoring_elements 0.05524
published_at 2026-04-16T12:55:00Z
11
value 0.00021
scoring_system epss
scoring_elements 0.05533
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53202
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2395326
reference_id 2395326
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2395326
4
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
5
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53202
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xewe-3q5z-wbfg
142
url VCID-xgun-w7s3-4key
vulnerability_id VCID-xgun-w7s3-4key
summary kernel: usb: host: Fix refcount leak in ehci_hcd_ppc_of_probe
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50153.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50153.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50153
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06259
published_at 2026-04-02T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06275
published_at 2026-04-07T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06321
published_at 2026-04-08T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06361
published_at 2026-04-09T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06353
published_at 2026-04-11T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06298
published_at 2026-04-04T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06348
published_at 2026-04-12T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06337
published_at 2026-04-13T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.19468
published_at 2026-04-24T12:55:00Z
9
value 0.00063
scoring_system epss
scoring_elements 0.19553
published_at 2026-04-16T12:55:00Z
10
value 0.00063
scoring_system epss
scoring_elements 0.1956
published_at 2026-04-18T12:55:00Z
11
value 0.00063
scoring_system epss
scoring_elements 0.19573
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50153
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50153
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373447
reference_id 2373447
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373447
5
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2022-50153
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xgun-w7s3-4key
143
url VCID-xvxa-rya9-c3gc
vulnerability_id VCID-xvxa-rya9-c3gc
summary kernel: ext4: fix deadlock due to mbcache entry corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50668.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50668.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50668
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10911
published_at 2026-04-02T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10975
published_at 2026-04-04T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.108
published_at 2026-04-07T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10876
published_at 2026-04-08T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10929
published_at 2026-04-09T12:55:00Z
5
value 0.00047
scoring_system epss
scoring_elements 0.14454
published_at 2026-04-21T12:55:00Z
6
value 0.00047
scoring_system epss
scoring_elements 0.14487
published_at 2026-04-24T12:55:00Z
7
value 0.00047
scoring_system epss
scoring_elements 0.14588
published_at 2026-04-11T12:55:00Z
8
value 0.00047
scoring_system epss
scoring_elements 0.14549
published_at 2026-04-12T12:55:00Z
9
value 0.00047
scoring_system epss
scoring_elements 0.14491
published_at 2026-04-13T12:55:00Z
10
value 0.00047
scoring_system epss
scoring_elements 0.14383
published_at 2026-04-16T12:55:00Z
11
value 0.00047
scoring_system epss
scoring_elements 0.14384
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50668
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50668
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2420350
reference_id 2420350
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2420350
5
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2022-50668
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xvxa-rya9-c3gc
144
url VCID-y5g5-grqv-cbhv
vulnerability_id VCID-y5g5-grqv-cbhv
summary kernel: NVMe: info leak due to out-of-bounds read in nvmet_ctrl_find_get
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6121.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6121.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6121
reference_id
reference_type
scores
0
value 0.00252
scoring_system epss
scoring_elements 0.48565
published_at 2026-04-21T12:55:00Z
1
value 0.00252
scoring_system epss
scoring_elements 0.4853
published_at 2026-04-02T12:55:00Z
2
value 0.00252
scoring_system epss
scoring_elements 0.48562
published_at 2026-04-13T12:55:00Z
3
value 0.00252
scoring_system epss
scoring_elements 0.48612
published_at 2026-04-16T12:55:00Z
4
value 0.00252
scoring_system epss
scoring_elements 0.48607
published_at 2026-04-18T12:55:00Z
5
value 0.00252
scoring_system epss
scoring_elements 0.48553
published_at 2026-04-04T12:55:00Z
6
value 0.00252
scoring_system epss
scoring_elements 0.48504
published_at 2026-04-07T12:55:00Z
7
value 0.00252
scoring_system epss
scoring_elements 0.48559
published_at 2026-04-08T12:55:00Z
8
value 0.00252
scoring_system epss
scoring_elements 0.48555
published_at 2026-04-09T12:55:00Z
9
value 0.00252
scoring_system epss
scoring_elements 0.48576
published_at 2026-04-11T12:55:00Z
10
value 0.00252
scoring_system epss
scoring_elements 0.48549
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6121
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2250043
reference_id 2250043
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-10T13:58:01Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2250043
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv
reference_id cpe:/a:redhat:enterprise_linux:8::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime
reference_id cpe:/a:redhat:enterprise_linux:8::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv
reference_id cpe:/a:redhat:enterprise_linux:9::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime
reference_id cpe:/a:redhat:enterprise_linux:9::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
34
reference_url https://access.redhat.com/security/cve/CVE-2023-6121
reference_id CVE-2023-6121
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-10T13:58:01Z/
url https://access.redhat.com/security/cve/CVE-2023-6121
35
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-10T13:58:01Z/
url https://access.redhat.com/errata/RHSA-2024:2394
36
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-10T13:58:01Z/
url https://access.redhat.com/errata/RHSA-2024:2950
37
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-10T13:58:01Z/
url https://access.redhat.com/errata/RHSA-2024:3138
38
reference_url https://usn.ubuntu.com/6639-1/
reference_id USN-6639-1
reference_type
scores
url https://usn.ubuntu.com/6639-1/
39
reference_url https://usn.ubuntu.com/6680-1/
reference_id USN-6680-1
reference_type
scores
url https://usn.ubuntu.com/6680-1/
40
reference_url https://usn.ubuntu.com/6680-2/
reference_id USN-6680-2
reference_type
scores
url https://usn.ubuntu.com/6680-2/
41
reference_url https://usn.ubuntu.com/6680-3/
reference_id USN-6680-3
reference_type
scores
url https://usn.ubuntu.com/6680-3/
42
reference_url https://usn.ubuntu.com/6681-1/
reference_id USN-6681-1
reference_type
scores
url https://usn.ubuntu.com/6681-1/
43
reference_url https://usn.ubuntu.com/6681-2/
reference_id USN-6681-2
reference_type
scores
url https://usn.ubuntu.com/6681-2/
44
reference_url https://usn.ubuntu.com/6681-3/
reference_id USN-6681-3
reference_type
scores
url https://usn.ubuntu.com/6681-3/
45
reference_url https://usn.ubuntu.com/6681-4/
reference_id USN-6681-4
reference_type
scores
url https://usn.ubuntu.com/6681-4/
46
reference_url https://usn.ubuntu.com/6686-1/
reference_id USN-6686-1
reference_type
scores
url https://usn.ubuntu.com/6686-1/
47
reference_url https://usn.ubuntu.com/6686-2/
reference_id USN-6686-2
reference_type
scores
url https://usn.ubuntu.com/6686-2/
48
reference_url https://usn.ubuntu.com/6686-3/
reference_id USN-6686-3
reference_type
scores
url https://usn.ubuntu.com/6686-3/
49
reference_url https://usn.ubuntu.com/6686-4/
reference_id USN-6686-4
reference_type
scores
url https://usn.ubuntu.com/6686-4/
50
reference_url https://usn.ubuntu.com/6686-5/
reference_id USN-6686-5
reference_type
scores
url https://usn.ubuntu.com/6686-5/
51
reference_url https://usn.ubuntu.com/6701-1/
reference_id USN-6701-1
reference_type
scores
url https://usn.ubuntu.com/6701-1/
52
reference_url https://usn.ubuntu.com/6701-2/
reference_id USN-6701-2
reference_type
scores
url https://usn.ubuntu.com/6701-2/
53
reference_url https://usn.ubuntu.com/6701-3/
reference_id USN-6701-3
reference_type
scores
url https://usn.ubuntu.com/6701-3/
