Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@5.14.0-70.101.1?arch=el9_0
Typerpm
Namespaceredhat
Namekernel
Version5.14.0-70.101.1
Qualifiers
arch el9_0
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1p3k-f3ck-83bg
vulnerability_id VCID-1p3k-f3ck-83bg
summary kernel: Use-after-free in nft_verdict_dump due to a race between set GC and transaction
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4244.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4244.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4244
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04334
published_at 2026-04-02T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04356
published_at 2026-04-18T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04367
published_at 2026-04-07T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.044
published_at 2026-04-08T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04417
published_at 2026-04-09T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04411
published_at 2026-04-11T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04396
published_at 2026-04-12T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.0438
published_at 2026-04-13T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04347
published_at 2026-04-16T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.04487
published_at 2026-04-21T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04513
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4244
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4244
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2235306
reference_id 2235306
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2235306
5
reference_url https://access.redhat.com/errata/RHSA-2024:1018
reference_id RHSA-2024:1018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1018
6
reference_url https://access.redhat.com/errata/RHSA-2024:1019
reference_id RHSA-2024:1019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1019
7
reference_url https://access.redhat.com/errata/RHSA-2024:1248
reference_id RHSA-2024:1248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1248
8
reference_url https://access.redhat.com/errata/RHSA-2024:2094
reference_id RHSA-2024:2094
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2094
9
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
10
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
11
reference_url https://access.redhat.com/errata/RHSA-2024:3414
reference_id RHSA-2024:3414
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3414
12
reference_url https://access.redhat.com/errata/RHSA-2024:3421
reference_id RHSA-2024:3421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3421
13
reference_url https://usn.ubuntu.com/6444-1/
reference_id USN-6444-1
reference_type
scores
url https://usn.ubuntu.com/6444-1/
14
reference_url https://usn.ubuntu.com/6444-2/
reference_id USN-6444-2
reference_type
scores
url https://usn.ubuntu.com/6444-2/
15
reference_url https://usn.ubuntu.com/6445-1/
reference_id USN-6445-1
reference_type
scores
url https://usn.ubuntu.com/6445-1/
16
reference_url https://usn.ubuntu.com/6445-2/
reference_id USN-6445-2
reference_type
scores
url https://usn.ubuntu.com/6445-2/
17
reference_url https://usn.ubuntu.com/6446-1/
reference_id USN-6446-1
reference_type
scores
url https://usn.ubuntu.com/6446-1/
18
reference_url https://usn.ubuntu.com/6446-2/
reference_id USN-6446-2
reference_type
scores
url https://usn.ubuntu.com/6446-2/
19
reference_url https://usn.ubuntu.com/6446-3/
reference_id USN-6446-3
reference_type
scores
url https://usn.ubuntu.com/6446-3/
20
reference_url https://usn.ubuntu.com/6461-1/
reference_id USN-6461-1
reference_type
scores
url https://usn.ubuntu.com/6461-1/
21
reference_url https://usn.ubuntu.com/6466-1/
reference_id USN-6466-1
reference_type
scores
url https://usn.ubuntu.com/6466-1/
22
reference_url https://usn.ubuntu.com/6503-1/
reference_id USN-6503-1
reference_type
scores
url https://usn.ubuntu.com/6503-1/
23
reference_url https://usn.ubuntu.com/6537-1/
reference_id USN-6537-1
reference_type
scores
url https://usn.ubuntu.com/6537-1/
24
reference_url https://usn.ubuntu.com/6572-1/
reference_id USN-6572-1
reference_type
scores
url https://usn.ubuntu.com/6572-1/
25
reference_url https://usn.ubuntu.com/6681-1/
reference_id USN-6681-1
reference_type
scores
