Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@4.18.0-477.13.1?arch=el8_8
Typerpm
Namespaceredhat
Namekernel
Version4.18.0-477.13.1
Qualifiers
arch el8_8
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-fah9-g62s-s3h1
vulnerability_id VCID-fah9-g62s-s3h1
summary kernel: crypto: qat - fix out-of-bounds read
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54325.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54325.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-54325
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07346
published_at 2026-04-02T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.0739
published_at 2026-04-04T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.07372
published_at 2026-04-07T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07427
published_at 2026-04-08T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.07451
published_at 2026-04-09T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.07437
published_at 2026-04-11T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.07424
published_at 2026-04-12T12:55:00Z
7
value 0.00026
scoring_system epss
scoring_elements 0.07413
published_at 2026-04-13T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.07341
published_at 2026-04-16T12:55:00Z
9
value 0.00026
scoring_system epss
scoring_elements 0.07329
published_at 2026-04-18T12:55:00Z
10
value 0.00026
scoring_system epss
scoring_elements 0.07456
published_at 2026-04-21T12:55:00Z
11
value 0.00026
scoring_system epss
scoring_elements 0.07417
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-54325
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2426061
reference_id 2426061
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2426061
4
reference_url https://access.redhat.com/errata/RHSA-2023:3349
reference_id RHSA-2023:3349
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3349
5
reference_url https://access.redhat.com/errata/RHSA-2023:3723
reference_id RHSA-2023:3723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3723
6
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
7
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
fixed_packages
aliases CVE-2023-54325
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fah9-g62s-s3h1
1
url VCID-uqu9-hbxy-kqeh
vulnerability_id VCID-uqu9-hbxy-kqeh
summary kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32233.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32233.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32233
reference_id
reference_type
scores
0
value 0.00676
scoring_system epss
scoring_elements 0.71515
published_at 2026-04-16T12:55:00Z
1
value 0.00676
scoring_system epss
scoring_elements 0.71488
published_at 2026-04-12T12:55:00Z
2
value 0.00676
scoring_system epss
scoring_elements 0.71504
published_at 2026-04-11T12:55:00Z
3
value 0.00676
scoring_system epss
scoring_elements 0.71482
published_at 2026-04-09T12:55:00Z
4
value 0.00676
scoring_system epss
scoring_elements 0.7147
published_at 2026-04-13T12:55:00Z
5
value 0.00676
scoring_system epss
scoring_elements 0.71429
published_at 2026-04-07T12:55:00Z
6
value 0.00676
scoring_system epss
scoring_elements 0.71455
published_at 2026-04-04T12:55:00Z
7
value 0.00676
scoring_system epss
scoring_elements 0.71437
published_at 2026-04-02T12:55:00Z
8
value 0.00676
scoring_system epss
scoring_elements 0.71521
published_at 2026-04-18T12:55:00Z
9
value 0.00695
scoring_system epss
scoring_elements 0.71971
published_at 2026-04-24T12:55:00Z
10
value 0.00695
scoring_system epss
scoring_elements 0.71926
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32233
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0386
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0386
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31436
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31436
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32233
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32233
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2196105
reference_id 2196105
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2196105
7
reference_url https://www.openwall.com/lists/oss-security/2023/05/08/4
reference_id 4
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/
url https://www.openwall.com/lists/oss-security/2023/05/08/4
8
reference_url http://www.openwall.com/lists/oss-security/2023/05/15/5
reference_id 5
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/
url http://www.openwall.com/lists/oss-security/2023/05/15/5
9
reference_url https://github.com/torvalds/linux/commit/c1592a89942e9678f7d9c8030efa777c0d57edab
reference_id c1592a89942e9678f7d9c8030efa777c0d57edab
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/
url https://github.com/torvalds/linux/commit/c1592a89942e9678f7d9c8030efa777c0d57edab
10
reference_url https://www.debian.org/security/2023/dsa-5402
reference_id dsa-5402
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/
url https://www.debian.org/security/2023/dsa-5402
11
reference_url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c1592a89942e9678f7d9c8030efa777c0d57edab
reference_id ?id=c1592a89942e9678f7d9c8030efa777c0d57edab
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/
url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c1592a89942e9678f7d9c8030efa777c0d57edab
12
reference_url https://news.ycombinator.com/item?id=35879660
reference_id item?id=35879660
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/
url https://news.ycombinator.com/item?id=35879660
13
reference_url http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html
reference_id Kernel-Live-Patch-Security-Notice-LSN-0095-1.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/
url http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html
14
reference_url https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/
url https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html
15
reference_url https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
reference_id msg00030.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/
url https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
16