54
reference_url https://usn.ubuntu.com/6701-4/
reference_id USN-6701-4
reference_type
scores
url https://usn.ubuntu.com/6701-4/
55
reference_url https://usn.ubuntu.com/6705-1/
reference_id USN-6705-1
reference_type
scores
url https://usn.ubuntu.com/6705-1/
56
reference_url https://usn.ubuntu.com/6716-1/
reference_id USN-6716-1
reference_type
scores
url https://usn.ubuntu.com/6716-1/
fixed_packages
aliases CVE-2023-6121
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y5g5-grqv-cbhv
145
url VCID-y5ww-vmwk-k3dr
vulnerability_id VCID-y5ww-vmwk-k3dr
summary kernel: Linux kernel UDPLITE: Denial of Service via null pointer dereference
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54004.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54004.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-54004
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10911
published_at 2026-04-02T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10975
published_at 2026-04-04T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.108
published_at 2026-04-07T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10876
published_at 2026-04-08T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10929
published_at 2026-04-09T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.1093
published_at 2026-04-11T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10897
published_at 2026-04-12T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10874
published_at 2026-04-21T12:55:00Z
8
value 0.00036
scoring_system epss
scoring_elements 0.10734
published_at 2026-04-16T12:55:00Z
9
value 0.00036
scoring_system epss
scoring_elements 0.10747
published_at 2026-04-18T12:55:00Z
10
value 0.00036
scoring_system epss
scoring_elements 0.10834
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-54004
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54004
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2424964
reference_id 2424964
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2424964
5
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-54004
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y5ww-vmwk-k3dr
146
url VCID-y7h4-s9p8-d3hd
vulnerability_id VCID-y7h4-s9p8-d3hd
summary kernel: scsi: qla2xxx: Fix potential NULL pointer dereference
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53451.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53451.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53451
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.02951
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.02965
published_at 2026-04-04T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.02973
published_at 2026-04-07T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.02975
published_at 2026-04-08T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03
published_at 2026-04-09T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.0296
published_at 2026-04-11T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.02937
published_at 2026-04-12T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.02927
published_at 2026-04-13T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.02902
published_at 2026-04-16T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.02912
published_at 2026-04-18T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03029
published_at 2026-04-21T12:55:00Z
11
value 0.00015
scoring_system epss
scoring_elements 0.03027
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53451
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53451
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2400701
reference_id 2400701
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2400701
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53451
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y7h4-s9p8-d3hd
147
url VCID-y9vh-w3k6-ebgu
vulnerability_id VCID-y9vh-w3k6-ebgu
summary kernel: netfilter: xtables out-of-bounds read in u32_match_it()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39192.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39192.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39192
reference_id
reference_type
scores
0
value 9e-05
scoring_system epss
scoring_elements 0.01022
published_at 2026-04-24T12:55:00Z
1
value 9e-05
scoring_system epss
scoring_elements 0.0096
published_at 2026-04-04T12:55:00Z
2
value 9e-05
scoring_system epss
scoring_elements 0.00821
published_at 2026-04-11T12:55:00Z
3
value 9e-05
scoring_system epss
scoring_elements 0.00815
published_at 2026-04-12T12:55:00Z
4
value 9e-05
scoring_system epss
scoring_elements 0.00816
published_at 2026-04-16T12:55:00Z
5
value 9e-05
scoring_system epss
scoring_elements 0.0082
published_at 2026-04-18T12:55:00Z
6
value 9e-05
scoring_system epss
scoring_elements 0.01021
published_at 2026-04-21T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.0083
published_at 2026-04-07T12:55:00Z
8
value 9e-05
scoring_system epss
scoring_elements 0.00834
published_at 2026-04-08T12:55:00Z
9
value 9e-05
scoring_system epss
scoring_elements 0.00832
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39192
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39192
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39192
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2226784
reference_id 2226784
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-13T19:47:59Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2226784
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv
reference_id cpe:/a:redhat:enterprise_linux:8::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime
reference_id cpe:/a:redhat:enterprise_linux:8::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
12
reference_url https://access.redhat.com/security/cve/CVE-2023-39192
reference_id CVE-2023-39192
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-13T19:47:59Z/
url https://access.redhat.com/security/cve/CVE-2023-39192
13
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-13T19:47:59Z/
url https://access.redhat.com/errata/RHSA-2024:2950
14
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-13T19:47:59Z/
url https://access.redhat.com/errata/RHSA-2024:3138
15
reference_url https://usn.ubuntu.com/6494-1/
reference_id USN-6494-1
reference_type
scores
url https://usn.ubuntu.com/6494-1/
16
reference_url https://usn.ubuntu.com/6494-2/
reference_id USN-6494-2
reference_type
scores
url https://usn.ubuntu.com/6494-2/
17
reference_url https://usn.ubuntu.com/6532-1/
reference_id USN-6532-1
reference_type
scores
url https://usn.ubuntu.com/6532-1/
18
reference_url https://usn.ubuntu.com/6534-1/
reference_id USN-6534-1
reference_type
scores
url https://usn.ubuntu.com/6534-1/
19
reference_url https://usn.ubuntu.com/6534-2/
reference_id USN-6534-2
reference_type
scores
url https://usn.ubuntu.com/6534-2/
20
reference_url https://usn.ubuntu.com/6534-3/
reference_id USN-6534-3
reference_type
scores
url https://usn.ubuntu.com/6534-3/
21
reference_url https://usn.ubuntu.com/6548-1/
reference_id USN-6548-1
reference_type
scores
url https://usn.ubuntu.com/6548-1/
22
reference_url https://usn.ubuntu.com/6548-2/
reference_id USN-6548-2
reference_type
scores
url https://usn.ubuntu.com/6548-2/
23
reference_url https://usn.ubuntu.com/6548-3/
reference_id USN-6548-3
reference_type
scores
url https://usn.ubuntu.com/6548-3/
24
reference_url https://usn.ubuntu.com/6548-4/
reference_id USN-6548-4
reference_type
scores
url https://usn.ubuntu.com/6548-4/
25
reference_url https://usn.ubuntu.com/6548-5/
reference_id USN-6548-5
reference_type
scores
url https://usn.ubuntu.com/6548-5/
26
reference_url https://usn.ubuntu.com/6549-1/
reference_id USN-6549-1
reference_type
scores
url https://usn.ubuntu.com/6549-1/
27
reference_url https://usn.ubuntu.com/6549-2/
reference_id USN-6549-2
reference_type
scores
url https://usn.ubuntu.com/6549-2/
28
reference_url https://usn.ubuntu.com/6549-3/
reference_id USN-6549-3
reference_type
scores
url https://usn.ubuntu.com/6549-3/
29
reference_url https://usn.ubuntu.com/6549-4/
reference_id USN-6549-4
reference_type
scores
url https://usn.ubuntu.com/6549-4/
30
reference_url https://usn.ubuntu.com/6549-5/
reference_id USN-6549-5
reference_type
scores
url https://usn.ubuntu.com/6549-5/
31
reference_url https://usn.ubuntu.com/6635-1/
reference_id USN-6635-1
reference_type
scores
url https://usn.ubuntu.com/6635-1/
32
reference_url https://www.zerodayinitiative.com/advisories/ZDI-CAN-18408/
reference_id ZDI-CAN-18408
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-13T19:47:59Z/
url https://www.zerodayinitiative.com/advisories/ZDI-CAN-18408/
fixed_packages
aliases CVE-2023-39192
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y9vh-w3k6-ebgu
148
url VCID-yaps-gywk-auaf
