| 0 |
| url |
VCID-18zd-fdck-s7hc |
| vulnerability_id |
VCID-18zd-fdck-s7hc |
| summary |
kernel: arm64: acpi: Fix possible memory leak of ffh_ctxt |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53266 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04741 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04779 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04764 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04812 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04825 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05388 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05236 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05288 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05235 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05427 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05299 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53266 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53266
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-18zd-fdck-s7hc |
|
| 1 |
| url |
VCID-192b-rfyw-nbdv |
| vulnerability_id |
VCID-192b-rfyw-nbdv |
| summary |
kernel: mm/sparsemem: fix race in accessing memory_section->usage |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52489 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00416 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00425 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00405 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00406 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00402 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.004 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00394 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00398 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00424 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00415 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00408 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52489 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
| 110 |
|
| 111 |
|
| 112 |
|
| 113 |
|
| 114 |
|
| 115 |
|
| 116 |
|
| 117 |
|
| 118 |
|
| 119 |
|
| 120 |
|
| 121 |
|
| 122 |
|
| 123 |
|
| 124 |
|
| 125 |
|
| 126 |
|
| 127 |
|
| 128 |
|
| 129 |
|
| 130 |
|
| 131 |
|
| 132 |
|
| 133 |
|
| 134 |
|
| 135 |
|
| 136 |
|
| 137 |
|
| 138 |
|
| 139 |
|
| 140 |
|
| 141 |
|
| 142 |
|
| 143 |
|
| 144 |
|
| 145 |
|
| 146 |
|
| 147 |
|
| 148 |
|
| 149 |
|
| 150 |
|
| 151 |
|
| 152 |
|
| 153 |
|
| 154 |
|
| 155 |
|
| 156 |
|
| 157 |
|
| 158 |
|
| 159 |
|
| 160 |
|
| 161 |
|
| 162 |
|
| 163 |
|
| 164 |
|
| 165 |
|
| 166 |
|
| 167 |
|
| 168 |
|
| 169 |
|
| 170 |
|
| 171 |
|
| 172 |
|
| 173 |
|
| 174 |
|
| 175 |
|
| 176 |
|
| 177 |
|
| 178 |
|
| 179 |
|
| 180 |
|
| 181 |
|
| 182 |
|
| 183 |
|
| 184 |
|
| 185 |
|
| 186 |
|
| 187 |
|
| 188 |
|
| 189 |
|
| 190 |
|
| 191 |
|
| 192 |
|
| 193 |
|
| 194 |
|
| 195 |
|
| 196 |
|
| 197 |
|
| 198 |
|
| 199 |
|
| 200 |
|
| 201 |
|
| 202 |
|
| 203 |
|
| 204 |
|
| 205 |
|
| 206 |
|
| 207 |
|
| 208 |
|
| 209 |
|
| 210 |
|
| 211 |
|
| 212 |
|
| 213 |
|
| 214 |
|
| 215 |
|
| 216 |
|
| 217 |
|
| 218 |
|
| 219 |
|
| 220 |
|
| 221 |
|
| 222 |
|
| 223 |
|
| 224 |
|
| 225 |
|
| 226 |
|
| 227 |
|
| 228 |
|
| 229 |
|
| 230 |
|
| 231 |
|
| 232 |
|
| 233 |
|
| 234 |
|
| 235 |
|
| 236 |
|
| 237 |
|
| 238 |
|
| 239 |
|
| 240 |
|
| 241 |
|
| 242 |
|
| 243 |
|
| 244 |
|
| 245 |
|
| 246 |
|
| 247 |
|
| 248 |
|
| 249 |
|
| 250 |
|
| 251 |
|
| 252 |
|
| 253 |
|
| 254 |
|
| 255 |
|
| 256 |
|
| 257 |
|
| 258 |
|
| 259 |
|
| 260 |
|
| 261 |
|
| 262 |
|
| 263 |
|
| 264 |
|
| 265 |
|
| 266 |
|
| 267 |
|
| 268 |
|
| 269 |
|
| 270 |
|
| 271 |
|
| 272 |
|
| 273 |
|
| 274 |
|
| 275 |
|
| 276 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-52489
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-192b-rfyw-nbdv |
|
| 2 |
| url |
VCID-1ak6-9nnt-qufc |
| vulnerability_id |
VCID-1ak6-9nnt-qufc |
| summary |
kernel: bnxt_en: Avoid order-5 memory allocation for TPA data |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53134 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19772 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19824 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19546 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19626 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19679 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19683 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19634 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19575 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19553 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.1956 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19573 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19468 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53134 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53134
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1ak6-9nnt-qufc |
|
| 3 |
| url |
VCID-1p3k-f3ck-83bg |
| vulnerability_id |
VCID-1p3k-f3ck-83bg |
| summary |
kernel: Use-after-free in nft_verdict_dump due to a race between set GC and transaction |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-4244 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04334 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04356 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04367 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.044 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04417 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04411 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04396 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0438 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04347 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04487 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04513 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-4244 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-4244
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1p3k-f3ck-83bg |
|
| 4 |
| url |
VCID-214g-9hfm-wqbk |
| vulnerability_id |
VCID-214g-9hfm-wqbk |
| summary |
kernel: Linux kernel: Denial of Service due to memory leak in mlx5e driver |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53999 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07747 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07792 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07749 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07809 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07826 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07821 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07808 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07794 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07708 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07684 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07837 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53999 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53999
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-214g-9hfm-wqbk |
|
| 5 |
| url |
VCID-225u-cxd6-dqb5 |
| vulnerability_id |
VCID-225u-cxd6-dqb5 |
| summary |
kernel: media: dvbdev: adopts refcnt to avoid UAF |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50274 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02603 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02617 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02621 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02625 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02645 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02495 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02485 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02483 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02467 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02473 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.0258 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02568 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50274 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50274
|
| risk_score |
2.7 |
| exploitability |
0.5 |
| weighted_severity |
5.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-225u-cxd6-dqb5 |
|
| 6 |
| url |
VCID-26jx-suvc-dyba |
| vulnerability_id |
VCID-26jx-suvc-dyba |
| summary |
kernel: nvmet-tcp: add bounds check on Transfer Tag |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50717 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50717 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50717
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-26jx-suvc-dyba |
|
| 7 |
| url |
VCID-2tbb-89hb-rkh6 |
| vulnerability_id |
VCID-2tbb-89hb-rkh6 |
| summary |
kernel: skbuff: skb_segment, Call zero copy functions before using skbuff frags |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53354 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02951 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02937 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0296 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02975 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02965 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02973 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04166 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0403 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04019 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04031 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04154 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53354 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53354
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2tbb-89hb-rkh6 |
|
| 8 |
| url |
VCID-34km-p3dp-v7gp |
| vulnerability_id |
VCID-34km-p3dp-v7gp |
| summary |
kernel: ipmi_si: fix a memleak in try_smi_init() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53611 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02951 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02965 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02973 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02975 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0296 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02937 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02927 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02902 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02912 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03029 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03027 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53611 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53611
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-34km-p3dp-v7gp |
|
| 9 |
| url |
VCID-35wc-xgzx-pkh9 |
| vulnerability_id |
VCID-35wc-xgzx-pkh9 |
| summary |
kernel: ip_vti: fix potential slab-use-after-free in decode_session6 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53559 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03107 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0312 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03125 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0315 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03109 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03083 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0307 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03045 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03054 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03172 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03175 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53559 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53559
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-35wc-xgzx-pkh9 |
|
| 10 |
| url |
VCID-3ejf-8txq-ffg6 |
| vulnerability_id |
VCID-3ejf-8txq-ffg6 |
| summary |
kernel: scsi: qla2xxx: Use raw_smp_processor_id() instead of smp_processor_id() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53530 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03188 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03198 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03201 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03205 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03231 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03185 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03158 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03142 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03116 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03123 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03242 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03243 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53530 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53530
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3ejf-8txq-ffg6 |
|
| 11 |
| url |
VCID-4kmy-n2ts-hfa2 |
| vulnerability_id |
VCID-4kmy-n2ts-hfa2 |
| summary |
kernel: sched/membarrier: reduce the ability to hammer on sys_membarrier |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26602 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01301 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.0122 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01228 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01235 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01237 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01214 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01217 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01209 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01222 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01295 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01215 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26602 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
| 110 |
|
| 111 |
|
| 112 |
|
| 113 |
|
| 114 |
|
| 115 |
|
| 116 |
|
| 117 |
|
| 118 |
|
| 119 |
|
| 120 |
|
| 121 |
|
| 122 |
|
| 123 |
|
| 124 |
|
| 125 |
|
| 126 |
|
| 127 |
|
| 128 |
|
| 129 |
|
| 130 |
|
| 131 |
|
| 132 |
|
| 133 |
|
| 134 |
|
| 135 |
|
| 136 |
|
| 137 |
|
| 138 |
|
| 139 |
|
| 140 |
|
| 141 |
|
| 142 |
|
| 143 |
|
| 144 |
|
| 145 |
|
| 146 |
|
| 147 |
|
| 148 |
|
| 149 |
|
| 150 |
|
| 151 |
|
| 152 |
|
| 153 |
|
| 154 |
|
| 155 |
|
| 156 |
|
| 157 |
|
| 158 |
|
| 159 |
|
| 160 |
|
| 161 |
|
| 162 |
|
| 163 |
|
| 164 |
|
| 165 |
|
| 166 |
|
| 167 |
|
| 168 |
|
| 169 |
|
| 170 |
|
| 171 |
|
| 172 |
|
| 173 |
|
| 174 |
|
| 175 |
|
| 176 |
|
| 177 |
|
| 178 |
|
| 179 |
|
| 180 |
|
| 181 |
|
| 182 |
|
| 183 |
|
| 184 |
|
| 185 |
|
| 186 |
|
| 187 |
|
| 188 |
|
| 189 |
|
| 190 |
|
| 191 |
|
| 192 |
|
| 193 |
|
| 194 |
|
| 195 |
|
| 196 |
|
| 197 |
|
| 198 |
|
| 199 |
|
| 200 |
|
| 201 |
|
| 202 |
|
| 203 |
|
| 204 |
|
| 205 |
|
| 206 |
|
| 207 |
|
| 208 |
|
| 209 |
|
| 210 |
|
| 211 |
|
| 212 |
|
| 213 |
|
| 214 |
|
| 215 |
|
| 216 |
|
| 217 |
|
| 218 |
|
| 219 |
|
| 220 |
|
| 221 |
|
| 222 |
|
| 223 |
|
| 224 |
|
| 225 |
|
| 226 |
|
| 227 |
|
| 228 |
|
| 229 |
|
| 230 |
|
| 231 |
|
| 232 |
|
| 233 |
|
| 234 |
|
| 235 |
|
| 236 |
|
| 237 |
|
| 238 |
|
| 239 |
|
| 240 |
|
| 241 |
|
| 242 |
|
| 243 |
|
| 244 |
|
| 245 |
|
| 246 |
|
| 247 |
|
| 248 |
|
| 249 |
|
| 250 |
|
| 251 |
|
| 252 |
|
| 253 |
|
| 254 |
|
| 255 |
|
| 256 |
|
| 257 |
|
| 258 |
|
| 259 |
|
| 260 |
|
| 261 |
|
| 262 |
|
| 263 |
|
| 264 |
|
| 265 |
|
| 266 |
|
| 267 |
|
| 268 |
|
| 269 |
|
| 270 |
|
| 271 |
|
| 272 |
|
| 273 |
|
| 274 |
|
| 275 |
|
| 276 |
|
| 277 |
|
| 278 |
|
| 279 |
|
| 280 |
|
| 281 |
|
| 282 |
|
| 283 |
|
| 284 |
|
| 285 |
|
| 286 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-26602
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4kmy-n2ts-hfa2 |
|
| 12 |
| url |
VCID-4u8y-9b4g-vqfx |
| vulnerability_id |
VCID-4u8y-9b4g-vqfx |
| summary |
kernel: QXL: race condition leading to use-after-free in qxl_mode_dumb_create() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39198 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00728 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00703 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00685 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00679 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00726 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00699 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00702 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00701 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00692 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00686 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39198 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-39198
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4u8y-9b4g-vqfx |
|
| 13 |
| url |
VCID-4why-73du-t3gx |
| vulnerability_id |
VCID-4why-73du-t3gx |
| summary |
kernel: scsi: qla2xxx: Fix memory leak in qla2x00_probe_one() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53696 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07817 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07863 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07818 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07901 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07888 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07875 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07862 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07778 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07754 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07907 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07868 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53696 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53696
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4why-73du-t3gx |
|
| 14 |
| url |
VCID-54qr-x4vv-xfex |
| vulnerability_id |
VCID-54qr-x4vv-xfex |
| summary |
kernel: tty: n_gsm: fix deadlock and link starvation in outgoing data path |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50116 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02662 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02691 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02699 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02701 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02722 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02695 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.0268 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02677 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11339 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11269 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.1127 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11397 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50116 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50116
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-54qr-x4vv-xfex |
|
| 15 |
| url |
VCID-5981-2zpg-e7ch |
| vulnerability_id |
VCID-5981-2zpg-e7ch |
| summary |
kernel: iommu/amd: Add a length limitation for the ivrs_acpihid command-line parameter |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54057 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54057 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54057
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5981-2zpg-e7ch |
|
| 16 |
| url |
VCID-5hmr-mnq5-7yhr |
| vulnerability_id |
VCID-5hmr-mnq5-7yhr |
| summary |
kernel: ipmi:ssif: Fix a memory leak when scanning for an adapter |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54064 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54064 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54064
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5hmr-mnq5-7yhr |
|
| 17 |
| url |
VCID-5tf2-unbh-1qat |
| vulnerability_id |
VCID-5tf2-unbh-1qat |
| summary |
kernel: ACPI: EC: Fix oops when removing custom query handlers |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54244 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54244 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54244
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5tf2-unbh-1qat |
|
| 18 |
| url |
VCID-5wf1-v12t-gkcq |
| vulnerability_id |
VCID-5wf1-v12t-gkcq |
| summary |
kernel: usb: out-of-bounds read in read_descriptors |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-37453 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05555 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05765 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05592 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.0559 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05628 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05653 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05626 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05618 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05611 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05562 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05576 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05733 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-37453 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-37453
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5wf1-v12t-gkcq |
|
| 19 |
| url |
VCID-5z11-6c3t-ckd3 |
| vulnerability_id |
VCID-5z11-6c3t-ckd3 |
| summary |
kernel: team: NULL pointer dereference when team device type is changed |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52574 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00433 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00442 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00432 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00424 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00421 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00423 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00418 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00416 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00412 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00415 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52574 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-52574