reference_url https://security.netapp.com/advisory/ntap-20230616-0002/
reference_id ntap-20230616-0002
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/
url https://security.netapp.com/advisory/ntap-20230616-0002/
17
reference_url https://access.redhat.com/errata/RHSA-2023:3349
reference_id RHSA-2023:3349
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3349
18
reference_url https://access.redhat.com/errata/RHSA-2023:3350
reference_id RHSA-2023:3350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3350
19
reference_url https://access.redhat.com/errata/RHSA-2023:3351
reference_id RHSA-2023:3351
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3351
20
reference_url https://access.redhat.com/errata/RHSA-2023:3465
reference_id RHSA-2023:3465
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3465
21
reference_url https://access.redhat.com/errata/RHSA-2023:3470
reference_id RHSA-2023:3470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3470
22
reference_url https://access.redhat.com/errata/RHSA-2023:3490
reference_id RHSA-2023:3490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3490
23
reference_url https://access.redhat.com/errata/RHSA-2023:3705
reference_id RHSA-2023:3705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3705
24
reference_url https://access.redhat.com/errata/RHSA-2023:3708
reference_id RHSA-2023:3708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3708
25
reference_url https://access.redhat.com/errata/RHSA-2023:3723
reference_id RHSA-2023:3723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3723
26
reference_url https://access.redhat.com/errata/RHSA-2023:3852
reference_id RHSA-2023:3852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3852
27
reference_url https://access.redhat.com/errata/RHSA-2023:3853
reference_id RHSA-2023:3853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3853
28
reference_url https://access.redhat.com/errata/RHSA-2023:4125
reference_id RHSA-2023:4125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4125
29
reference_url https://access.redhat.com/errata/RHSA-2023:4126
reference_id RHSA-2023:4126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4126
30
reference_url https://access.redhat.com/errata/RHSA-2023:4130
reference_id RHSA-2023:4130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4130
31
reference_url https://access.redhat.com/errata/RHSA-2023:4145
reference_id RHSA-2023:4145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4145
32
reference_url https://access.redhat.com/errata/RHSA-2023:4146
reference_id RHSA-2023:4146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4146
33
reference_url https://access.redhat.com/errata/RHSA-2023:4255
reference_id RHSA-2023:4255
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4255
34
reference_url https://access.redhat.com/errata/RHSA-2023:4256
reference_id RHSA-2023:4256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4256
35
reference_url https://access.redhat.com/errata/RHSA-2023:4262
reference_id RHSA-2023:4262
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4262
36
reference_url https://access.redhat.com/errata/RHSA-2023:4696
reference_id RHSA-2023:4696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4696
37
reference_url https://access.redhat.com/errata/RHSA-2023:4699
reference_id RHSA-2023:4699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4699
38
reference_url https://access.redhat.com/errata/RHSA-2023:5419
reference_id RHSA-2023:5419
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5419
39
reference_url https://access.redhat.com/errata/RHSA-2023:5574
reference_id RHSA-2023:5574
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5574
40
reference_url https://access.redhat.com/errata/RHSA-2023:5621
reference_id RHSA-2023:5621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5621
41
reference_url https://access.redhat.com/errata/RHSA-2023:5622
reference_id RHSA-2023:5622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5622
42
reference_url https://usn.ubuntu.com/6122-1/
reference_id USN-6122-1
reference_type
scores
url https://usn.ubuntu.com/6122-1/
43
reference_url https://usn.ubuntu.com/6123-1/
reference_id USN-6123-1
reference_type
scores
url https://usn.ubuntu.com/6123-1/
44
reference_url https://usn.ubuntu.com/6124-1/
reference_id USN-6124-1
reference_type
scores
url https://usn.ubuntu.com/6124-1/
45
reference_url https://usn.ubuntu.com/6127-1/
reference_id USN-6127-1
reference_type
scores
url https://usn.ubuntu.com/6127-1/
46
reference_url https://usn.ubuntu.com/6130-1/
reference_id USN-6130-1
reference_type
scores
url https://usn.ubuntu.com/6130-1/
47
reference_url https://usn.ubuntu.com/6131-1/
reference_id USN-6131-1
reference_type
scores
url https://usn.ubuntu.com/6131-1/
48
reference_url https://usn.ubuntu.com/6132-1/
reference_id USN-6132-1
reference_type
scores
url https://usn.ubuntu.com/6132-1/
49
reference_url https://usn.ubuntu.com/6135-1/
reference_id USN-6135-1
reference_type
scores
url https://usn.ubuntu.com/6135-1/
50
reference_url https://usn.ubuntu.com/6149-1/
reference_id USN-6149-1
reference_type
scores
url https://usn.ubuntu.com/6149-1/
51
reference_url https://usn.ubuntu.com/6150-1/
reference_id USN-6150-1
reference_type
scores
url https://usn.ubuntu.com/6150-1/
52
reference_url https://usn.ubuntu.com/6162-1/
reference_id USN-6162-1
reference_type
scores
url https://usn.ubuntu.com/6162-1/
53
reference_url https://usn.ubuntu.com/6175-1/
reference_id USN-6175-1
reference_type
scores
url https://usn.ubuntu.com/6175-1/
54
reference_url https://usn.ubuntu.com/6186-1/
reference_id USN-6186-1
reference_type
scores
url https://usn.ubuntu.com/6186-1/
55
reference_url https://usn.ubuntu.com/6222-1/
reference_id USN-6222-1
reference_type
scores
url https://usn.ubuntu.com/6222-1/
56
reference_url https://usn.ubuntu.com/6256-1/
reference_id USN-6256-1
reference_type
scores
url https://usn.ubuntu.com/6256-1/
fixed_packages
aliases CVE-2023-32233
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uqu9-hbxy-kqeh
Fixing_vulnerabilities
Risk_score3.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-477.13.1%3Farch=el8_8