vulnerability_id VCID-yaps-gywk-auaf
summary kernel: blk-mq: fix IO hang from sbitmap wakeup race
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26671.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26671.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-26671
reference_id
reference_type
scores
0
value 9e-05
scoring_system epss
scoring_elements 0.01018
published_at 2026-04-24T12:55:00Z
1
value 9e-05
scoring_system epss
scoring_elements 0.0097
published_at 2026-04-04T12:55:00Z
2
value 9e-05
scoring_system epss
scoring_elements 0.00978
published_at 2026-04-07T12:55:00Z
3
value 9e-05
scoring_system epss
scoring_elements 0.00983
published_at 2026-04-08T12:55:00Z
4
value 9e-05
scoring_system epss
scoring_elements 0.00979
published_at 2026-04-09T12:55:00Z
5
value 9e-05
scoring_system epss
scoring_elements 0.00964
published_at 2026-04-11T12:55:00Z
6
value 9e-05
scoring_system epss
scoring_elements 0.00958
published_at 2026-04-13T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.00955
published_at 2026-04-16T12:55:00Z
8
value 9e-05
scoring_system epss
scoring_elements 0.00962
published_at 2026-04-18T12:55:00Z
9
value 9e-05
scoring_system epss
scoring_elements 0.01017
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-26671
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47233
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47233
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52429
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52429
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52434
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52435
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52458
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52458
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52482
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52486
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52489
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52491
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52492
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52493
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52498
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52587
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52587
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52594
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52595
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52597
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52598
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52599
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52600
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52601
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52602
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52603
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52604
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52606
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52615
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52616
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52617
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52618
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52619
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52622
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52623
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52627
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52627
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52635
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52637
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52642
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0340
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0607
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1151
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23849
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851
58
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24857
59
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24858
60
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24861
61
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26581
62
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26593
63
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26600
64
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601
65
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602
66
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26606
67
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26610
68
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614
69
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615
70
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26622
71
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26625
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26625
72
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26627
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26627
73
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26635
74
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26636
75
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26640
76
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641
77
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642
78
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643
79
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26644
80
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26645
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26645
81
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651
82
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26654
83
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26659
84
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663
85
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26664
86
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26665
87
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26671
88
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26673
89
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675
90
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26679
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26679
91
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26684
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26684
92
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26685
93
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26687
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26687
94
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688
95
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689
96
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26695
97
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26696
98
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26697
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26697
99
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26698
100
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26702
101
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704
102
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26707
103
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26712
104
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26722
105
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26727
106
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733
107
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735
108
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26736
109
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743
110
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744
111
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747
112
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26748
113
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26749
114
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26751
115
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26752
116
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26753
117
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754
118
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763
119
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764
120
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766
121
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771
122
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772
123
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773
124
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26776
125
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777
126
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778
127
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779
128
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26781
129
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782