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5z11-6c3t-ckd3 |
|
| 20 |
| url |
VCID-67ha-wmbz-u7ea |
| vulnerability_id |
VCID-67ha-wmbz-u7ea |
| summary |
kernel: ACPI: APEI: Fix integer overflow in ghes_estatus_pool_init() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49885 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12895 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12794 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12748 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12827 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12878 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12845 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12806 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12762 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12665 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12671 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12775 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12945 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49885 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49885
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-67ha-wmbz-u7ea |
|
| 21 |
| url |
VCID-67u4-sdzt-w7ep |
| vulnerability_id |
VCID-67u4-sdzt-w7ep |
| summary |
kernel: i40e: Do not allow untrusted VF to remove administratively set MAC |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26830 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01877 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01874 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0189 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01876 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0186 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01855 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01838 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01837 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01861 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01873 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0342 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03406 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26830 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-26830
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-67u4-sdzt-w7ep |
|
| 22 |
| url |
VCID-73fa-zuvg-p3cu |
| vulnerability_id |
VCID-73fa-zuvg-p3cu |
| summary |
kernel: bpf, cpumap: Make sure kthread is running before map update returns |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53577 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03458 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03471 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03484 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03487 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03509 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03464 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03436 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03411 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03387 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03399 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03516 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03522 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53577 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53577
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-73fa-zuvg-p3cu |
|
| 23 |
| url |
VCID-7b8b-jzma-4qc2 |
| vulnerability_id |
VCID-7b8b-jzma-4qc2 |
| summary |
kernel: smb: client: fix potential OOBs in smb2_parse_contexts() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52434 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.2638 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26081 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.2631 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26317 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26271 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26213 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26218 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26194 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26156 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26421 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26195 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26262 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52434 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
| 110 |
|
| 111 |
|
| 112 |
|
| 113 |
|
| 114 |
|
| 115 |
|
| 116 |
|
| 117 |
|
| 118 |
|
| 119 |
|
| 120 |
|
| 121 |
|
| 122 |
|
| 123 |
|
| 124 |
|
| 125 |
|
| 126 |
|
| 127 |
|
| 128 |
|
| 129 |
|
| 130 |
|
| 131 |
|
| 132 |
|
| 133 |
|
| 134 |
|
| 135 |
|
| 136 |
|
| 137 |
|
| 138 |
|
| 139 |
|
| 140 |
|
| 141 |
|
| 142 |
|
| 143 |
|
| 144 |
|
| 145 |
|
| 146 |
|
| 147 |
|
| 148 |
|
| 149 |
|
| 150 |
|
| 151 |
|
| 152 |
|
| 153 |
|
| 154 |
|
| 155 |
|
| 156 |
|
| 157 |
|
| 158 |
|
| 159 |
|
| 160 |
|
| 161 |
|
| 162 |
|
| 163 |
|
| 164 |
|
| 165 |
|
| 166 |
|
| 167 |
|
| 168 |
|
| 169 |
|
| 170 |
|
| 171 |
|
| 172 |
|
| 173 |
|
| 174 |
|
| 175 |
|
| 176 |
|
| 177 |
|
| 178 |
|
| 179 |
|
| 180 |
|
| 181 |
|
| 182 |
|
| 183 |
|
| 184 |
|
| 185 |
|
| 186 |
|
| 187 |
|
| 188 |
|
| 189 |
|
| 190 |
|
| 191 |
|
| 192 |
|
| 193 |
|
| 194 |
|
| 195 |
|
| 196 |
|
| 197 |
|
| 198 |
|
| 199 |
|
| 200 |
|
| 201 |
|
| 202 |
|
| 203 |
|
| 204 |
|
| 205 |
|
| 206 |
|
| 207 |
|
| 208 |
|
| 209 |
|
| 210 |
|
| 211 |
|
| 212 |
|
| 213 |
|
| 214 |
|
| 215 |
|
| 216 |
|
| 217 |
|
| 218 |
|
| 219 |
|
| 220 |
|
| 221 |
|
| 222 |
|
| 223 |
|
| 224 |
|
| 225 |
|
| 226 |
|
| 227 |
|
| 228 |
|
| 229 |
|
| 230 |
|
| 231 |
|
| 232 |
|
| 233 |
|
| 234 |
|
| 235 |
|
| 236 |
|
| 237 |
|
| 238 |
|
| 239 |
|
| 240 |
|
| 241 |
|
| 242 |
|
| 243 |
|
| 244 |
|
| 245 |
|
| 246 |
|
| 247 |
|
| 248 |
|
| 249 |
|
| 250 |
|
| 251 |
|
| 252 |
|
| 253 |
|
| 254 |
|
| 255 |
|
| 256 |
|
| 257 |
|
| 258 |
|
| 259 |
|
| 260 |
|
| 261 |
|
| 262 |
|
| 263 |
|
| 264 |
|
| 265 |
|
| 266 |
|
| 267 |
|
| 268 |
|
| 269 |
|
| 270 |
|
| 271 |
|
| 272 |
|
| 273 |
|
| 274 |
|
| 275 |
|
| 276 |
|
| 277 |
|
| 278 |
|
| 279 |
|
| 280 |
|
| 281 |
|
| 282 |
|
| 283 |
|
| 284 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-52434
|
| risk_score |
2.6 |
| exploitability |
0.5 |
| weighted_severity |
5.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7b8b-jzma-4qc2 |
|
| 24 |
| url |
VCID-7rr7-7tmp-2fg9 |
| vulnerability_id |
VCID-7rr7-7tmp-2fg9 |
| summary |
kernel: ext4: add EXT4_IGET_BAD flag to prevent unexpected bad inode |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50485 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02951 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02965 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02973 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02975 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0296 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02937 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02927 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02902 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02912 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03029 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03027 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50485 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50485
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7rr7-7tmp-2fg9 |
|
| 25 |
| url |
VCID-7zav-ajzv-xybc |
| vulnerability_id |
VCID-7zav-ajzv-xybc |
| summary |
kernel: ext4: silence the warning when evicting inode with dioread_nolock |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50730 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07494 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07533 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07514 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07573 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07593 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.0759 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07576 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07564 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07488 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07476 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07608 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07569 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50730 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50730
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7zav-ajzv-xybc |
|
| 26 |
| url |
VCID-8en8-usp9-gfgp |
| vulnerability_id |
VCID-8en8-usp9-gfgp |
| summary |
kernel: cpufreq: amd-pstate: fix global sysfs attribute type |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53550 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04741 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04764 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04779 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04812 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04825 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0479 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0477 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04723 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04731 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04875 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04912 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53550 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53550
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8en8-usp9-gfgp |
|
| 27 |
| url |
VCID-8tnf-q5r9-67au |
| vulnerability_id |
VCID-8tnf-q5r9-67au |
| summary |
kernel: icmp6: Fix null-ptr-deref of ip6_null_entry->rt6i_idev in icmp6_dev() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53343 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02951 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02937 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0296 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02975 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02965 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02973 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04166 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0403 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04019 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04031 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04154 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53343 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53343
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8tnf-q5r9-67au |
|
| 28 |
| url |
VCID-8xcv-aysz-w3ds |
| vulnerability_id |
VCID-8xcv-aysz-w3ds |
| summary |
kernel: highmem: fix checks in __kmap_local_sched_{in,out} |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49081 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01562 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05532 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.0539 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05381 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05332 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05333 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05492 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10785 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10848 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16983 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.17073 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.1713 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49081 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49081
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8xcv-aysz-w3ds |
|
| 29 |
| url |
VCID-9ucy-kbah-yyae |
| vulnerability_id |
VCID-9ucy-kbah-yyae |
| summary |
kernel: scsi: qedf: Fix NULL dereference in error handling |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54289 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54289 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54289
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9ucy-kbah-yyae |
|
| 30 |
| url |
VCID-9ybb-bzq2-cueb |
| vulnerability_id |
VCID-9ybb-bzq2-cueb |
| summary |
kernel: ceph: fix potential use-after-free bug when trimming caps |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53867 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07346 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0739 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07372 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07427 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07451 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07437 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07424 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07413 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07341 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07329 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07456 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07417 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53867 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53867
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9ybb-bzq2-cueb |
|
| 31 |
| url |
VCID-a67m-rg36-aqgw |
| vulnerability_id |
VCID-a67m-rg36-aqgw |
| summary |
kernel: scsi: target: Fix multiple LUN_RESET handling |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53586 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03055 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03068 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03073 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03098 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0306 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03036 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03025 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03002 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03011 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03131 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03137 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53586 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53586
|
| risk_score |
2.3 |
| exploitability |
0.5 |
| weighted_severity |
4.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-a67m-rg36-aqgw |
|
| 32 |
| url |
VCID-acs7-w3pn-eybs |
| vulnerability_id |
VCID-acs7-w3pn-eybs |
| summary |
kernel: Bluetooth: L2CAP: Fix u8 overflow |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-48947 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00445 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00459 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00444 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00436 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00433 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00435 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00431 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0043 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00427 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00432 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00461 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-48947 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-48947
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-acs7-w3pn-eybs |
|
| 33 |
| url |
VCID-ajp8-kr6j-nyhv |
| vulnerability_id |
VCID-ajp8-kr6j-nyhv |
| summary |
kernel: integer overflow in l2cap_config_req() in net/bluetooth/l2cap_core.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-45934 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00409 |
| scoring_system |
epss |
| scoring_elements |
0.61193 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00409 |
| scoring_system |
epss |
| scoring_elements |
0.61252 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00409 |
| scoring_system |
epss |
| scoring_elements |
0.61221 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00409 |
| scoring_system |
epss |
| scoring_elements |
0.61188 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00409 |
| scoring_system |
epss |
| scoring_elements |
0.61235 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00409 |
| scoring_system |
epss |
| scoring_elements |
0.6125 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00409 |
| scoring_system |
epss |
| scoring_elements |
0.6127 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00409 |
| scoring_system |
epss |
| scoring_elements |
0.61256 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00409 |
| scoring_system |
epss |
| scoring_elements |
0.61238 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00409 |
| scoring_system |
epss |
| scoring_elements |
0.61277 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00409 |
| scoring_system |
epss |
| scoring_elements |
0.61282 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00409 |
| scoring_system |
epss |
| scoring_elements |
0.61263 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-45934 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-45934
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
7.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ajp8-kr6j-nyhv |
|
| 34 |
| url |
VCID-apaa-8wdp-cyfq |
| vulnerability_id |
VCID-apaa-8wdp-cyfq |
| summary |
kernel: improper input validation may lead to privilege escalation |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-4204 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00767 |
| scoring_system |
epss |
| scoring_elements |
0.73414 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00767 |
| scoring_system |
epss |
| scoring_elements |
0.73422 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00767 |
| scoring_system |
epss |
| scoring_elements |
0.73445 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00767 |
| scoring_system |
epss |
| scoring_elements |
0.73417 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00767 |
| scoring_system |
epss |
| scoring_elements |
0.73454 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00767 |
| scoring_system |
epss |
| scoring_elements |
0.73468 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00767 |
| scoring_system |
epss |
| scoring_elements |
0.73491 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00767 |
| scoring_system |
epss |
| scoring_elements |
0.73471 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00767 |
| scoring_system |
epss |
| scoring_elements |
0.73463 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00767 |
| scoring_system |
epss |
| scoring_elements |
0.73505 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00767 |
| scoring_system |
epss |
| scoring_elements |
0.73514 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00767 |
| scoring_system |
epss |
| scoring_elements |
0.73508 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00767 |
| scoring_system |
epss |
| scoring_elements |
0.73541 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-4204 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-4204
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-apaa-8wdp-cyfq |
|
| 35 |
| url |
VCID-awhh-d1hb-y7ak |
| vulnerability_id |
VCID-awhh-d1hb-y7ak |
| summary |
kernel: ice: Block switchdev mode when ADQ is active and vice versa |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53442 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01826 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01838 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0184 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01843 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01857 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01844 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01829 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01824 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02261 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02186 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02197 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02281 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53442 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53442
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-awhh-d1hb-y7ak |
|
| 36 |
| url |
VCID-b4ct-fnbp-43a3 |
| vulnerability_id |
VCID-b4ct-fnbp-43a3 |
| summary |
kernel: cxgb4: use-after-free in ch_flower_stats_cb() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-4133 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01385 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01294 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01299 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01288 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01376 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01298 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.0131 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01315 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01318 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01302 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01296 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-4133 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-4133
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-b4ct-fnbp-43a3 |
|
| 37 |
| url |
VCID-b4j7-s2wg-qfcb |
| vulnerability_id |
VCID-b4j7-s2wg-qfcb |
| summary |