url https://usn.ubuntu.com/6681-1/
26
reference_url https://usn.ubuntu.com/6681-2/
reference_id USN-6681-2
reference_type
scores
url https://usn.ubuntu.com/6681-2/
27
reference_url https://usn.ubuntu.com/6681-3/
reference_id USN-6681-3
reference_type
scores
url https://usn.ubuntu.com/6681-3/
28
reference_url https://usn.ubuntu.com/6681-4/
reference_id USN-6681-4
reference_type
scores
url https://usn.ubuntu.com/6681-4/
29
reference_url https://usn.ubuntu.com/6716-1/
reference_id USN-6716-1
reference_type
scores
url https://usn.ubuntu.com/6716-1/
fixed_packages
aliases CVE-2023-4244
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1p3k-f3ck-83bg
1
url VCID-7ds1-kkxr-b7gx
vulnerability_id VCID-7ds1-kkxr-b7gx
summary kernel: netfilter: nf_tables: possible module reference underflow in error path
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50048.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50048.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50048
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04693
published_at 2026-04-02T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04734
published_at 2026-04-04T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04751
published_at 2026-04-13T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04784
published_at 2026-04-08T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04796
published_at 2026-04-09T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04788
published_at 2026-04-11T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04768
published_at 2026-04-12T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.15157
published_at 2026-04-24T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.15058
published_at 2026-04-16T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.15068
published_at 2026-04-18T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.15119
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50048
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373580
reference_id 2373580
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373580
4
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
5
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
6
reference_url https://access.redhat.com/errata/RHSA-2024:3421
reference_id RHSA-2024:3421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3421
fixed_packages
aliases CVE-2022-50048
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7ds1-kkxr-b7gx
2
url VCID-95xe-xtqt-r3b8
vulnerability_id VCID-95xe-xtqt-r3b8
summary kernel: mlxsw: spectrum_acl_tcam: Fix stack corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26586.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26586.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-26586
reference_id
reference_type
scores
0
value 0.0001
scoring_system epss
scoring_elements 0.01245
published_at 2026-04-24T12:55:00Z
1
value 0.0001
scoring_system epss
scoring_elements 0.0119
published_at 2026-04-09T12:55:00Z
2
value 0.0001
scoring_system epss
scoring_elements 0.01175
published_at 2026-04-11T12:55:00Z
3
value 0.0001
scoring_system epss
scoring_elements 0.01168
published_at 2026-04-12T12:55:00Z
4
value 0.0001
scoring_system epss
scoring_elements 0.01171
published_at 2026-04-13T12:55:00Z
5
value 0.0001
scoring_system epss
scoring_elements 0.0116
published_at 2026-04-16T12:55:00Z
6
value 0.0001
scoring_system epss
scoring_elements 0.01172
published_at 2026-04-18T12:55:00Z
7
value 0.0001
scoring_system epss
scoring_elements 0.01241
published_at 2026-04-21T12:55:00Z
8
value 0.0001
scoring_system epss
scoring_elements 0.01164
published_at 2026-04-02T12:55:00Z
9
value 0.0001
scoring_system epss
scoring_elements 0.0117
published_at 2026-04-04T12:55:00Z
10
value 0.0001
scoring_system epss
scoring_elements 0.01183
published_at 2026-04-07T12:55:00Z
11
value 0.0001
scoring_system epss
scoring_elements 0.01189
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-26586
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26586
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2265645
reference_id 2265645
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2265645
5
reference_url https://git.kernel.org/stable/c/2f5e1565740490706332c06f36211d4ce0f88e62
reference_id 2f5e1565740490706332c06f36211d4ce0f88e62
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T20:41:19Z/