130
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26787
131
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26788
132
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26790
133
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791
134
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793
135
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26795
136
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801
137
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804
138
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805
139
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26808
140
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26809
141
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26810
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26810
142
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26812
143
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26813
144
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26814
145
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816
146
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817
147
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26820
148
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26825
149
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26833
150
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26835
151
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839
152
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840
153
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26843
154
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26845
155
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26846
156
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26851
157
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852
158
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855
159
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857
160
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859
161
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26861
162
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26862
163
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863
164
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26870
165
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26872
166
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26874
167
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26875
168
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26877
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26877
169
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878
170
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26880
171
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26882
172
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883
173
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884
174
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885
175
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889
176
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891
177
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26894
178
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26895
179
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26897
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26897
180
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898
181
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901
182
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903
183
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906
184
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907
185
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26910
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26910
186
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26917
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26917
187
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922
188
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923
189
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26924
190
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925
191
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26926
192
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931
193
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26934
194
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935
195
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26937
196
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26950
197
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26951
198
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26955
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26955
199
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26956
200
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26957
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26957
201
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26958
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26958
202
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960
203
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961
204
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26965
205
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26966
206
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26969
207
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26970
208
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26973
209
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974
210
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976
211
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26978
212
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26981
213
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26984
214
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26988
215
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993
216
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26994
217
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26997
218
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26999
219
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27000
220
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27001
221
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27004
222
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008
223
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013
224
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020
225
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27024
226
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27025
227
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27028
228
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27030
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27030
229
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27038
230
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043
231
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27044
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27044
232
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27045
233
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046
234
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27047
235
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051
236
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27052
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27052
237
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27053
238
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27059
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27059
239
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065
240
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073
241
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074
242
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075
243
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27076
244
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27077
245
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078
246
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388
247
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437
248
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
249
reference_url https://git.kernel.org/stable/c/1d9c777d3e70bdc57dddf7a14a80059d65919e56
reference_id 1d9c777d3e70bdc57dddf7a14a80059d65919e56
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:53:32Z/
url https://git.kernel.org/stable/c/1d9c777d3e70bdc57dddf7a14a80059d65919e56
250
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2272811
reference_id 2272811
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2272811
251
reference_url https://git.kernel.org/stable/c/5266caaf5660529e3da53004b8b7174cab6374ed
reference_id 5266caaf5660529e3da53004b8b7174cab6374ed