kernel: scsi: qla2xxx: Fix deletion race condition |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53615 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0147 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01473 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01479 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01484 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01486 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01478 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01471 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01472 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01462 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01476 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01565 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01573 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53615 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53615
|
| risk_score |
2.7 |
| exploitability |
0.5 |
| weighted_severity |
5.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-b4j7-s2wg-qfcb |
|
| 38 |
| url |
VCID-ba6k-mvxj-8udm |
| vulnerability_id |
VCID-ba6k-mvxj-8udm |
| summary |
hw: amd: Instruction raise #VC exception at exit |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-25742 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13721 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13713 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13795 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13846 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13815 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13779 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13731 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13641 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13638 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.1371 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13855 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13912 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-25742 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-25742
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ba6k-mvxj-8udm |
|
| 39 |
| url |
VCID-bdew-rk4n-wkcf |
| vulnerability_id |
VCID-bdew-rk4n-wkcf |
| summary |
kernel: null pointer dereference vulnerability in nft_dynset_init() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-6622 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01401 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01405 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01411 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01416 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01417 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.0141 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01402 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01404 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01395 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01408 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01496 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01503 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-6622 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-6622
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bdew-rk4n-wkcf |
|
| 40 |
| url |
VCID-bgyu-226f-zyca |
| vulnerability_id |
VCID-bgyu-226f-zyca |
| summary |
kernel: Linux kernel: Denial of Service via memory leak in mlx5e_init_rep_rx |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54106 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06793 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0684 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06822 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06874 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06907 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.069 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06893 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06888 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0683 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06811 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06956 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06938 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54106 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54106
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bgyu-226f-zyca |
|
| 41 |
| url |
VCID-bh8m-pcw7-c3h5 |
| vulnerability_id |
VCID-bh8m-pcw7-c3h5 |
| summary |
kernel: Linux kernel: RDMA/core GID entry leak causes Denial of Service |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54003 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54003 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54003
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bh8m-pcw7-c3h5 |
|
| 42 |
| url |
VCID-bkxu-zjjm-w3gc |
| vulnerability_id |
VCID-bkxu-zjjm-w3gc |
| summary |
kernel: usb: typec: altmodes/displayport: fix pin_assignment_show |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54186 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54186 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54186
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bkxu-zjjm-w3gc |
|
| 43 |
| url |
VCID-bp25-h13e-3kbw |
| vulnerability_id |
VCID-bp25-h13e-3kbw |
| summary |
kernel: ext4: fix bug_on in __es_tree_search caused by bad quota inode |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50782 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50782 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50782
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bp25-h13e-3kbw |
|
| 44 |
| url |
VCID-brz8-6j8x-aqep |
| vulnerability_id |
VCID-brz8-6j8x-aqep |
| summary |
kernel: tty: n_gsm: add sanity check for gsm->receive in gsm_receive_buf() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49940 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06468 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.0652 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.0651 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.0656 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06602 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06596 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06588 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06579 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.19968 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20082 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20086 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20084 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49940 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49940
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-brz8-6j8x-aqep |
|
| 45 |
| url |
VCID-bss4-njk5-8uhv |
| vulnerability_id |
VCID-bss4-njk5-8uhv |
| summary |
kernel: net/mlx5: DR, fix memory leak in mlx5dr_cmd_create_reformat_ctx |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53546 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02951 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02965 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02973 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02975 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0296 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02937 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02927 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02902 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02912 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03029 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03027 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53546 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53546
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bss4-njk5-8uhv |
|
| 46 |
| url |
VCID-btxx-agn2-mye2 |
| vulnerability_id |
VCID-btxx-agn2-mye2 |
| summary |
kernel: net/core: kernel crash in ETH_P_1588 flow dissector |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52580 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0078 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00813 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00775 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00768 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00762 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00763 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00812 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00781 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52580 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-52580
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-btxx-agn2-mye2 |
|
| 47 |
| url |
VCID-c2mu-8323-1ydz |
| vulnerability_id |
VCID-c2mu-8323-1ydz |
| summary |
kernel: md/raid5-cache: fix null-ptr-deref for r5l_flush_stripe_to_raid() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53210 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03188 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03198 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03201 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03205 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03231 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04256 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04362 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04377 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04292 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04278 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04227 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04236 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53210 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53210
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-c2mu-8323-1ydz |
|
| 48 |
| url |
VCID-c3rn-zqxh-tqdt |
| vulnerability_id |
VCID-c3rn-zqxh-tqdt |
| summary |
kernel: powerpc/kprobes: Fix null pointer reference in arch_prepare_kprobe() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50635 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07346 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0739 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07372 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07427 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07451 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10007 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10037 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10071 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.1003 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10009 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09883 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09858 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50635 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50635
|
| risk_score |
2.6 |
| exploitability |
0.5 |
| weighted_severity |
5.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-c3rn-zqxh-tqdt |
|
| 49 |
| url |
VCID-c4d2-twee-nuft |
| vulnerability_id |
VCID-c4d2-twee-nuft |
| summary |
kernel: bnxt: avoid overflow in bnxt_get_nvram_directory() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53661 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03188 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03198 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03201 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03205 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03231 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03185 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03158 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03142 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03116 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03123 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03242 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03243 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53661 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53661
|
| risk_score |
2.7 |
| exploitability |
0.5 |
| weighted_severity |
5.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-c4d2-twee-nuft |
|
| 50 |
| url |
VCID-cdk9-g2mt-tue1 |
| vulnerability_id |
VCID-cdk9-g2mt-tue1 |
| summary |
kernel: scsi: qla2xxx: Array index may go out of bound |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54179 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54179 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54179
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cdk9-g2mt-tue1 |
|
| 51 |
| url |
VCID-chuj-26tz-gfae |
| vulnerability_id |
VCID-chuj-26tz-gfae |
| summary |
kernel: ACPI: PPTT: Fix to avoid sleep in the atomic context when PPTT is absent |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53070 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15267 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15335 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15139 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15227 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15278 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15248 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15209 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15145 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15058 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15068 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15119 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15157 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53070 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53070
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-chuj-26tz-gfae |
|
| 52 |
| url |
VCID-cs99-jacq-qkey |
| vulnerability_id |
VCID-cs99-jacq-qkey |
| summary |
kernel: use-after-free in l1oip timer handlers |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3565 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06808 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06725 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06717 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06654 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06645 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06801 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06626 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0667 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0665 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06699 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06734 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06732 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3565 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-3565
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cs99-jacq-qkey |
|
| 53 |
| url |
VCID-d2f8-dt9k-37bv |
| vulnerability_id |
VCID-d2f8-dt9k-37bv |
| summary |
kernel: Linux kernel (soundwire): Memory corruption due to incorrect device enumeration completion |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54096 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07494 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07533 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07514 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07573 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07593 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.0759 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07576 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07564 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07488 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07476 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07608 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07569 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54096 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54096
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-d2f8-dt9k-37bv |
|
| 54 |
| url |
VCID-d8ft-ehad-6kap |
| vulnerability_id |
VCID-d8ft-ehad-6kap |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-13631 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05279 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05322 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05353 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05372 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05405 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05428 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05396 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05385 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05376 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05327 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05329 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05487 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05527 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-13631 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-13631
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-d8ft-ehad-6kap |
|
| 55 |
| url |
VCID-dh34-eegq-suf2 |
| vulnerability_id |
VCID-dh34-eegq-suf2 |
| summary |
kernel: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50327 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05695 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05736 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05729 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05769 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05795 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06768 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06777 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06702 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06696 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06687 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06619 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06612 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50327 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50327
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dh34-eegq-suf2 |
|
| 56 |
| url |
VCID-dhnq-vhr2-sbhh |
| vulnerability_id |
VCID-dhnq-vhr2-sbhh |
| summary |
kernel: ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53275 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02476 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02467 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02488 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02491 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02512 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02489 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02392 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02376 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02381 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.0248 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53275 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53275
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dhnq-vhr2-sbhh |
|
| 57 |
| url |
VCID-djyp-77yw-cfh2 |
| vulnerability_id |
VCID-djyp-77yw-cfh2 |
| summary |
kernel: scsi: qla2xxx: Wait for io return on terminate rport |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53322 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02603 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02568 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02617 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02621 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02625 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02645 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02622 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02485 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02483 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02467 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02473 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.0258 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53322 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53322
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-djyp-77yw-cfh2 |
|
| 58 |
| url |
VCID-dmr7-td91-f3dt |
| vulnerability_id |
VCID-dmr7-td91-f3dt |
| summary |
kernel: scsi: qedi: Fix use after free bug in qedi_remove() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54100 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54100 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54100
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dmr7-td91-f3dt |
|
| 59 |
| url |
VCID-dws2-fd38-kfe7 |
| vulnerability_id |
VCID-dws2-fd38-kfe7 |
| summary |
kernel: md: raid1: fix potential OOB in raid1_remove_disk() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53722 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12252 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12297 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12095 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12177 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12228 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12236 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12199 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12163 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12033 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12035 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.1215 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12126 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53722 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53722
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dws2-fd38-kfe7 |
|
| 60 |
| url |
VCID-e7mz-znzm-5yf1 |
| vulnerability_id |
VCID-e7mz-znzm-5yf1 |
| summary |