url https://git.kernel.org/stable/c/2f5e1565740490706332c06f36211d4ce0f88e62
6
reference_url https://git.kernel.org/stable/c/348112522a35527c5bcba933b9fefb40a4f44f15
reference_id 348112522a35527c5bcba933b9fefb40a4f44f15
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T20:41:19Z/
url https://git.kernel.org/stable/c/348112522a35527c5bcba933b9fefb40a4f44f15
7
reference_url https://git.kernel.org/stable/c/483ae90d8f976f8339cf81066312e1329f2d3706
reference_id 483ae90d8f976f8339cf81066312e1329f2d3706
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T20:41:19Z/
url https://git.kernel.org/stable/c/483ae90d8f976f8339cf81066312e1329f2d3706
8
reference_url https://git.kernel.org/stable/c/56750ea5d15426b5f307554e7699e8b5f76c3182
reference_id 56750ea5d15426b5f307554e7699e8b5f76c3182
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T20:41:19Z/
url https://git.kernel.org/stable/c/56750ea5d15426b5f307554e7699e8b5f76c3182
9
reference_url https://git.kernel.org/stable/c/6fd24675188d354b1cad47462969afa2ab09d819
reference_id 6fd24675188d354b1cad47462969afa2ab09d819
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T20:41:19Z/
url https://git.kernel.org/stable/c/6fd24675188d354b1cad47462969afa2ab09d819
10
reference_url https://git.kernel.org/stable/c/a361c2c1da5dbb13ca67601cf961ab3ad68af383
reference_id a361c2c1da5dbb13ca67601cf961ab3ad68af383
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T20:41:19Z/
url https://git.kernel.org/stable/c/a361c2c1da5dbb13ca67601cf961ab3ad68af383
11
reference_url https://access.redhat.com/errata/RHSA-2024:1881
reference_id RHSA-2024:1881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1881
12
reference_url https://access.redhat.com/errata/RHSA-2024:1882
reference_id RHSA-2024:1882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1882
13
reference_url https://access.redhat.com/errata/RHSA-2024:2006
reference_id RHSA-2024:2006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2006
14
reference_url https://access.redhat.com/errata/RHSA-2024:2008
reference_id RHSA-2024:2008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2008
15
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
16
reference_url https://access.redhat.com/errata/RHSA-2024:2582
reference_id RHSA-2024:2582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2582
17
reference_url https://access.redhat.com/errata/RHSA-2024:2585
reference_id RHSA-2024:2585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2585
18
reference_url https://access.redhat.com/errata/RHSA-2024:2674
reference_id RHSA-2024:2674
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2674
19
reference_url https://access.redhat.com/errata/RHSA-2024:3414
reference_id RHSA-2024:3414
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3414
20
reference_url https://access.redhat.com/errata/RHSA-2024:3421
reference_id RHSA-2024:3421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3421
21
reference_url https://access.redhat.com/errata/RHSA-2024:3810
reference_id RHSA-2024:3810
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3810
22
reference_url https://access.redhat.com/errata/RHSA-2024:5101
reference_id RHSA-2024:5101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5101
23
reference_url https://access.redhat.com/errata/RHSA-2024:5102
reference_id RHSA-2024:5102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5102
24
reference_url https://usn.ubuntu.com/6725-1/
reference_id USN-6725-1
reference_type
scores
url https://usn.ubuntu.com/6725-1/
25
reference_url https://usn.ubuntu.com/6725-2/
reference_id USN-6725-2
reference_type
scores
url https://usn.ubuntu.com/6725-2/
26
reference_url https://usn.ubuntu.com/6818-1/
reference_id USN-6818-1
reference_type
scores
url https://usn.ubuntu.com/6818-1/
27
reference_url https://usn.ubuntu.com/6818-2/
reference_id USN-6818-2
reference_type
scores
url https://usn.ubuntu.com/6818-2/
28
reference_url https://usn.ubuntu.com/6818-3/
reference_id USN-6818-3
reference_type
scores
url https://usn.ubuntu.com/6818-3/
29
reference_url https://usn.ubuntu.com/6818-4/
reference_id USN-6818-4
reference_type
scores
url https://usn.ubuntu.com/6818-4/
30
reference_url https://usn.ubuntu.com/6819-1/
reference_id USN-6819-1
reference_type
scores
url https://usn.ubuntu.com/6819-1/
31
reference_url https://usn.ubuntu.com/6819-2/
reference_id USN-6819-2