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:53:32Z/
url https://git.kernel.org/stable/c/5266caaf5660529e3da53004b8b7174cab6374ed
252
reference_url https://git.kernel.org/stable/c/6d8b01624a2540336a32be91f25187a433af53a0
reference_id 6d8b01624a2540336a32be91f25187a433af53a0
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:53:32Z/
url https://git.kernel.org/stable/c/6d8b01624a2540336a32be91f25187a433af53a0
253
reference_url https://git.kernel.org/stable/c/7610ba1319253225a9ba8a9d28d472fc883b4e2f
reference_id 7610ba1319253225a9ba8a9d28d472fc883b4e2f
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:53:32Z/
url https://git.kernel.org/stable/c/7610ba1319253225a9ba8a9d28d472fc883b4e2f
254
reference_url https://git.kernel.org/stable/c/89e0e66682e1538aeeaa3109503473663cd24c8b
reference_id 89e0e66682e1538aeeaa3109503473663cd24c8b
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:53:32Z/
url https://git.kernel.org/stable/c/89e0e66682e1538aeeaa3109503473663cd24c8b
255
reference_url https://git.kernel.org/stable/c/9525b38180e2753f0daa1a522b7767a2aa969676
reference_id 9525b38180e2753f0daa1a522b7767a2aa969676
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:53:32Z/
url https://git.kernel.org/stable/c/9525b38180e2753f0daa1a522b7767a2aa969676
256
reference_url https://git.kernel.org/stable/c/ecd7744a1446eb02ccc63e493e2eb6ede4ef1e10
reference_id ecd7744a1446eb02ccc63e493e2eb6ede4ef1e10
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:53:32Z/
url https://git.kernel.org/stable/c/ecd7744a1446eb02ccc63e493e2eb6ede4ef1e10
257
reference_url https://git.kernel.org/stable/c/f1bc0d8163f8ee84a8d5affdf624cfad657df1d2
reference_id f1bc0d8163f8ee84a8d5affdf624cfad657df1d2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:53:32Z/
url https://git.kernel.org/stable/c/f1bc0d8163f8ee84a8d5affdf624cfad657df1d2
258
reference_url https://access.redhat.com/errata/RHSA-2024:10262
reference_id RHSA-2024:10262
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10262
259
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
260
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
261
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
262
reference_url https://access.redhat.com/errata/RHSA-2024:8613
reference_id RHSA-2024:8613
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8613
263
reference_url https://access.redhat.com/errata/RHSA-2024:8614
reference_id RHSA-2024:8614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8614
264
reference_url https://access.redhat.com/errata/RHSA-2024:9942
reference_id RHSA-2024:9942
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9942
265
reference_url https://access.redhat.com/errata/RHSA-2024:9943
reference_id RHSA-2024:9943
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9943
266
reference_url https://usn.ubuntu.com/6766-1/
reference_id USN-6766-1
reference_type
scores
url https://usn.ubuntu.com/6766-1/
267
reference_url https://usn.ubuntu.com/6766-2/
reference_id USN-6766-2
reference_type
scores
url https://usn.ubuntu.com/6766-2/
268
reference_url https://usn.ubuntu.com/6766-3/
reference_id USN-6766-3
reference_type
scores
url https://usn.ubuntu.com/6766-3/
269
reference_url https://usn.ubuntu.com/6767-1/
reference_id USN-6767-1
reference_type
scores
url https://usn.ubuntu.com/6767-1/
270
reference_url https://usn.ubuntu.com/6767-2/
reference_id USN-6767-2
reference_type
scores
url https://usn.ubuntu.com/6767-2/
271
reference_url https://usn.ubuntu.com/6795-1/
reference_id USN-6795-1
reference_type
scores
url https://usn.ubuntu.com/6795-1/
272
reference_url https://usn.ubuntu.com/6818-1/
reference_id USN-6818-1
reference_type
scores
url https://usn.ubuntu.com/6818-1/
273
reference_url https://usn.ubuntu.com/6818-2/
reference_id USN-6818-2
reference_type
scores
url https://usn.ubuntu.com/6818-2/
274
reference_url https://usn.ubuntu.com/6818-3/
reference_id USN-6818-3
reference_type
scores
url https://usn.ubuntu.com/6818-3/
275
reference_url https://usn.ubuntu.com/6818-4/
reference_id USN-6818-4
reference_type
scores
url https://usn.ubuntu.com/6818-4/
276
reference_url https://usn.ubuntu.com/6819-1/
reference_id USN-6819-1
reference_type
scores
url https://usn.ubuntu.com/6819-1/
277
reference_url https://usn.ubuntu.com/6819-2/
reference_id USN-6819-2
reference_type
scores
url https://usn.ubuntu.com/6819-2/
278
reference_url https://usn.ubuntu.com/6819-3/
reference_id USN-6819-3
reference_type
scores
url https://usn.ubuntu.com/6819-3/
279
reference_url https://usn.ubuntu.com/6819-4/
reference_id USN-6819-4
reference_type
scores
url https://usn.ubuntu.com/6819-4/
280
reference_url https://usn.ubuntu.com/6828-1/
reference_id USN-6828-1
reference_type
scores
url https://usn.ubuntu.com/6828-1/
fixed_packages
aliases CVE-2024-26671
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yaps-gywk-auaf
149
url VCID-ykv9-5jba-vqf9
vulnerability_id VCID-ykv9-5jba-vqf9
summary kernel: ext4: fix undefined behavior in bit shift for ext4_check_flag_values
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50403.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50403.json
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2396494
reference_id 2396494
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2396494
3
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
4
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
5
reference_url https://access.redhat.com/errata/RHSA-2025:22006
reference_id RHSA-2025:22006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22006
6
reference_url https://access.redhat.com/errata/RHSA-2025:22066
reference_id RHSA-2025:22066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22066
7
reference_url https://access.redhat.com/errata/RHSA-2025:22072
reference_id RHSA-2025:22072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22072
8
reference_url https://access.redhat.com/errata/RHSA-2025:22087
reference_id RHSA-2025:22087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22087
9
reference_url https://access.redhat.com/errata/RHSA-2025:22752
reference_id RHSA-2025:22752
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22752
10
reference_url https://access.redhat.com/errata/RHSA-2025:23445
reference_id RHSA-2025:23445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23445
11
reference_url https://access.redhat.com/errata/RHSA-2025:23947
reference_id RHSA-2025:23947
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23947
12
reference_url https://access.redhat.com/errata/RHSA-2025:23960
reference_id RHSA-2025:23960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23960
fixed_packages
aliases CVE-2022-50403
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ykv9-5jba-vqf9
150
url VCID-ytjs-9bm9-jfbu
vulnerability_id VCID-ytjs-9bm9-jfbu
summary kernel: Linux kernel: md/raid10 soft lockup due to unlimited plugged bio
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53151.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53151.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53151
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01539
published_at 2026-04-02T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01542
published_at 2026-04-04T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01546
published_at 2026-04-07T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.0155
published_at 2026-04-08T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01556
published_at 2026-04-09T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01472
published_at 2026-04-11T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01466
published_at 2026-04-12T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.01467
published_at 2026-04-13T12:55:00Z
8
value 0.00012
scoring_system epss
scoring_elements 0.01456
published_at 2026-04-16T12:55:00Z
9
value 0.00012
scoring_system epss
scoring_elements 0.01471
published_at 2026-04-18T12:55:00Z
10
value 0.00012
scoring_system epss
scoring_elements 0.01558
published_at 2026-04-21T12:55:00Z
11
value 0.00012
scoring_system epss
scoring_elements 0.01566
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53151
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53151
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2395410
reference_id 2395410
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2395410
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53151
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ytjs-9bm9-jfbu
151
url VCID-z1up-e2xz-7yak
vulnerability_id VCID-z1up-e2xz-7yak
summary kernel: mm/slub: add missing TID updates on slab deactivation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49700.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49700.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49700