kernel: mptcp: fix UaF in listener shutdown |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53088 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16289 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16351 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.1615 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16236 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16302 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16284 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16244 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16176 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16114 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16132 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.1617 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16059 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53088 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53088
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-e7mz-znzm-5yf1 |
|
| 61 |
| url |
VCID-ebkx-mvcd-sfde |
| vulnerability_id |
VCID-ebkx-mvcd-sfde |
| summary |
kernel: rsvp: out-of-bounds read in rsvp_classify() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-42755 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00423 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00402 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00404 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.004 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00398 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00393 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00397 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00422 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00406 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.005 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00507 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-42755 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-42755
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ebkx-mvcd-sfde |
|
| 62 |
| url |
VCID-ee81-gwef-x7hg |
| vulnerability_id |
VCID-ee81-gwef-x7hg |
| summary |
kernel: local privileges escalation in kernel/bpf/verifier.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-23222 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00562 |
| scoring_system |
epss |
| scoring_elements |
0.68406 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00562 |
| scoring_system |
epss |
| scoring_elements |
0.68347 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00562 |
| scoring_system |
epss |
| scoring_elements |
0.68372 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00562 |
| scoring_system |
epss |
| scoring_elements |
0.68359 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00562 |
| scoring_system |
epss |
| scoring_elements |
0.68327 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00562 |
| scoring_system |
epss |
| scoring_elements |
0.68366 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00562 |
| scoring_system |
epss |
| scoring_elements |
0.68379 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00562 |
| scoring_system |
epss |
| scoring_elements |
0.68358 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00587 |
| scoring_system |
epss |
| scoring_elements |
0.69101 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00738 |
| scoring_system |
epss |
| scoring_elements |
0.72801 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00738 |
| scoring_system |
epss |
| scoring_elements |
0.72804 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00738 |
| scoring_system |
epss |
| scoring_elements |
0.72825 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-23222 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-23222
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ee81-gwef-x7hg |
|
| 63 |
| url |
VCID-ejyg-b2cr-73gc |
| vulnerability_id |
VCID-ejyg-b2cr-73gc |
| summary |
kernel: x86/sev: Make enc_dec_hypercall() accept a size instead of npages |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53996 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0316 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0317 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03173 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03178 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03203 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03162 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03136 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03122 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03098 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03105 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03225 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53996 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53996
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ejyg-b2cr-73gc |
|
| 64 |
| url |
VCID-emge-avzn-mkgz |
| vulnerability_id |
VCID-emge-avzn-mkgz |
| summary |
kernel: Null Pointer Dereference vulnerability in ida_free in lib/idr.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-6915 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01455 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01359 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01379 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01368 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01362 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01355 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01447 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01364 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01374 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-6915 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-6915
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-emge-avzn-mkgz |
|
| 65 |
| url |
VCID-emkv-9fnu-5kc5 |
| vulnerability_id |
VCID-emkv-9fnu-5kc5 |
| summary |
kernel: mm/swap: fix swap_info_struct race between swapoff and get_swap_pages() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53623 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02326 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02335 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.0233 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02333 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02355 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02332 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02318 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02316 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.023 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02306 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02675 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02384 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53623 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53623
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-emkv-9fnu-5kc5 |
|
| 66 |
| url |
VCID-er3h-4pqj-dqah |
| vulnerability_id |
VCID-er3h-4pqj-dqah |
| summary |
kernel: xfrm: out-of-bounds read in __xfrm_state_filter_match() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39194 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00827 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00828 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00833 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0083 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00819 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00813 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00815 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00814 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.01018 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.01019 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39194 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-39194
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-er3h-4pqj-dqah |
|
| 67 |
| url |
VCID-f86y-uswn-u7ct |
| vulnerability_id |
VCID-f86y-uswn-u7ct |
| summary |
kernel: ethtool: Fix uninitialized number of lanes |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53798 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07494 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07533 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07514 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07573 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07593 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10231 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10211 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10305 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10265 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10246 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10119 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10098 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53798 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53798
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-f86y-uswn-u7ct |
|
| 68 |
| url |
VCID-fm9q-u17m-dqbu |
| vulnerability_id |
VCID-fm9q-u17m-dqbu |
| summary |
kernel: ice: Don't tx before switchdev is fully configured |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53657 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01826 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01838 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0184 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01843 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01857 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01844 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01829 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01824 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01807 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01806 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01887 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0188 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53657 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53657
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fm9q-u17m-dqbu |
|
| 69 |
| url |
VCID-g688-fq6a-abas |
| vulnerability_id |
VCID-g688-fq6a-abas |
| summary |
kernel: Linux ebpf logic vulnerability leads to critical memory read and write gaining root privileges |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0500 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08534 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08631 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08561 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08614 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08606 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08628 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08605 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08593 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09635 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09683 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09483 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09487 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0500 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-0500
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-g688-fq6a-abas |
|
| 70 |
| url |
VCID-ge2g-2ct8-4bdk |
| vulnerability_id |
VCID-ge2g-2ct8-4bdk |
| summary |
kernel: ALSA: ac97: Fix possible NULL dereference in snd_ac97_mixer |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53648 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02683 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02576 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02584 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02693 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08273 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08354 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08345 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08325 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08308 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08337 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08276 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08328 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53648 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53648
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ge2g-2ct8-4bdk |
|
| 71 |
| url |
VCID-gfcn-m7gp-2qh7 |
| vulnerability_id |
VCID-gfcn-m7gp-2qh7 |
| summary |
kernel: local dos vulnerability in scatterwalk_copychunks |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-6176 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01067 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01013 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01026 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01011 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01006 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.00999 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01009 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01015 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01023 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01028 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-6176 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-6176
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gfcn-m7gp-2qh7 |
|
| 72 |
| url |
VCID-gfzy-amh8-cbd3 |
| vulnerability_id |
VCID-gfzy-amh8-cbd3 |
| summary |
kernel: scsi: qla2xxx: Pointer may be dereferenced |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53150 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03051 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03065 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03066 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03069 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03094 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02922 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02902 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02895 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02875 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02885 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03004 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02998 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53150 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53150
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gfzy-amh8-cbd3 |
|
| 73 |
| url |
VCID-ghzf-wqx1-dyhc |
| vulnerability_id |
VCID-ghzf-wqx1-dyhc |
| summary |
kernel: KVM: information leak in KVM_GET_DEBUGREGS ioctl on 32-bit systems |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-1513 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05567 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05531 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05628 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05603 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05565 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06632 |
| published_at |
2026-04-24T12:55:00Z |
|
| 6 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06543 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06537 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06527 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06463 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06471 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06621 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-1513 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-1513
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ghzf-wqx1-dyhc |
|
| 74 |
| url |
VCID-gjpd-7pcg-87bq |
| vulnerability_id |
VCID-gjpd-7pcg-87bq |
| summary |
kernel: Linux kernel: ACPICA undefined behavior due to zero offset to null pointer |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53182 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02476 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02488 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02491 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02512 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02402 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02392 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02376 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02381 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.0248 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02467 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53182 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53182
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gjpd-7pcg-87bq |
|
| 75 |
| url |
VCID-h9yg-t4f4-xkde |
| vulnerability_id |
VCID-h9yg-t4f4-xkde |
| summary |
kernel: null_blk: Always check queue mode setting from configfs |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53576 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02895 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0291 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02919 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0292 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02945 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02915 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02887 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02868 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02879 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02998 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02992 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53576 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53576
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-h9yg-t4f4-xkde |
|
| 76 |
| url |
VCID-hucp-gu2u-97e1 |
| vulnerability_id |
VCID-hucp-gu2u-97e1 |
| summary |
hw: amd: Instruction raise #VC exception at exit |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-25743 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.31891 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.32138 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.32142 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.32104 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.32073 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.32106 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.32084 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.32056 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.32197 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.32235 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.3206 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.32111 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-25743 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-25743
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hucp-gu2u-97e1 |
|
| 77 |
| url |
VCID-hvwv-k9qk-gfar |
| vulnerability_id |
VCID-hvwv-k9qk-gfar |
| summary |
kernel: ip6_vti: fix slab-use-after-free in decode_session6 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53821 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14454 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14487 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14588 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14549 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14491 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14383 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14384 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53821 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53821
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hvwv-k9qk-gfar |
|
| 78 |
| url |
VCID-j1et-eghs-mfdx |
| vulnerability_id |
VCID-j1et-eghs-mfdx |
| summary |
kernel: net/mlx5e: Move representor neigh cleanup to profile cleanup_tx |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54148 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06793 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0684 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06822 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06874 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06907 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.069 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06893 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06888 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0683 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06811 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06956 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06938 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54148 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54148
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-j1et-eghs-mfdx |
|
| 79 |
| url |
VCID-j2y7-nwcd-5qh7 |
| vulnerability_id |
VCID-j2y7-nwcd-5qh7 |
| summary |
kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong con2fb_map assignment |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-38409 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00387 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00389 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00367 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00362 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0039 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00376 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00373 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00372 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00368 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-38409 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-38409
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-j2y7-nwcd-5qh7 |
|
| 80 |
| url |
VCID-j6kj-8t9f-gkfj |
| vulnerability_id |
VCID-j6kj-8t9f-gkfj |
| summary |
kernel: gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52448 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00923 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0097 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0093 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00926 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00915 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0091 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00912 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00908 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00916 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00967 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00927 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52448 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-52448