reference_type
scores
url https://usn.ubuntu.com/6819-2/
32
reference_url https://usn.ubuntu.com/6819-3/
reference_id USN-6819-3
reference_type
scores
url https://usn.ubuntu.com/6819-3/
33
reference_url https://usn.ubuntu.com/6819-4/
reference_id USN-6819-4
reference_type
scores
url https://usn.ubuntu.com/6819-4/
34
reference_url https://usn.ubuntu.com/6896-1/
reference_id USN-6896-1
reference_type
scores
url https://usn.ubuntu.com/6896-1/
35
reference_url https://usn.ubuntu.com/6896-2/
reference_id USN-6896-2
reference_type
scores
url https://usn.ubuntu.com/6896-2/
36
reference_url https://usn.ubuntu.com/6896-3/
reference_id USN-6896-3
reference_type
scores
url https://usn.ubuntu.com/6896-3/
37
reference_url https://usn.ubuntu.com/6896-4/
reference_id USN-6896-4
reference_type
scores
url https://usn.ubuntu.com/6896-4/
38
reference_url https://usn.ubuntu.com/6896-5/
reference_id USN-6896-5
reference_type
scores
url https://usn.ubuntu.com/6896-5/
fixed_packages
aliases CVE-2024-26586
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-95xe-xtqt-r3b8
3
url VCID-ag6x-k7xd-tueu
vulnerability_id VCID-ag6x-k7xd-tueu
summary kernel: x86/i8259: Mark legacy PIC interrupts with IRQ_LEVEL
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52993.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52993.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-52993
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.0538
published_at 2026-04-02T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05581
published_at 2026-04-24T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.0541
published_at 2026-04-04T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05417
published_at 2026-04-07T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05452
published_at 2026-04-08T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05473
published_at 2026-04-09T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.05444
published_at 2026-04-11T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05431
published_at 2026-04-12T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05424
published_at 2026-04-13T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.05379
published_at 2026-04-16T12:55:00Z
10
value 0.0002
scoring_system epss
scoring_elements 0.05382
published_at 2026-04-18T12:55:00Z
11
value 0.0002
scoring_system epss
scoring_elements 0.05546
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-52993
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52993
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/0b08201158f177aab469e356b4d6af24fdd118df
reference_id 0b08201158f177aab469e356b4d6af24fdd118df
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T20:08:16Z/
url https://git.kernel.org/stable/c/0b08201158f177aab469e356b4d6af24fdd118df
5
reference_url https://git.kernel.org/stable/c/137f1b47da5f58805da42c1b7811e28c1e353f39
reference_id 137f1b47da5f58805da42c1b7811e28c1e353f39
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T20:08:16Z/
url https://git.kernel.org/stable/c/137f1b47da5f58805da42c1b7811e28c1e353f39
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2355492
reference_id 2355492
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2355492
7
reference_url https://git.kernel.org/stable/c/496975d1a2937f4baadf3d985991b13fc4fc4f27
reference_id 496975d1a2937f4baadf3d985991b13fc4fc4f27
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T20:08:16Z/
url https://git.kernel.org/stable/c/496975d1a2937f4baadf3d985991b13fc4fc4f27
8
reference_url https://git.kernel.org/stable/c/5fa55950729d0762a787451dc52862c3f850f859
reference_id 5fa55950729d0762a787451dc52862c3f850f859
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T20:08:16Z/
url https://git.kernel.org/stable/c/5fa55950729d0762a787451dc52862c3f850f859
9
reference_url https://git.kernel.org/stable/c/744fe9be9665227335539b7a77ece8d9ff62b6c0
reference_id 744fe9be9665227335539b7a77ece8d9ff62b6c0
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T20:08:16Z/
url https://git.kernel.org/stable/c/744fe9be9665227335539b7a77ece8d9ff62b6c0
10
reference_url https://git.kernel.org/stable/c/8770cd9d7c14aa99c255a0d08186f0be953e1638
reference_id 8770cd9d7c14aa99c255a0d08186f0be953e1638
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T20:08:16Z/
url https://git.kernel.org/stable/c/8770cd9d7c14aa99c255a0d08186f0be953e1638