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10701
published_at 2026-04-04T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10638
published_at 2026-04-02T12:55:00Z
2
value 0.00059
scoring_system epss
scoring_elements 0.18226
published_at 2026-04-24T12:55:00Z
3
value 0.00059
scoring_system epss
scoring_elements 0.18305
published_at 2026-04-07T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.18388
published_at 2026-04-08T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.18441
published_at 2026-04-09T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.1844
published_at 2026-04-11T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.18393
published_at 2026-04-12T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.18342
published_at 2026-04-13T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.18286
published_at 2026-04-16T12:55:00Z
10
value 0.00059
scoring_system epss
scoring_elements 0.18298
published_at 2026-04-18T12:55:00Z
11
value 0.00059
scoring_system epss
scoring_elements 0.18324
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49700
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49700
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/0515cc9b6b24877f59b222ade704bfaa42caa2a6
reference_id 0515cc9b6b24877f59b222ade704bfaa42caa2a6
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:14:57Z/
url https://git.kernel.org/stable/c/0515cc9b6b24877f59b222ade704bfaa42caa2a6
5
reference_url https://git.kernel.org/stable/c/197e257da473c725dfe47759c3ee02f2398d8ea5
reference_id 197e257da473c725dfe47759c3ee02f2398d8ea5
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:14:57Z/
url https://git.kernel.org/stable/c/197e257da473c725dfe47759c3ee02f2398d8ea5
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348237
reference_id 2348237
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348237
7
reference_url https://git.kernel.org/stable/c/308c6d0e1f200fd26c71270c6e6bfcf0fc6ff082
reference_id 308c6d0e1f200fd26c71270c6e6bfcf0fc6ff082
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:14:57Z/
url https://git.kernel.org/stable/c/308c6d0e1f200fd26c71270c6e6bfcf0fc6ff082
8
reference_url https://git.kernel.org/stable/c/6c32496964da0dc230cea763a0e934b2e02dabd5
reference_id 6c32496964da0dc230cea763a0e934b2e02dabd5
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:14:57Z/
url https://git.kernel.org/stable/c/6c32496964da0dc230cea763a0e934b2e02dabd5
9
reference_url https://git.kernel.org/stable/c/d6a597450e686d4c6388bd3cdcb17224b4dae7f0
reference_id d6a597450e686d4c6388bd3cdcb17224b4dae7f0
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:14:57Z/
url https://git.kernel.org/stable/c/d6a597450e686d4c6388bd3cdcb17224b4dae7f0
10
reference_url https://git.kernel.org/stable/c/e2b2f0e2e34d71ae6c2a1114fd3c525930e84bc7
reference_id e2b2f0e2e34d71ae6c2a1114fd3c525930e84bc7
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:14:57Z/
url https://git.kernel.org/stable/c/e2b2f0e2e34d71ae6c2a1114fd3c525930e84bc7
11
reference_url https://git.kernel.org/stable/c/e7e3e90d671078455a3a08189f89d85b3da2de9e
reference_id e7e3e90d671078455a3a08189f89d85b3da2de9e
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:14:57Z/
url https://git.kernel.org/stable/c/e7e3e90d671078455a3a08189f89d85b3da2de9e
12
reference_url https://git.kernel.org/stable/c/eeaa345e128515135ccb864c04482180c08e3259
reference_id eeaa345e128515135ccb864c04482180c08e3259
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:14:57Z/
url https://git.kernel.org/stable/c/eeaa345e128515135ccb864c04482180c08e3259
13
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
14
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2022-49700
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z1up-e2xz-7yak
152
url VCID-z6t2-t5hv-a7hg
vulnerability_id VCID-z6t2-t5hv-a7hg
summary kernel: scsi: qla2xxx: Remove unused nvme_ls_waitq wait queue
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53280.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53280.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53280
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.02807
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.02821
published_at 2026-04-04T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.02853
published_at 2026-04-09T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.02832
published_at 2026-04-08T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.02829
published_at 2026-04-07T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.02822
published_at 2026-04-11T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.04021
published_at 2026-04-24T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.0393
published_at 2026-04-12T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.039
published_at 2026-04-13T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.0388
published_at 2026-04-16T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.0389
published_at 2026-04-18T12:55:00Z
11
value 0.00017
scoring_system epss
scoring_elements 0.04011
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53280
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53280
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/0b1ce92fabdb7d02ddf8641230a06e2752ae5baa
reference_id 0b1ce92fabdb7d02ddf8641230a06e2752ae5baa
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:08:14Z/
url https://git.kernel.org/stable/c/0b1ce92fabdb7d02ddf8641230a06e2752ae5baa
5
reference_url https://git.kernel.org/stable/c/20fce500b232b970e40312a9c97e7f3b6d7a709c
reference_id 20fce500b232b970e40312a9c97e7f3b6d7a709c
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:08:14Z/
url https://git.kernel.org/stable/c/20fce500b232b970e40312a9c97e7f3b6d7a709c
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2395680
reference_id 2395680
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2395680
7
reference_url https://git.kernel.org/stable/c/522ee1b3030f3b6b5fd59489d12b4ca767c9e5da
reference_id 522ee1b3030f3b6b5fd59489d12b4ca767c9e5da
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:08:14Z/
url https://git.kernel.org/stable/c/522ee1b3030f3b6b5fd59489d12b4ca767c9e5da
8
reference_url https://git.kernel.org/stable/c/92529387a0066754fd9cda080fb3298b8cca750c
reference_id 92529387a0066754fd9cda080fb3298b8cca750c
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:08:14Z/
url https://git.kernel.org/stable/c/92529387a0066754fd9cda080fb3298b8cca750c
9
reference_url https://git.kernel.org/stable/c/b7084ebf4f54d46fed5153112d685f4137334175
reference_id b7084ebf4f54d46fed5153112d685f4137334175
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:08:14Z/
url https://git.kernel.org/stable/c/b7084ebf4f54d46fed5153112d685f4137334175
10
reference_url https://git.kernel.org/stable/c/f459d586fdf12c53116c9fddf43065165fdd5969
reference_id f459d586fdf12c53116c9fddf43065165fdd5969
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:08:14Z/
url https://git.kernel.org/stable/c/f459d586fdf12c53116c9fddf43065165fdd5969
11
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
12
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53280
risk_score 2.9
exploitability 0.5
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z6t2-t5hv-a7hg
153
url VCID-zfcy-q38c-ykhx
vulnerability_id VCID-zfcy-q38c-ykhx
summary kernel: ip6mr: Fix skb_under_panic in ip6mr_cache_report()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53365.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53365.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53365
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.02951
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.02937
published_at 2026-04-12T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.0296
published_at 2026-04-11T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03
published_at 2026-04-09T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.02975
published_at 2026-04-08T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.02965
published_at 2026-04-04T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.02973
published_at 2026-04-07T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.04166
published_at 2026-04-24T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.0403
published_at 2026-04-13T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.04019
published_at 2026-04-16T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.04031
published_at 2026-04-18T12:55:00Z
11
value 0.00017
scoring_system epss
scoring_elements 0.04154
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53365
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53365
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/0438e60a00d4e335b3c36397dbf26c74b5d13ef0
reference_id 0438e60a00d4e335b3c36397dbf26c74b5d13ef0