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-j6kj-8t9f-gkfj |
|
| 81 |
| url |
VCID-j8v6-gx44-67ge |
| vulnerability_id |
VCID-j8v6-gx44-67ge |
| summary |
kernel: Linux kernel: Denial of Service due to memory leak in IP address deletion |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53995 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53995 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53995
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-j8v6-gx44-67ge |
|
| 82 |
| url |
VCID-jjh6-3jy7-sucy |
| vulnerability_id |
VCID-jjh6-3jy7-sucy |
| summary |
kernel: md/raid5-cache: fix a deadlock in r5l_exit_log() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53848 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07346 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0739 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07372 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07427 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07451 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10007 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10037 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10071 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.1003 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10009 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09883 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09858 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53848 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53848
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jjh6-3jy7-sucy |
|
| 83 |
| url |
VCID-jw26-mazb-afag |
| vulnerability_id |
VCID-jw26-mazb-afag |
| summary |
kernel: netfilter: nf_tables: disallow timeout for anonymous sets |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52620 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00874 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00919 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00875 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00877 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00881 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00879 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00868 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00861 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00863 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00862 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00916 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52620 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
| 110 |
|
| 111 |
|
| 112 |
|
| 113 |
|
| 114 |
|
| 115 |
|
| 116 |
|
| 117 |
|
| 118 |
|
| 119 |
|
| 120 |
|
| 121 |
|
| 122 |
|
| 123 |
|
| 124 |
|
| 125 |
|
| 126 |
|
| 127 |
|
| 128 |
|
| 129 |
|
| 130 |
|
| 131 |
|
| 132 |
|
| 133 |
|
| 134 |
|
| 135 |
|
| 136 |
|
| 137 |
|
| 138 |
|
| 139 |
|
| 140 |
|
| 141 |
|
| 142 |
|
| 143 |
|
| 144 |
|
| 145 |
|
| 146 |
|
| 147 |
|
| 148 |
|
| 149 |
|
| 150 |
|
| 151 |
|
| 152 |
|
| 153 |
|
| 154 |
|
| 155 |
|
| 156 |
|
| 157 |
|
| 158 |
|
| 159 |
|
| 160 |
|
| 161 |
|
| 162 |
|
| 163 |
|
| 164 |
|
| 165 |
|
| 166 |
|
| 167 |
|
| 168 |
|
| 169 |
|
| 170 |
|
| 171 |
|
| 172 |
|
| 173 |
|
| 174 |
|
| 175 |
|
| 176 |
|
| 177 |
|
| 178 |
|
| 179 |
|
| 180 |
|
| 181 |
|
| 182 |
|
| 183 |
|
| 184 |
|
| 185 |
|
| 186 |
|
| 187 |
|
| 188 |
|
| 189 |
|
| 190 |
|
| 191 |
|
| 192 |
|
| 193 |
|
| 194 |
|
| 195 |
|
| 196 |
|
| 197 |
|
| 198 |
|
| 199 |
|
| 200 |
|
| 201 |
|
| 202 |
|
| 203 |
|
| 204 |
|
| 205 |
|
| 206 |
|
| 207 |
|
| 208 |
|
| 209 |
|
| 210 |
|
| 211 |
|
| 212 |
|
| 213 |
|
| 214 |
|
| 215 |
|
| 216 |
|
| 217 |
|
| 218 |
|
| 219 |
|
| 220 |
|
| 221 |
|
| 222 |
|
| 223 |
|
| 224 |
|
| 225 |
|
| 226 |
|
| 227 |
|
| 228 |
|
| 229 |
|
| 230 |
|
| 231 |
|
| 232 |
|
| 233 |
|
| 234 |
|
| 235 |
|
| 236 |
|
| 237 |
|
| 238 |
|
| 239 |
|
| 240 |
|
| 241 |
|
| 242 |
|
| 243 |
|
| 244 |
|
| 245 |
|
| 246 |
|
| 247 |
|
| 248 |
|
| 249 |
|
| 250 |
|
| 251 |
|
| 252 |
|
| 253 |
|
| 254 |
|
| 255 |
|
| 256 |
|
| 257 |
|
| 258 |
|
| 259 |
|
| 260 |
|
| 261 |
|
| 262 |
|
| 263 |
|
| 264 |
|
| 265 |
|
| 266 |
|
| 267 |
|
| 268 |
|
| 269 |
|
| 270 |
|
| 271 |
|
| 272 |
|
| 273 |
|
| 274 |
|
| 275 |
|
| 276 |
|
| 277 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-52620
|
| risk_score |
1.7 |
| exploitability |
0.5 |
| weighted_severity |
3.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jw26-mazb-afag |
|
| 84 |
| url |
VCID-jzf5-bz4d-affq |
| vulnerability_id |
VCID-jzf5-bz4d-affq |
| summary |
kernel: xsk: fix refcount underflow in error path |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53698 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07644 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07686 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07655 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07715 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07734 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07732 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07719 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07703 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07629 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09721 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09523 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09673 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53698 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53698
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jzf5-bz4d-affq |
|
| 85 |
| url |
VCID-jzfn-k82f-s3fw |
| vulnerability_id |
VCID-jzfn-k82f-s3fw |
| summary |
kernel: race condition between HCIUARTSETPROTO and HCIUARTGETPROTO in hci_uart_tty_ioctl |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-31083 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00428 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00427 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0042 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00416 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00418 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00414 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00412 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00407 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00437 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00438 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-31083 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-31083
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jzfn-k82f-s3fw |
|
| 86 |
| url |
VCID-k21p-aq3s-dbfu |
| vulnerability_id |
VCID-k21p-aq3s-dbfu |
| summary |
kernel: Linux kernel: Denial of service or memory corruption due to a data race in ALSA PCM memory allocation |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54072 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54072 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54072
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k21p-aq3s-dbfu |
|
| 87 |
| url |
VCID-k7ag-ncz2-rfbn |
| vulnerability_id |
VCID-k7ag-ncz2-rfbn |
| summary |
kernel: ext4: fix delayed allocation bug in ext4_clu_mapped for bigalloc + inline |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50286 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02476 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02488 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02491 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02512 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02402 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02392 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02376 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02381 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.0248 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02467 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50286 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50286
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k7ag-ncz2-rfbn |
|
| 88 |
| url |
VCID-kgkm-shnu-97fc |
| vulnerability_id |
VCID-kgkm-shnu-97fc |
| summary |
kernel: ext4: fix uninititialized value in 'ext4_evict_inode' |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50546 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03107 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0312 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03125 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0315 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03109 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03083 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0307 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03045 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03054 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03175 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03499 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50546 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50546
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kgkm-shnu-97fc |
|
| 89 |
| url |
VCID-ksyu-mqmf-b3g1 |
| vulnerability_id |
VCID-ksyu-mqmf-b3g1 |
| summary |
kernel: platform/x86/amd: pmc: Fix memory leak in amd_pmc_stb_debugfs_open_v2() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54320 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07747 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07792 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07749 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07809 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07826 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07821 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07808 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07794 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07708 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07684 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07837 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54320 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54320
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ksyu-mqmf-b3g1 |
|
| 90 |
| url |
VCID-kt61-914s-3fe1 |
| vulnerability_id |
VCID-kt61-914s-3fe1 |
| summary |
kernel: net: openvswitch: reject negative ifindex |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53843 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06793 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0684 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06822 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06874 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06907 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09299 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09349 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09303 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09273 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09259 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09152 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09144 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53843 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53843
|
| risk_score |
2.3 |
| exploitability |
0.5 |
| weighted_severity |
4.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kt61-914s-3fe1 |
|
| 91 |
| url |
VCID-mbng-7v9u-53bu |
| vulnerability_id |
VCID-mbng-7v9u-53bu |
| summary |
kernel: md/raid10: fix null-ptr-deref of mreplace in raid10_sync_request |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53380 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02951 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02927 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02937 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0296 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02975 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02965 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02973 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04166 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04019 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04031 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04154 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53380 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53380
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mbng-7v9u-53bu |
|
| 92 |
| url |
VCID-mfad-yumu-hyce |
| vulnerability_id |
VCID-mfad-yumu-hyce |
| summary |
kernel: ext4: fix task hung in ext4_xattr_delete_inode |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53089 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12256 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12302 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.121 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12181 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12232 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12241 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12203 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12168 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12037 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.1204 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12155 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.1213 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53089 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53089
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mfad-yumu-hyce |
|
| 93 |
| url |
VCID-mgq1-styv-duak |
| vulnerability_id |
VCID-mgq1-styv-duak |
| summary |
kernel: s390/vfio-ap: fix memory leak in vfio_ap device driver |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53746 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14383 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14384 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14454 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14487 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14628 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14588 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14549 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14491 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53746 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53746
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mgq1-styv-duak |
|
| 94 |
| url |
VCID-mxyb-81yh-e7gs |
| vulnerability_id |
VCID-mxyb-81yh-e7gs |
| summary |
kernel: a race out-of-bound read in vt |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3753 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03356 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03443 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03373 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03351 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03327 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03339 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03457 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03405 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03399 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03416 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03419 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.0344 |
| published_at |
2026-04-09T12:55:00Z |
|
| 12 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03401 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3753 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3753
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mxyb-81yh-e7gs |
|
| 95 |
| url |
VCID-myf8-auba-aqe1 |
| vulnerability_id |
VCID-myf8-auba-aqe1 |
| summary |
kernel: use-after-free in IPv4 IGMP |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-6932 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17843 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17896 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17599 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17687 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17749 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17767 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17721 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.1767 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17615 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17623 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.1766 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.1757 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-6932 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-6932
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-myf8-auba-aqe1 |
|
| 96 |
| url |
VCID-n1w6-27yz-dfer |
| vulnerability_id |
VCID-n1w6-27yz-dfer |
| summary |
kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-51779 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28149 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28056 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28192 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.27988 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28098 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28105 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28062 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28004 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31866 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31914 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31893 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.0013 |
| scoring_system |
epss |
| scoring_elements |
0.3222 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-51779 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-51779
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-n1w6-27yz-dfer |
|
| 97 |
| url |
VCID-n21r-funt-2faf |
| vulnerability_id |
VCID-n21r-funt-2faf |
| summary |
kernel: netfilter: nf_tables: memory leak when more than 255 elements expired |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52581 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00825 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00863 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00826 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00831 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00828 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00817 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00811 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00812 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00816 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00862 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52581 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-52581
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-n21r-funt-2faf |
|
| 98 |
| url |
VCID-n4c6-4174-5fhz |
| vulnerability_id |
VCID-n4c6-4174-5fhz |
| summary |
kernel: KVM: s390: fix setting of fpc register |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52597 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05503 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.0571 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05538 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05537 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05575 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05599 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05571 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05559 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05553 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05501 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05511 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05675 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52597 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
| 110 |
|
| 111 |
|
| 112 |
|
| 113 |
|
| 114 |
|
| 115 |
|
| 116 |
|
| 117 |
|
| 118 |
|
| 119 |
|
| 120 |
|
| 121 |
|
| 122 |
|
| 123 |
|
| 124 |
|
| 125 |
|
| 126 |
|
| 127 |
|
| 128 |
|
| 129 |
|
| 130 |
|
| 131 |
|
| 132 |
|
| 133 |
|
| 134 |
|
| 135 |
|
| 136 |
|
| 137 |
|
| 138 |
|
| 139 |
|
| 140 |
|
| 141 |
|
| 142 |
|
| 143 |
|
| 144 |
|
| 145 |
|
| 146 |
|
| 147 |
|
| 148 |
|
| 149 |
|
| 150 |
|
| 151 |
|
| 152 |
|
| 153 |
|
| 154 |
|
| 155 |
|
| 156 |
|
| 157 |
|
| 158 |
|
| 159 |
|
| 160 |
|
| 161 |
|
| 162 |
|
| 163 |
|
| 164 |
|
| 165 |
|
| 166 |
|
| 167 |
|
| 168 |
|
| 169 |
|
| 170 |
|
| 171 |
|
| 172 |
|
| 173 |
|
| 174 |
|
| 175 |
|
| 176 |
|
| 177 |
|
| 178 |
|
| 179 |
|
| 180 |
|
| 181 |
|
| 182 |
|
| 183 |
|
| 184 |
|
| 185 |
|
| 186 |
|
| 187 |
|
| 188 |
|
| 189 |
|
| 190 |
|
| 191 |
|
| 192 |
|
| 193 |
|
| 194 |
|
| 195 |
|
| 196 |
|
| 197 |
|
| 198 |
|
| 199 |
|
| 200 |
|
| 201 |
|
| 202 |
|
| 203 |
|
| 204 |
|
| 205 |
|
| 206 |
|
| 207 |
|
| 208 |
|
| 209 |
|
| 210 |
|
| 211 |
|
| 212 |
|
| 213 |
|
| 214 |
|
| 215 |
|
| 216 |
|
| 217 |
|
| 218 |
|
| 219 |
|
| 220 |
|
| 221 |
|
| 222 |
|
| 223 |
|
| 224 |
|
| 225 |
|
| 226 |
|
| 227 |
|
| 228 |
|
| 229 |
|
| 230 |
|
| 231 |
|
| 232 |
|
| 233 |
|
| 234 |
|
| 235 |
|
| 236 |
|
| 237 |
|
| 238 |
|
| 239 |
|
| 240 |
|
| 241 |
|
| 242 |
|
| 243 |
|
| 244 |
|
| 245 |
|
| 246 |
|
| 247 |
|
| 248 |
|
| 249 |
|
| 250 |
|
| 251 |
|
| 252 |
|
| 253 |
|
| 254 |
|
| 255 |
|
| 256 |
|
| 257 |
|
| 258 |
|
| 259 |
|
| 260 |
|
| 261 |
|
| 262 |
|
| 263 |
|
| 264 |
|
| 265 |
|
| 266 |
|
| 267 |
|
| 268 |
|
| 269 |
|
| 270 |
|
| 271 |
|
| 272 |
|
| 273 |
|
| 274 |
|
| 275 |
|
| 276 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-52597
|
| risk_score |
1.8 |
| exploitability |
0.5 |
| weighted_severity |
3.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-n4c6-4174-5fhz |
|
| 99 |
| url |
VCID-n53a-ps37-bbf3 |