11
reference_url https://git.kernel.org/stable/c/e284c273dbb4c1ed68d4204bff94d0b10e4a90f5
reference_id e284c273dbb4c1ed68d4204bff94d0b10e4a90f5
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T20:08:16Z/
url https://git.kernel.org/stable/c/e284c273dbb4c1ed68d4204bff94d0b10e4a90f5
12
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
13
reference_url https://access.redhat.com/errata/RHSA-2024:3421
reference_id RHSA-2024:3421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3421
fixed_packages
aliases CVE-2023-52993
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ag6x-k7xd-tueu
4
url VCID-ba6k-mvxj-8udm
vulnerability_id VCID-ba6k-mvxj-8udm
summary hw: amd: Instruction raise #VC exception at exit
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-25742.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-25742.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-25742
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.13721
published_at 2026-04-24T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.13713
published_at 2026-04-07T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.13795
published_at 2026-04-08T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13846
published_at 2026-04-09T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13815
published_at 2026-04-11T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13779
published_at 2026-04-12T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13731
published_at 2026-04-13T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13641
published_at 2026-04-16T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.13638
published_at 2026-04-18T12:55:00Z
9
value 0.00045
scoring_system epss
scoring_elements 0.1371
published_at 2026-04-21T12:55:00Z
10
value 0.00045
scoring_system epss
scoring_elements 0.13855
published_at 2026-04-02T12:55:00Z
11
value 0.00045
scoring_system epss
scoring_elements 0.13912
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-25742
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25742
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270836
reference_id 2270836
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270836
5
reference_url https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3008.html
reference_id amd-sb-3008.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-20T14:09:31Z/
url https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3008.html
6
reference_url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.9
reference_id ChangeLog-6.9
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-20T14:09:31Z/
url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.9
7
reference_url https://github.com/torvalds/linux/commit/e3ef461af35a8c74f2f4ce6616491ddb355a208f
reference_id e3ef461af35a8c74f2f4ce6616491ddb355a208f
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-20T14:09:31Z/
url https://github.com/torvalds/linux/commit/e3ef461af35a8c74f2f4ce6616491ddb355a208f
8
reference_url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e3ef461af35a8c74f2f4ce6616491ddb355a208f
reference_id ?id=e3ef461af35a8c74f2f4ce6616491ddb355a208f
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-20T14:09:31Z/
url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e3ef461af35a8c74f2f4ce6616491ddb355a208f
9
reference_url https://access.redhat.com/errata/RHSA-2024:2627
reference_id RHSA-2024:2627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2627
10
reference_url https://access.redhat.com/errata/RHSA-2024:2628
reference_id RHSA-2024:2628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2628
11
reference_url https://access.redhat.com/errata/RHSA-2024:2758
reference_id RHSA-2024:2758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2758
12
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
13
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
14
reference_url https://access.redhat.com/errata/RHSA-2024:3421
reference_id RHSA-2024:3421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3421
15
reference_url https://access.redhat.com/errata/RHSA-2024:3810
reference_id RHSA-2024:3810
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3810
16
reference_url https://usn.ubuntu.com/6921-1/
reference_id USN-6921-1
reference_type
scores
url https://usn.ubuntu.com/6921-1/
17