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:45:20Z/
url https://git.kernel.org/stable/c/0438e60a00d4e335b3c36397dbf26c74b5d13ef0
5
reference_url https://git.kernel.org/stable/c/1683124129a4263dd5bce2475bab110e95fa0346
reference_id 1683124129a4263dd5bce2475bab110e95fa0346
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:45:20Z/
url https://git.kernel.org/stable/c/1683124129a4263dd5bce2475bab110e95fa0346
6
reference_url https://git.kernel.org/stable/c/1bb54a21f4d9b88442f8c3307c780e2db64417e4
reference_id 1bb54a21f4d9b88442f8c3307c780e2db64417e4
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:45:20Z/
url https://git.kernel.org/stable/c/1bb54a21f4d9b88442f8c3307c780e2db64417e4
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2396130
reference_id 2396130
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2396130
8
reference_url https://git.kernel.org/stable/c/30e0191b16e8a58e4620fa3e2839ddc7b9d4281c
reference_id 30e0191b16e8a58e4620fa3e2839ddc7b9d4281c
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:45:20Z/
url https://git.kernel.org/stable/c/30e0191b16e8a58e4620fa3e2839ddc7b9d4281c
9
reference_url https://git.kernel.org/stable/c/3326c711f18d18fe6e1f5d83d3a7eab07e5a1560
reference_id 3326c711f18d18fe6e1f5d83d3a7eab07e5a1560
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:45:20Z/
url https://git.kernel.org/stable/c/3326c711f18d18fe6e1f5d83d3a7eab07e5a1560
10
reference_url https://git.kernel.org/stable/c/691a09eecad97e745b9aa0e3918db46d020bdacb
reference_id 691a09eecad97e745b9aa0e3918db46d020bdacb
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:45:20Z/
url https://git.kernel.org/stable/c/691a09eecad97e745b9aa0e3918db46d020bdacb
11
reference_url https://git.kernel.org/stable/c/8382e7ed2d63e6c2daf6881fa091526dc6c879cd
reference_id 8382e7ed2d63e6c2daf6881fa091526dc6c879cd
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:45:20Z/
url https://git.kernel.org/stable/c/8382e7ed2d63e6c2daf6881fa091526dc6c879cd
12
reference_url https://git.kernel.org/stable/c/a96d74d1076c82a4cef02c150d9996b21354c78d
reference_id a96d74d1076c82a4cef02c150d9996b21354c78d
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:45:20Z/
url https://git.kernel.org/stable/c/a96d74d1076c82a4cef02c150d9996b21354c78d
13
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
14
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
15
reference_url https://access.redhat.com/errata/RHSA-2025:22006
reference_id RHSA-2025:22006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22006
16
reference_url https://access.redhat.com/errata/RHSA-2025:22066
reference_id RHSA-2025:22066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22066
17
reference_url https://access.redhat.com/errata/RHSA-2025:22072
reference_id RHSA-2025:22072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22072
18
reference_url https://access.redhat.com/errata/RHSA-2025:22087
reference_id RHSA-2025:22087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22087
19
reference_url https://access.redhat.com/errata/RHSA-2025:22095
reference_id RHSA-2025:22095
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22095
20
reference_url https://access.redhat.com/errata/RHSA-2025:22124
reference_id RHSA-2025:22124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22124
21
reference_url https://access.redhat.com/errata/RHSA-2025:22910
reference_id RHSA-2025:22910
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22910
22
reference_url https://access.redhat.com/errata/RHSA-2025:22914
reference_id RHSA-2025:22914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22914
23
reference_url https://access.redhat.com/errata/RHSA-2025:23445
reference_id RHSA-2025:23445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23445
24
reference_url https://access.redhat.com/errata/RHSA-2025:23463
reference_id RHSA-2025:23463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23463
fixed_packages
aliases CVE-2023-53365
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zfcy-q38c-ykhx
154
url VCID-zhhm-x29t-c3gg
vulnerability_id VCID-zhhm-x29t-c3gg
summary kernel: netfilter: nftables out-of-bounds read in nf_osf_match_one()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39189.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39189.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39189
reference_id
reference_type
scores
0
value 9e-05
scoring_system epss
scoring_elements 0.00813
published_at 2026-04-04T12:55:00Z
1
value 9e-05
scoring_system epss
scoring_elements 0.00816
published_at 2026-04-07T12:55:00Z
2
value 9e-05
scoring_system epss
scoring_elements 0.0082
published_at 2026-04-08T12:55:00Z
3
value 9e-05
scoring_system epss
scoring_elements 0.00817
published_at 2026-04-09T12:55:00Z
4
value 9e-05
scoring_system epss
scoring_elements 0.00808
published_at 2026-04-11T12:55:00Z
5
value 9e-05
scoring_system epss
scoring_elements 0.00802
published_at 2026-04-12T12:55:00Z
6
value 9e-05
scoring_system epss
scoring_elements 0.00803
published_at 2026-04-16T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.00807
published_at 2026-04-18T12:55:00Z
8
value 9e-05
scoring_system epss
scoring_elements 0.00999
published_at 2026-04-21T12:55:00Z
9
value 9e-05
scoring_system epss
scoring_elements 0.01
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39189
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39189
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2226777
reference_id 2226777
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2226777
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
7
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
8
reference_url https://usn.ubuntu.com/6461-1/
reference_id USN-6461-1
reference_type
scores
url https://usn.ubuntu.com/6461-1/
9
reference_url https://usn.ubuntu.com/6494-1/
reference_id USN-6494-1
reference_type
scores
url https://usn.ubuntu.com/6494-1/
10
reference_url https://usn.ubuntu.com/6494-2/
reference_id USN-6494-2
reference_type
scores
url https://usn.ubuntu.com/6494-2/
11
reference_url https://usn.ubuntu.com/6532-1/
reference_id USN-6532-1
reference_type
scores
url https://usn.ubuntu.com/6532-1/
12
reference_url https://usn.ubuntu.com/6534-1/
reference_id USN-6534-1
reference_type
scores
url https://usn.ubuntu.com/6534-1/
13
reference_url https://usn.ubuntu.com/6534-2/
reference_id USN-6534-2
reference_type
scores
url https://usn.ubuntu.com/6534-2/
14
reference_url https://usn.ubuntu.com/6534-3/
reference_id USN-6534-3
reference_type
scores
url https://usn.ubuntu.com/6534-3/
15
reference_url https://usn.ubuntu.com/6536-1/
reference_id USN-6536-1
reference_type
scores
url https://usn.ubuntu.com/6536-1/
16
reference_url https://usn.ubuntu.com/6537-1/
reference_id USN-6537-1
reference_type
scores
url https://usn.ubuntu.com/6537-1/
17
reference_url https://usn.ubuntu.com/6548-1/
reference_id USN-6548-1
reference_type
scores
url https://usn.ubuntu.com/6548-1/
18
reference_url https://usn.ubuntu.com/6548-2/
reference_id USN-6548-2
reference_type
scores
url https://usn.ubuntu.com/6548-2/
19
reference_url https://usn.ubuntu.com/6548-3/
reference_id USN-6548-3
reference_type
scores
url https://usn.ubuntu.com/6548-3/
20
reference_url https://usn.ubuntu.com/6548-4/
reference_id USN-6548-4
reference_type
scores
url https://usn.ubuntu.com/6548-4/
21
reference_url https://usn.ubuntu.com/6548-5/
reference_id USN-6548-5
reference_type
scores
url https://usn.ubuntu.com/6548-5/
22
reference_url https://usn.ubuntu.com/6549-1/
reference_id USN-6549-1
reference_type
scores
url https://usn.ubuntu.com/6549-1/
23
reference_url https://usn.ubuntu.com/6549-2/
reference_id USN-6549-2
reference_type
scores
url https://usn.ubuntu.com/6549-2/
24
reference_url https://usn.ubuntu.com/6549-3/
reference_id USN-6549-3
reference_type
scores
url https://usn.ubuntu.com/6549-3/
25
reference_url https://usn.ubuntu.com/6549-4/
reference_id USN-6549-4
reference_type
scores
url https://usn.ubuntu.com/6549-4/
26
reference_url https://usn.ubuntu.com/6549-5/
reference_id USN-6549-5
reference_type
scores
url https://usn.ubuntu.com/6549-5/
27
reference_url https://usn.ubuntu.com/6573-1/
reference_id USN-6573-1
reference_type
scores
url https://usn.ubuntu.com/6573-1/
28
reference_url https://usn.ubuntu.com/6635-1/
reference_id USN-6635-1
reference_type
scores
url https://usn.ubuntu.com/6635-1/
fixed_packages
aliases CVE-2023-39189
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zhhm-x29t-c3gg
155
url VCID-zkhc-9mvm-83c2
vulnerability_id VCID-zkhc-9mvm-83c2
summary kernel: KVM: s390/diag: fix racy access of physical cpu number in diag 9c handler
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53205.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53205.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53205