| vulnerability_id |
VCID-n53a-ps37-bbf3 |
| summary |
kernel: out of bounds read in drivers/media/usb/dvb-usb/technisat-usb2.c |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-15505 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0098 |
| scoring_system |
epss |
| scoring_elements |
0.76702 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0098 |
| scoring_system |
epss |
| scoring_elements |
0.76829 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.0098 |
| scoring_system |
epss |
| scoring_elements |
0.768 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.0098 |
| scoring_system |
epss |
| scoring_elements |
0.76806 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.0098 |
| scoring_system |
epss |
| scoring_elements |
0.76797 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.0098 |
| scoring_system |
epss |
| scoring_elements |
0.76706 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.0098 |
| scoring_system |
epss |
| scoring_elements |
0.76734 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.0098 |
| scoring_system |
epss |
| scoring_elements |
0.76716 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.0098 |
| scoring_system |
epss |
| scoring_elements |
0.76748 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.0098 |
| scoring_system |
epss |
| scoring_elements |
0.76759 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.0098 |
| scoring_system |
epss |
| scoring_elements |
0.76787 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.0098 |
| scoring_system |
epss |
| scoring_elements |
0.76767 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-15505 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-15505
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-n53a-ps37-bbf3 |
|
| 100 |
| url |
VCID-ngut-28y7-fbbq |
| vulnerability_id |
VCID-ngut-28y7-fbbq |
| summary |
kernel: lib/kobject.c vulnerable to fill_kobj_path out-of-bounds write |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-45863 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.0116 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01166 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01179 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01185 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01186 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01155 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01237 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.0117 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01163 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01167 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01516 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-45863 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-45863
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ngut-28y7-fbbq |
|
| 101 |
| url |
VCID-nnck-829f-e3gm |
| vulnerability_id |
VCID-nnck-829f-e3gm |
| summary |
Kernel: double free in hci_conn_cleanup of the bluetooth subsystem |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28464 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03439 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03452 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03465 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03467 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.0349 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03446 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03419 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03394 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03371 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04642 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.0532 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05283 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28464 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-28464
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
7.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nnck-829f-e3gm |
|
| 102 |
| url |
VCID-nt4s-u8z2-73d7 |
| vulnerability_id |
VCID-nt4s-u8z2-73d7 |
| summary |
kernel: RDMA/efa: Fix wrong resources deallocation order |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54201 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07346 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0739 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07372 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07427 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07451 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07437 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07424 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07413 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07341 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07329 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07456 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07417 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54201 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54201
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nt4s-u8z2-73d7 |
|
| 103 |
| url |
VCID-nwjz-2g6n-5bhc |
| vulnerability_id |
VCID-nwjz-2g6n-5bhc |
| summary |
kernel: RDMA/cxgb4: Fix potential null-ptr-deref in pass_establish() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53335 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03188 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03198 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03201 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03205 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03231 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03185 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03158 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04362 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04227 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04236 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04377 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04256 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53335 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53335
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nwjz-2g6n-5bhc |
|
| 104 |
| url |
VCID-nxkh-as3r-cufe |
| vulnerability_id |
VCID-nxkh-as3r-cufe |
| summary |
kernel: net/mlx5e: Check for NOT_READY flag state after locking |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53581 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0145 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01453 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0146 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01465 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01467 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01454 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01443 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01457 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01544 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01552 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53581 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53581
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nxkh-as3r-cufe |
|
| 105 |
| url |
VCID-p2zm-56uv-kqa9 |
| vulnerability_id |
VCID-p2zm-56uv-kqa9 |
| summary |
kernel: iommu/amd/iommu_v2: Fix pasid_state refcount dec hit 0 warning on pasid unbind |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53501 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02895 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0291 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02919 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0292 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02945 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02915 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02887 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02868 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02879 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02998 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02992 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53501 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53501
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-p2zm-56uv-kqa9 |
|
| 106 |
| url |
VCID-punv-whvx-7ydr |
| vulnerability_id |
VCID-punv-whvx-7ydr |
| summary |
kernel: ipv4: NULL pointer dereference in ipv4_send_dest_unreach() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-42754 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01072 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01075 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01082 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01087 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01071 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01065 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01066 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01059 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01068 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01132 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01133 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-42754 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-42754
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-punv-whvx-7ydr |
|
| 107 |
| url |
VCID-pwsz-e7j6-nbch |
| vulnerability_id |
VCID-pwsz-e7j6-nbch |
| summary |
kernel: mptcp: use the workqueue to destroy unaccepted sockets |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53072 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16289 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16351 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.1615 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16236 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16302 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16284 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16244 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16176 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16114 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16132 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.1617 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16059 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53072 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53072
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pwsz-e7j6-nbch |
|
| 108 |
| url |
VCID-pxt2-nr7c-5kcz |
| vulnerability_id |
VCID-pxt2-nr7c-5kcz |
| summary |
kernel: Bluetooth Forward and Future Secrecy Attacks and Defenses |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-24023 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42394 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42261 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.4241 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42418 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42441 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42405 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42375 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42398 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42424 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42362 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00208 |
| scoring_system |
epss |
| scoring_elements |
0.43218 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-24023 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-24023
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pxt2-nr7c-5kcz |
|
| 109 |
| url |
VCID-qhpj-sbnc-t3af |
| vulnerability_id |
VCID-qhpj-sbnc-t3af |
| summary |
kernel: x86/platform/uv: Use alternate source for socket to node data |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53496 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04741 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04764 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04779 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04812 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04825 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0479 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0477 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04723 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04731 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04875 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04912 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53496 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53496
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qhpj-sbnc-t3af |
|
| 110 |
| url |
VCID-qp7s-fafn-a3fe |
| vulnerability_id |
VCID-qp7s-fafn-a3fe |
| summary |
kernel: ixgbe: Fix panic during XDP_TX with > 64 CPUs |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54090 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07346 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0739 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07372 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07427 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07451 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07437 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07424 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07413 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07341 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07329 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07456 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07417 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54090 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54090
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qp7s-fafn-a3fe |
|
| 111 |
| url |
VCID-qtv9-fm5u-7bbg |
| vulnerability_id |
VCID-qtv9-fm5u-7bbg |
| summary |
kernel: scsi: qla2xxx: Check valid rport returned by fc_bsg_to_rport() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54014 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54014 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54014
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qtv9-fm5u-7bbg |
|
| 112 |
| url |
VCID-qu5p-6z4k-pbe4 |
| vulnerability_id |
VCID-qu5p-6z4k-pbe4 |
| summary |
kernel: ext4: Fix function prototype mismatch for ext4_feat_ktype |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53224 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02965 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02951 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02975 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02973 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04166 |
| published_at |
2026-04-24T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04067 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04056 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0403 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04019 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04031 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04154 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53224 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53224
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qu5p-6z4k-pbe4 |
|
| 113 |
| url |
VCID-qwzq-jrtt-7yhk |
| vulnerability_id |
VCID-qwzq-jrtt-7yhk |
| summary |
kernel: net/mlx5e: fix memory leak in mlx5e_ptp_open |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54169 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07346 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0739 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07372 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07427 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07451 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07437 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07424 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07413 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07341 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07329 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07456 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07417 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54169 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54169
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qwzq-jrtt-7yhk |
|
| 114 |
| url |
VCID-rekt-2vyj-z7g8 |
| vulnerability_id |
VCID-rekt-2vyj-z7g8 |
| summary |
kernel: dm: fix a race condition in retrieve_deps |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54324 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06793 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0684 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06822 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06874 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06907 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.069 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06893 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06888 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0683 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06811 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06956 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06938 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54324 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54324
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rekt-2vyj-z7g8 |
|
| 115 |
| url |
VCID-rw4x-nvsd-8ucb |
| vulnerability_id |
VCID-rw4x-nvsd-8ucb |
| summary |
kernel: hugetlbfs: Null pointer dereference in hugetlbfs_fill_super function |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-0841 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01536 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01425 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01439 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01527 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01433 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01438 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01443 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01447 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.0145 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01442 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01434 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-0841 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
| 110 |
|
| 111 |
|
| 112 |
|
| 113 |
|
| 114 |
|
| 115 |
|
| 116 |
|
| 117 |
|
| 118 |
|
| 119 |
|
| 120 |
|
| 121 |
|
| 122 |
|
| 123 |
|
| 124 |
|
| 125 |
|
| 126 |
|
| 127 |
|
| 128 |
|
| 129 |
|
| 130 |
|
| 131 |
|
| 132 |
|
| 133 |
|
| 134 |
|
| 135 |
|
| 136 |
|
| 137 |
|
| 138 |
|
| 139 |
|
| 140 |
|
| 141 |
|
| 142 |
|
| 143 |
|
| 144 |
|
| 145 |
|
| 146 |
|
| 147 |
|
| 148 |
|
| 149 |
|
| 150 |
|
| 151 |
|
| 152 |
|
| 153 |
|
| 154 |
|
| 155 |
|
| 156 |
|
| 157 |
|
| 158 |
|
| 159 |
|
| 160 |
|
| 161 |
|
| 162 |
|
| 163 |
|
| 164 |
|
| 165 |
|
| 166 |
|
| 167 |
|
| 168 |
|
| 169 |
|
| 170 |
|
| 171 |
|
| 172 |
|
| 173 |
|
| 174 |
|
| 175 |
|
| 176 |
|
| 177 |
|
| 178 |
|
| 179 |
|
| 180 |
|
| 181 |
|
| 182 |
|
| 183 |
|
| 184 |
|
| 185 |
|
| 186 |
|
| 187 |
|
| 188 |
|
| 189 |
|
| 190 |
|
| 191 |
|
| 192 |
|
| 193 |
|
| 194 |
|
| 195 |
|
| 196 |
|
| 197 |
|
| 198 |
|
| 199 |
|
| 200 |
|
| 201 |
|
| 202 |
|
| 203 |
|
| 204 |
|
| 205 |
|
| 206 |
|
| 207 |
|
| 208 |
|
| 209 |
|
| 210 |
|
| 211 |
|
| 212 |
|
| 213 |
|
| 214 |
|
| 215 |
|
| 216 |
|
| 217 |
|
| 218 |
|
| 219 |
|
| 220 |
|
| 221 |
|
| 222 |
|
| 223 |
|
| 224 |
|
| 225 |
|
| 226 |
|
| 227 |
|
| 228 |
|
| 229 |
|
| 230 |
|
| 231 |
|
| 232 |
|
| 233 |
|
| 234 |
|
| 235 |
|
| 236 |
|
| 237 |
|
| 238 |
|
| 239 |
|
| 240 |
|
| 241 |
|
| 242 |
|
| 243 |
|
| 244 |
|
| 245 |
|
| 246 |
|
| 247 |
|
| 248 |
|
| 249 |
|
| 250 |
|
| 251 |
|
| 252 |
|
| 253 |
|
| 254 |
|
| 255 |
|
| 256 |
|
| 257 |
|
| 258 |
|
| 259 |
|
| 260 |
|
| 261 |
|
| 262 |
|
| 263 |
|
| 264 |
|
| 265 |
|
| 266 |
|
| 267 |
|
| 268 |
|
| 269 |
|
| 270 |
|
| 271 |
|
| 272 |
|
| 273 |
|
| 274 |
|
| 275 |
|
| 276 |
|
| 277 |
|
| 278 |
|
| 279 |
|
| 280 |
|
| 281 |
|
| 282 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-0841
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rw4x-nvsd-8ucb |
|
| 116 |
| url |
VCID-s4zv-a972-6udg |
| vulnerability_id |
VCID-s4zv-a972-6udg |
| summary |
kernel: VMCI: Use threaded irqs instead of tasklets |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49759 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06046 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06258 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06128 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06121 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06082 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06094 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06242 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06079 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06062 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06102 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06142 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06133 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49759 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49759
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-s4zv-a972-6udg |
|
| 117 |
| url |
VCID-sc4h-g6yp-cud9 |
| vulnerability_id |
VCID-sc4h-g6yp-cud9 |
| summary |
kernel: scsi: core: Remove the /proc/scsi/${proc_name} directory earlier |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53140 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25922 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25964 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.2573 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25802 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25853 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25864 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25823 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25767 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25768 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25751 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25723 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25668 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53140 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53140