reference_url https://usn.ubuntu.com/6921-2/
reference_id USN-6921-2
reference_type
scores
url https://usn.ubuntu.com/6921-2/
18
reference_url https://usn.ubuntu.com/6923-1/
reference_id USN-6923-1
reference_type
scores
url https://usn.ubuntu.com/6923-1/
19
reference_url https://usn.ubuntu.com/6923-2/
reference_id USN-6923-2
reference_type
scores
url https://usn.ubuntu.com/6923-2/
20
reference_url https://usn.ubuntu.com/6927-1/
reference_id USN-6927-1
reference_type
scores
url https://usn.ubuntu.com/6927-1/
21
reference_url https://usn.ubuntu.com/6952-1/
reference_id USN-6952-1
reference_type
scores
url https://usn.ubuntu.com/6952-1/
22
reference_url https://usn.ubuntu.com/6952-2/
reference_id USN-6952-2
reference_type
scores
url https://usn.ubuntu.com/6952-2/
23
reference_url https://usn.ubuntu.com/6956-1/
reference_id USN-6956-1
reference_type
scores
url https://usn.ubuntu.com/6956-1/
24
reference_url https://usn.ubuntu.com/6957-1/
reference_id USN-6957-1
reference_type
scores
url https://usn.ubuntu.com/6957-1/
25
reference_url https://usn.ubuntu.com/7019-1/
reference_id USN-7019-1
reference_type
scores
url https://usn.ubuntu.com/7019-1/
fixed_packages
aliases CVE-2024-25742
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ba6k-mvxj-8udm
5
url VCID-dhtg-q7jc-4bdn
vulnerability_id VCID-dhtg-q7jc-4bdn
summary kernel: Marvin vulnerability side-channel leakage in the RSA decryption operation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6240.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6240.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6240
reference_id
reference_type
scores
0
value 0.00051
scoring_system epss
scoring_elements 0.15767
published_at 2026-04-24T12:55:00Z
1
value 0.00066
scoring_system epss
scoring_elements 0.2048
published_at 2026-04-07T12:55:00Z
2
value 0.00066
scoring_system epss
scoring_elements 0.20557
published_at 2026-04-08T12:55:00Z
3
value 0.00066
scoring_system epss
scoring_elements 0.20615
published_at 2026-04-09T12:55:00Z
4
value 0.00066
scoring_system epss
scoring_elements 0.20635
published_at 2026-04-11T12:55:00Z
5
value 0.00066
scoring_system epss
scoring_elements 0.20593
published_at 2026-04-12T12:55:00Z
6
value 0.00066
scoring_system epss
scoring_elements 0.2054
published_at 2026-04-13T12:55:00Z
7
value 0.00066
scoring_system epss
scoring_elements 0.20525
published_at 2026-04-16T12:55:00Z
8
value 0.00066
scoring_system epss
scoring_elements 0.20523
published_at 2026-04-18T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.21171
published_at 2026-04-02T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.2097
published_at 2026-04-21T12:55:00Z
11
value 0.00068
scoring_system epss
scoring_elements 0.21226
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6240
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6240
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6240
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2250843
reference_id 2250843
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-07T21:11:40Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2250843
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv
reference_id cpe:/a:redhat:enterprise_linux:8::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime
reference_id cpe:/a:redhat:enterprise_linux:8::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv
reference_id cpe:/a:redhat:enterprise_linux:9::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime
reference_id cpe:/a:redhat:enterprise_linux:9::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb
reference_id cpe:/a:redhat:rhel_eus:9.0::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::nfv
reference_id cpe:/a:redhat:rhel_eus:9.0::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::nfv
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::realtime
reference_id cpe:/a:redhat:rhel_eus:9.0::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::realtime
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb
reference_id cpe:/a:redhat:rhel_eus:9.2::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv
reference_id cpe:/a:redhat:rhel_eus:9.2::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime
reference_id cpe:/a:redhat:rhel_eus:9.2::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos
reference_id cpe:/o:redhat:rhel_eus:9.0::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