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03458
published_at 2026-04-02T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03471
published_at 2026-04-04T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03484
published_at 2026-04-07T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03487
published_at 2026-04-08T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03509
published_at 2026-04-09T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04645
published_at 2026-04-21T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04687
published_at 2026-04-24T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04557
published_at 2026-04-11T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04541
published_at 2026-04-12T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.04525
published_at 2026-04-13T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04501
published_at 2026-04-16T12:55:00Z
11
value 0.00018
scoring_system epss
scoring_elements 0.0451
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53205
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2395415
reference_id 2395415
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2395415
4
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
5
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53205
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zkhc-9mvm-83c2
156
url VCID-zph7-5zjb-quae
vulnerability_id VCID-zph7-5zjb-quae
summary kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3567.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3567.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3567
reference_id
reference_type
scores
0
value 8e-05
scoring_system epss
scoring_elements 0.00709
published_at 2026-04-07T12:55:00Z
1
value 8e-05
scoring_system epss
scoring_elements 0.00705
published_at 2026-04-04T12:55:00Z
2
value 8e-05
scoring_system epss
scoring_elements 0.00708
published_at 2026-04-08T12:55:00Z
3
value 8e-05
scoring_system epss
scoring_elements 0.00699
published_at 2026-04-09T12:55:00Z
4
value 8e-05
scoring_system epss
scoring_elements 0.00698
published_at 2026-04-11T12:55:00Z
5
value 8e-05
scoring_system epss
scoring_elements 0.00693
published_at 2026-04-12T12:55:00Z
6
value 8e-05
scoring_system epss
scoring_elements 0.00692
published_at 2026-04-18T12:55:00Z
7
value 8e-05
scoring_system epss
scoring_elements 0.00686
published_at 2026-04-16T12:55:00Z
8
value 8e-05
scoring_system epss
scoring_elements 0.00734
published_at 2026-04-21T12:55:00Z
9
value 8e-05
scoring_system epss
scoring_elements 0.00736
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3567
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3567
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2221463
reference_id 2221463
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2221463
5
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
6
reference_url https://access.redhat.com/errata/RHSA-2024:0431
reference_id RHSA-2024:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0431
7
reference_url https://access.redhat.com/errata/RHSA-2024:0432
reference_id RHSA-2024:0432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0432
8
reference_url https://access.redhat.com/errata/RHSA-2024:0439
reference_id RHSA-2024:0439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0439
9
reference_url https://access.redhat.com/errata/RHSA-2024:0448
reference_id RHSA-2024:0448
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0448
10
reference_url https://access.redhat.com/errata/RHSA-2024:0575
reference_id RHSA-2024:0575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0575
11
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
12
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
13
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
14
reference_url https://usn.ubuntu.com/6309-1/
reference_id USN-6309-1
reference_type
scores
url https://usn.ubuntu.com/6309-1/
15
reference_url https://usn.ubuntu.com/6327-1/
reference_id USN-6327-1
reference_type
scores
url https://usn.ubuntu.com/6327-1/
16
reference_url https://usn.ubuntu.com/6341-1/
reference_id USN-6341-1
reference_type
scores
url https://usn.ubuntu.com/6341-1/
fixed_packages
aliases CVE-2023-3567
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zph7-5zjb-quae
157
url VCID-zwem-xgyr-73dw
vulnerability_id VCID-zwem-xgyr-73dw
summary kernel: ext4: fix bug_on in __es_tree_search caused by bad boot loader inode
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50638.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50638.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50638
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.1533
published_at 2026-04-02T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.154
published_at 2026-04-04T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.15203
published_at 2026-04-07T12:55:00Z
3
value 0.00049
scoring_system epss
scoring_elements 0.15291
published_at 2026-04-08T12:55:00Z
4
value 0.00049
scoring_system epss
scoring_elements 0.15341
published_at 2026-04-09T12:55:00Z
5
value 0.00064
scoring_system epss
scoring_elements 0.19753
published_at 2026-04-21T12:55:00Z
6
value 0.00064
scoring_system epss
scoring_elements 0.19648
published_at 2026-04-24T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.19866
published_at 2026-04-11T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.19821
published_at 2026-04-12T12:55:00Z
9
value 0.00064
scoring_system epss
scoring_elements 0.19764
published_at 2026-04-13T12:55:00Z
10
value 0.00064
scoring_system epss
scoring_elements 0.19739
published_at 2026-04-16T12:55:00Z
11
value 0.00064
scoring_system epss
scoring_elements 0.19741
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50638
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50638
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2420266
reference_id 2420266
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2420266
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2022-50638
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zwem-xgyr-73dw
158
url VCID-zype-8718-47g9
vulnerability_id VCID-zype-8718-47g9
summary kernel: net/mlx5e: fix memory leak in mlx5e_fs_tt_redirect_any_create
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53371.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53371.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53371
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01826
published_at 2026-04-02T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.0184
published_at 2026-04-07T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01838
published_at 2026-04-04T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01843
published_at 2026-04-08T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01857
published_at 2026-04-09T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01844
published_at 2026-04-11T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01829
published_at 2026-04-12T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.01824
published_at 2026-04-13T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.02261
published_at 2026-04-24T12:55:00Z
9
value 0.00013
scoring_system epss
scoring_elements 0.02186
published_at 2026-04-16T12:55:00Z
10
value 0.00013
scoring_system epss
scoring_elements 0.02197
published_at 2026-04-18T12:55:00Z
11
value 0.00013
scoring_system epss
scoring_elements 0.02281
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53371
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2396397
reference_id 2396397
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2396397
4
reference_url https://git.kernel.org/stable/c/3250affdc658557a41df9c5fb567723e421f8bf2
reference_id 3250affdc658557a41df9c5fb567723e421f8bf2
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:53:36Z/
url https://git.kernel.org/stable/c/3250affdc658557a41df9c5fb567723e421f8bf2
5
reference_url https://git.kernel.org/stable/c/75df2fe6d160e16be880aacacd521b135d7177c9
reference_id 75df2fe6d160e16be880aacacd521b135d7177c9
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:53:36Z/
url https://git.kernel.org/stable/c/75df2fe6d160e16be880aacacd521b135d7177c9
6
reference_url https://git.kernel.org/stable/c/8a75a6f169c3df3a94802314aa61282772ac75b8
reference_id 8a75a6f169c3df3a94802314aa61282772ac75b8
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:53:36Z/
url https://git.kernel.org/stable/c/8a75a6f169c3df3a94802314aa61282772ac75b8
7
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
8
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2023-53371
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zype-8718-47g9
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-553%3Farch=el8_10