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sc4h-g6yp-cud9 |
|
| 118 |
| url |
VCID-sv6b-1fxf-2ygx |
| vulnerability_id |
VCID-sv6b-1fxf-2ygx |
| summary |
kernel: vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52973 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07882 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07839 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07922 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07936 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07953 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07964 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07944 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07929 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07886 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13298 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.1321 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13291 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52973 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-52973
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sv6b-1fxf-2ygx |
|
| 119 |
| url |
VCID-t2jg-dbdj-r3av |
| vulnerability_id |
VCID-t2jg-dbdj-r3av |
| summary |
kernel: ICMPv6 “Packet Too Big” packets force a DoS of the Linux kernel by forcing 100% CPU |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52340 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24572 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24267 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.2447 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24412 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24428 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24419 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24393 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24608 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24385 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24454 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24498 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24514 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-52340 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-52340
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t2jg-dbdj-r3av |
|
| 120 |
| url |
VCID-t37x-b4vt-6kd7 |
| vulnerability_id |
VCID-t37x-b4vt-6kd7 |
| summary |
kernel: RDMA/cma: Allow UD qp_type to join multicast only |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53525 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02895 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0291 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02919 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0292 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02945 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02915 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02887 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02868 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02879 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02998 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02992 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53525 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53525
|
| risk_score |
2.6 |
| exploitability |
0.5 |
| weighted_severity |
5.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t37x-b4vt-6kd7 |
|
| 121 |
| url |
VCID-t6vp-xgs3-cqda |
| vulnerability_id |
VCID-t6vp-xgs3-cqda |
| summary |
kernel: igb: Fix igb_down hung on surprise removal |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53148 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03613 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03629 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03638 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.0364 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03661 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03497 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03469 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03444 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03417 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03428 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03548 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03556 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53148 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53148
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t6vp-xgs3-cqda |
|
| 122 |
| url |
VCID-t976-sdzs-jybn |
| vulnerability_id |
VCID-t976-sdzs-jybn |
| summary |
kernel: ACPI: processor: Check for null return of devm_kzalloc() in fch_misc_setup() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53483 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01826 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01838 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0184 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01843 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01857 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01844 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01829 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01824 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01807 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01806 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01887 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0188 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53483 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53483
|
| risk_score |
2.3 |
| exploitability |
0.5 |
| weighted_severity |
4.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t976-sdzs-jybn |
|
| 123 |
| url |
VCID-tcr1-maek-3qed |
| vulnerability_id |
VCID-tcr1-maek-3qed |
| summary |
kernel: use-after-free in read in vt_do_kdgkb_ioctl |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-25656 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01337 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01347 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01353 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01362 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01367 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01366 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01355 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.0135 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01351 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05047 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04863 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04871 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05017 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-25656 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-25656
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tcr1-maek-3qed |
|
| 124 |
| url |
VCID-tm9p-gvrt-yqa3 |
| vulnerability_id |
VCID-tm9p-gvrt-yqa3 |
| summary |
kernel: igc: Fix Kernel Panic during ndo_tx_timeout callback |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54166 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07346 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0739 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07372 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07427 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07451 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07437 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07424 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07413 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07341 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07329 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07456 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07417 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54166 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54166
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tm9p-gvrt-yqa3 |
|
| 125 |
| url |
VCID-tsrm-wf4b-yydy |
| vulnerability_id |
VCID-tsrm-wf4b-yydy |
| summary |
kernel: jbd2: fix assertion 'jh->b_frozen_data == NULL' failure when journal aborted |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50126 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03716 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03743 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03757 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.0376 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03784 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03744 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03722 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03696 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13297 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.1321 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13209 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.1329 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50126 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50126
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tsrm-wf4b-yydy |
|
| 126 |
| url |
VCID-tt8d-32cv-kuc9 |
| vulnerability_id |
VCID-tt8d-32cv-kuc9 |
| summary |
kernel: iw_cxgb4: Fix potential NULL dereference in c4iw_fill_res_cm_id_entry() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53476 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03188 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03198 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03201 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03205 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03231 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03185 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03158 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03142 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03116 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03123 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03242 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03243 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53476 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53476
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tt8d-32cv-kuc9 |
|
| 127 |
| url |
VCID-u2wy-4dp3-nubj |
| vulnerability_id |
VCID-u2wy-4dp3-nubj |
| summary |
kernel: HID: intel-ish-hid: Fix kernel panic during warm reset |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53392 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01854 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01866 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01868 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01871 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01884 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0187 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01849 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02592 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02494 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02499 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02606 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53392 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53392
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-u2wy-4dp3-nubj |
|
| 128 |
| url |
VCID-uakf-nme4-nufu |
| vulnerability_id |
VCID-uakf-nme4-nufu |
| summary |
kernel: use-after-free in net/atm/ioctl.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-51780 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05826 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05861 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05855 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05893 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05924 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05903 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05886 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.0585 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05862 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.06015 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.06046 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-51780 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-51780
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-uakf-nme4-nufu |
|
| 129 |
| url |
VCID-upx2-tk53-pyb1 |
| vulnerability_id |
VCID-upx2-tk53-pyb1 |
| summary |
kernel: RDMA/srpt: Add a check for valid 'mad_agent' pointer |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54274 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54274 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54274
|
| risk_score |
2.6 |
| exploitability |
0.5 |
| weighted_severity |
5.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-upx2-tk53-pyb1 |
|
| 130 |
| url |
VCID-uv78-72se-9uaw |
| vulnerability_id |
VCID-uv78-72se-9uaw |
| summary |
kernel: scsi: target: iscsit: Free cmds before session free |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54184 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54184 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54184
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-uv78-72se-9uaw |
|
| 131 |
| url |
VCID-v7gh-5ztd-wufc |
| vulnerability_id |
VCID-v7gh-5ztd-wufc |
| summary |
kernel: bonding: restore bond's IFF_SLAVE flag if a non-eth dev enslave fails |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53103 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20248 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20306 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.2003 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.2011 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20168 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20193 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20149 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.2009 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20082 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20086 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20084 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.19968 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53103 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53103
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-v7gh-5ztd-wufc |
|
| 132 |
| url |
VCID-v9uq-1unx-mug6 |
| vulnerability_id |
VCID-v9uq-1unx-mug6 |
| summary |
kernel: bpf: cpumap: Fix memory leak in cpu_map_update_elem |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53441 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03188 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03198 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03201 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03205 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03231 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03185 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03158 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03142 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04377 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04227 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04236 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04362 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53441 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53441
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-v9uq-1unx-mug6 |
|
| 133 |
| url |
VCID-va52-3n1k-vugn |
| vulnerability_id |
VCID-va52-3n1k-vugn |
| summary |
kernel: ext4: fix null-ptr-deref in ext4_write_info |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50344 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02191 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02129 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02195 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02189 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02212 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02188 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02093 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02089 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02063 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02075 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02161 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50344 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50344
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-va52-3n1k-vugn |
|
| 134 |
| url |
VCID-vjuw-dju4-97cj |
| vulnerability_id |
VCID-vjuw-dju4-97cj |
| summary |
kernel: netfilter: xtables sctp out-of-bounds read in match_flags() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39193 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0082 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00693 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00679 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00672 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00666 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0067 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00819 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00685 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00687 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39193 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-39193
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vjuw-dju4-97cj |
|
| 135 |
| url |
VCID-wrhr-cgd4-4ycs |
| vulnerability_id |
VCID-wrhr-cgd4-4ycs |
| summary |
kernel: USB: usbtmc: Fix direction for 0-length ioctl control messages |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53761 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14383 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14384 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14454 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14487 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14628 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14588 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14549 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14491 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53761 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53761
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wrhr-cgd4-4ycs |
|
| 136 |
| url |
VCID-wv8d-q36s-kyhh |
| vulnerability_id |
VCID-wv8d-q36s-kyhh |
| summary |
kernel: Linux kernel: Denial of Service via null pointer dereference in ACPI |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54010 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54010 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54010
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wv8d-q36s-kyhh |
|
| 137 |
| url |
VCID-wvyb-y46r-rub3 |
| vulnerability_id |
VCID-wvyb-y46r-rub3 |
| summary |
kernel: irdma: Improper access control |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-25775 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00584 |
| scoring_system |
epss |
| scoring_elements |
0.6896 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00584 |
| scoring_system |
epss |
| scoring_elements |
0.6898 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00584 |
| scoring_system |
epss |
| scoring_elements |
0.6901 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00584 |
| scoring_system |
epss |
| scoring_elements |
0.6903 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00584 |
| scoring_system |
epss |
| scoring_elements |
0.69051 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00584 |
| scoring_system |
epss |
| scoring_elements |
0.69037 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00584 |
| scoring_system |
epss |
| scoring_elements |
0.69008 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00584 |
| scoring_system |
epss |
| scoring_elements |
0.69048 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00584 |
| scoring_system |
epss |
| scoring_elements |
0.69057 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00584 |
| scoring_system |
epss |
| scoring_elements |
0.69088 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-25775 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-25775
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wvyb-y46r-rub3 |
|
| 138 |
| url |
VCID-x537-rrdc-1qav |
| vulnerability_id |
VCID-x537-rrdc-1qav |
| summary |
kernel: Linux kernel igb driver: Denial of Service due to improper SR-IOV cleanup |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54070 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07747 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07792 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07749 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07809 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07826 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07821 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07808 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07794 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07708 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07684 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07837 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54070 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54070
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x537-rrdc-1qav |
|
| 139 |
| url |
VCID-x8jd-vket-qkec |
| vulnerability_id |
VCID-x8jd-vket-qkec |
| summary |
kernel: ipv6: Fix out-of-bounds access in ipv6_find_tlv() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53705 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12252 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12297 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12095 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12177 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12228 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12236 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12199 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12163 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12033 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12035 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.1215 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12126 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53705 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53705
|
| risk_score |
3.3 |
| exploitability |
0.5 |
| weighted_severity |
6.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x8jd-vket-qkec |
|
| 140 |
| url |
VCID-xbcy-wz8a-77ba |
| vulnerability_id |
VCID-xbcy-wz8a-77ba |
| summary |
kernel: Linux kernel: Information disclosure and denial of service via use-after-free in ACPI subsystem |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50423 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.027 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02786 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02714 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02719 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02722 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02742 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02713 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02697 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02694 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02673 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02681 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02795 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50423 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50423
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xbcy-wz8a-77ba |
|
| 141 |
| url |
VCID-xewe-3q5z-wbfg |
| vulnerability_id |
VCID-xewe-3q5z-wbfg |
| summary |
kernel: PM: domains: fix memory leak with using debugfs_lookup() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53202 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04603 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04627 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04639 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04673 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04685 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05697 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05732 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05594 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05584 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05576 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05524 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05533 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53202 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53202
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xewe-3q5z-wbfg |
|
| 142 |
| url |
VCID-xgun-w7s3-4key |
| vulnerability_id |
VCID-xgun-w7s3-4key |
| summary |
kernel: usb: host: Fix refcount leak in ehci_hcd_ppc_of_probe |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50153 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06259 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06275 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06321 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06361 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06353 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06298 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06348 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06337 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19468 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19553 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.1956 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19573 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50153 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50153
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xgun-w7s3-4key |
|
| 143 |
| url |
VCID-xvxa-rya9-c3gc |
| vulnerability_id |
VCID-xvxa-rya9-c3gc |
| summary |
kernel: ext4: fix deadlock due to mbcache entry corruption |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50668 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14454 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14487 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14588 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14549 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14491 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14383 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14384 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50668 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50668
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xvxa-rya9-c3gc |
|
| 144 |
| url |
VCID-y5g5-grqv-cbhv |
| vulnerability_id |
VCID-y5g5-grqv-cbhv |
| summary |
kernel: NVMe: info leak due to out-of-bounds read in nvmet_ctrl_find_get |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-6121 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00252 |
| scoring_system |
epss |
| scoring_elements |
0.48565 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00252 |
| scoring_system |
epss |
| scoring_elements |
0.4853 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00252 |
| scoring_system |
epss |
| scoring_elements |
0.48562 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00252 |
| scoring_system |
epss |
| scoring_elements |
0.48612 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00252 |
| scoring_system |
epss |
| scoring_elements |
0.48607 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00252 |
| scoring_system |
epss |
| scoring_elements |
0.48553 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00252 |
| scoring_system |
epss |
| scoring_elements |
0.48504 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00252 |
| scoring_system |
epss |
| scoring_elements |
0.48559 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00252 |
| scoring_system |
epss |
| scoring_elements |
0.48555 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00252 |
| scoring_system |
epss |
| scoring_elements |
0.48576 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00252 |
| scoring_system |
epss |
| scoring_elements |
0.48549 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-6121 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-6121
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-y5g5-grqv-cbhv |
|
| 145 |
| url |
VCID-y5ww-vmwk-k3dr |
| vulnerability_id |
VCID-y5ww-vmwk-k3dr |
| summary |
kernel: Linux kernel UDPLITE: Denial of Service via null pointer dereference |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54004 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10975 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10834 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-54004 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-54004
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-y5ww-vmwk-k3dr |
|
| 146 |
| url |
VCID-y7h4-s9p8-d3hd |
| vulnerability_id |
VCID-y7h4-s9p8-d3hd |
| summary |
kernel: scsi: qla2xxx: Fix potential NULL pointer dereference |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53451 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02951 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02965 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02973 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02975 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0296 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02937 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02927 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02902 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02912 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03029 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03027 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53451 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53451
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-y7h4-s9p8-d3hd |
|
| 147 |
| url |
VCID-y9vh-w3k6-ebgu |
| vulnerability_id |
VCID-y9vh-w3k6-ebgu |
| summary |
kernel: netfilter: xtables out-of-bounds read in u32_match_it() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39192 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.01022 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0096 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00821 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00815 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00816 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0082 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.01021 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0083 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00834 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00832 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39192 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-39192
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-y9vh-w3k6-ebgu |
|
| 148 |
| url |
VCID-yaps-gywk-auaf |
| vulnerability_id |
VCID-yaps-gywk-auaf |
| summary |
kernel: blk-mq: fix IO hang from sbitmap wakeup race |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26671 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.01018 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0097 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00978 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00983 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00979 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00964 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00958 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00955 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00962 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.01017 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26671 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
| 110 |
|
| 111 |
|
| 112 |
|
| 113 |
|
| 114 |
|
| 115 |
|
| 116 |
|
| 117 |
|
| 118 |
|
| 119 |
|
| 120 |
|
| 121 |
|
| 122 |
|
| 123 |
|
| 124 |
|
| 125 |
|
| 126 |
|
| 127 |
|
| 128 |
|
| 129 |
|
| 130 |
|
| 131 |
|
| 132 |
|
| 133 |
|
| 134 |
|
| 135 |
|
| 136 |
|
| 137 |
|
| 138 |
|
| 139 |
|
| 140 |
|
| 141 |
|
| 142 |
|
| 143 |
|
| 144 |
|
| 145 |
|
| 146 |
|
| 147 |
|
| 148 |
|
| 149 |
|
| 150 |
|
| 151 |
|
| 152 |
|
| 153 |
|
| 154 |
|
| 155 |
|
| 156 |
|
| 157 |
|
| 158 |
|
| 159 |
|
| 160 |
|
| 161 |
|
| 162 |
|
| 163 |
|
| 164 |
|
| 165 |
|
| 166 |
|
| 167 |
|
| 168 |
|
| 169 |
|
| 170 |
|
| 171 |
|
| 172 |
|
| 173 |
|
| 174 |
|
| 175 |
|
| 176 |
|
| 177 |
|
| 178 |
|
| 179 |
|
| 180 |
|
| 181 |
|
| 182 |
|
| 183 |
|
| 184 |
|
| 185 |
|
| 186 |
|
| 187 |
|
| 188 |
|
| 189 |
|
| 190 |
|
| 191 |
|
| 192 |
|
| 193 |
|
| 194 |
|
| 195 |
|
| 196 |
|
| 197 |
|
| 198 |
|
| 199 |
|
| 200 |
|
| 201 |
|
| 202 |
|
| 203 |
|
| 204 |
|
| 205 |
|
| 206 |
|
| 207 |
|
| 208 |
|
| 209 |
|
| 210 |
|
| 211 |
|
| 212 |
|
| 213 |
|
| 214 |
|
| 215 |
|
| 216 |
|
| 217 |
|
| 218 |
|
| 219 |
|
| 220 |
|
| 221 |
|
| 222 |
|
| 223 |
|
| 224 |
|
| 225 |
|
| 226 |
|
| 227 |
|
| 228 |
|
| 229 |
|
| 230 |
|
| 231 |
|
| 232 |
|
| 233 |
|
| 234 |
|
| 235 |
|
| 236 |
|
| 237 |
|
| 238 |
|
| 239 |
|
| 240 |
|
| 241 |
|
| 242 |
|
| 243 |
|
| 244 |
|
| 245 |
|
| 246 |
|
| 247 |
|
| 248 |
|
| 249 |
|
| 250 |
|
| 251 |
|
| 252 |
|
| 253 |
|
| 254 |
|
| 255 |
|
| 256 |
|
| 257 |
|
| 258 |
|
| 259 |
|
| 260 |
|
| 261 |
|
| 262 |
|
| 263 |
|
| 264 |
|
| 265 |
|
| 266 |
|
| 267 |
|
| 268 |
|
| 269 |
|
| 270 |
|
| 271 |
|
| 272 |
|
| 273 |
|
| 274 |
|
| 275 |
|
| 276 |
|
| 277 |
|
| 278 |
|
| 279 |
|
| 280 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-26671
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yaps-gywk-auaf |
|
| 149 |
|
| 150 |
| url |
VCID-ytjs-9bm9-jfbu |
| vulnerability_id |
VCID-ytjs-9bm9-jfbu |
| summary |
kernel: Linux kernel: md/raid10 soft lockup due to unlimited plugged bio |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53151 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01539 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01542 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01546 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0155 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01556 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01472 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01466 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01467 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01456 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01471 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01558 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01566 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53151 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53151
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ytjs-9bm9-jfbu |
|
| 151 |
| url |
VCID-z1up-e2xz-7yak |
| vulnerability_id |
VCID-z1up-e2xz-7yak |
| summary |
kernel: mm/slub: add missing TID updates on slab deactivation |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49700 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10701 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10638 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18226 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18305 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18388 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18441 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.1844 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18393 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18342 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18286 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18298 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18324 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49700 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49700
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-z1up-e2xz-7yak |
|
| 152 |
| url |
VCID-z6t2-t5hv-a7hg |
| vulnerability_id |
VCID-z6t2-t5hv-a7hg |
| summary |
kernel: scsi: qla2xxx: Remove unused nvme_ls_waitq wait queue |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53280 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02807 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02821 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02853 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02832 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02829 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02822 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04021 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0393 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.039 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0388 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0389 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04011 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53280 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53280
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-z6t2-t5hv-a7hg |
|
| 153 |
| url |
VCID-zfcy-q38c-ykhx |
| vulnerability_id |
VCID-zfcy-q38c-ykhx |
| summary |
kernel: ip6mr: Fix skb_under_panic in ip6mr_cache_report() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53365 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02951 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02937 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0296 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02975 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02965 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02973 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04166 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0403 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04019 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04031 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04154 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53365 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53365
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zfcy-q38c-ykhx |
|
| 154 |
| url |
VCID-zhhm-x29t-c3gg |
| vulnerability_id |
VCID-zhhm-x29t-c3gg |
| summary |
kernel: netfilter: nftables out-of-bounds read in nf_osf_match_one() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39189 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00813 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00816 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0082 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00817 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00808 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00802 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00803 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00807 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00999 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.01 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39189 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-39189
|
| risk_score |
2.3 |
| exploitability |
0.5 |
| weighted_severity |
4.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zhhm-x29t-c3gg |
|
| 155 |
| url |
VCID-zkhc-9mvm-83c2 |
| vulnerability_id |
VCID-zkhc-9mvm-83c2 |
| summary |
kernel: KVM: s390/diag: fix racy access of physical cpu number in diag 9c handler |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53205 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03458 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03471 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03484 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03487 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03509 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04645 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04687 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04557 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04541 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04525 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04501 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0451 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53205 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53205
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zkhc-9mvm-83c2 |
|
| 156 |
| url |
VCID-zph7-5zjb-quae |
| vulnerability_id |
VCID-zph7-5zjb-quae |
| summary |
kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-3567 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00709 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00705 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00708 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00699 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00698 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00693 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00692 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00686 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00734 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00736 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-3567 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-3567
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zph7-5zjb-quae |
|
| 157 |
| url |
VCID-zwem-xgyr-73dw |
| vulnerability_id |
VCID-zwem-xgyr-73dw |
| summary |
kernel: ext4: fix bug_on in __es_tree_search caused by bad boot loader inode |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50638 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.1533 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.154 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15203 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15291 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15341 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19753 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19648 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19866 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19821 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19764 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19739 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19741 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50638 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50638
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zwem-xgyr-73dw |
|
| 158 |
| url |
VCID-zype-8718-47g9 |
| vulnerability_id |
VCID-zype-8718-47g9 |
| summary |
kernel: net/mlx5e: fix memory leak in mlx5e_fs_tt_redirect_any_create |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53371 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01826 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0184 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01838 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01843 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01857 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01844 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01829 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01824 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02261 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02186 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02197 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02281 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53371 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53371
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zype-8718-47g9 |
|