reference_id cpe:/o:redhat:rhel_eus:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
27
reference_url https://access.redhat.com/security/cve/CVE-2023-6240
reference_id CVE-2023-6240
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-07T21:11:40Z/
url https://access.redhat.com/security/cve/CVE-2023-6240
28
reference_url https://securitypitfalls.wordpress.com/2023/10/16/experiment-with-side-channel-attacks-yourself/
reference_id experiment-with-side-channel-attacks-yourself
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-07T21:11:40Z/
url https://securitypitfalls.wordpress.com/2023/10/16/experiment-with-side-channel-attacks-yourself/
29
reference_url https://people.redhat.com/~hkario/marvin/
reference_id marvin
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-07T21:11:40Z/
url https://people.redhat.com/~hkario/marvin/
30
reference_url https://access.redhat.com/errata/RHSA-2024:1881
reference_id RHSA-2024:1881
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-07T21:11:40Z/
url https://access.redhat.com/errata/RHSA-2024:1881
31
reference_url https://access.redhat.com/errata/RHSA-2024:1882
reference_id RHSA-2024:1882
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-07T21:11:40Z/
url https://access.redhat.com/errata/RHSA-2024:1882
32
reference_url https://access.redhat.com/errata/RHSA-2024:2758
reference_id RHSA-2024:2758
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-07T21:11:40Z/
url https://access.redhat.com/errata/RHSA-2024:2758
33
reference_url https://access.redhat.com/errata/RHSA-2024:3414
reference_id RHSA-2024:3414
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-07T21:11:40Z/
url https://access.redhat.com/errata/RHSA-2024:3414
34
reference_url https://access.redhat.com/errata/RHSA-2024:3421
reference_id RHSA-2024:3421
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-07T21:11:40Z/
url https://access.redhat.com/errata/RHSA-2024:3421
35
reference_url https://access.redhat.com/errata/RHSA-2024:3618
reference_id RHSA-2024:3618
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-07T21:11:40Z/
url https://access.redhat.com/errata/RHSA-2024:3618
36
reference_url https://access.redhat.com/errata/RHSA-2024:3627
reference_id RHSA-2024:3627
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-07T21:11:40Z/
url https://access.redhat.com/errata/RHSA-2024:3627
fixed_packages
aliases CVE-2023-6240
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dhtg-q7jc-4bdn
6
url VCID-hucp-gu2u-97e1
vulnerability_id VCID-hucp-gu2u-97e1
summary hw: amd: Instruction raise #VC exception at exit
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-25743.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-25743.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-25743
reference_id
reference_type
scores
0
value 0.00127
scoring_system epss
scoring_elements 0.31891
published_at 2026-04-24T12:55:00Z
1
value 0.00127
scoring_system epss
scoring_elements 0.32138
published_at 2026-04-09T12:55:00Z
2
value 0.00127
scoring_system epss
scoring_elements 0.32142
published_at 2026-04-11T12:55:00Z
3
value 0.00127
scoring_system epss
scoring_elements 0.32104
published_at 2026-04-12T12:55:00Z
4
value 0.00127
scoring_system epss
scoring_elements 0.32073
published_at 2026-04-13T12:55:00Z
5
value 0.00127
scoring_system epss
scoring_elements 0.32106
published_at 2026-04-16T12:55:00Z
6
value 0.00127
scoring_system epss
scoring_elements 0.32084
published_at 2026-04-18T12:55:00Z
7
value 0.00127
scoring_system epss
scoring_elements 0.32056
published_at 2026-04-21T12:55:00Z
8
value 0.00127
scoring_system epss
scoring_elements 0.32197
published_at 2026-04-02T12:55:00Z
9
value 0.00127
scoring_system epss
scoring_elements 0.32235
published_at 2026-04-04T12:55:00Z
10
value 0.00127
scoring_system epss
scoring_elements 0.3206
published_at 2026-04-07T12:55:00Z
11
value 0.00127
scoring_system epss
scoring_elements 0.32111
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-25743
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25743
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270836
reference_id 2270836
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-23T19:06:44Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2270836
5
reference_url https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3008.html
reference_id amd-sb-3008.html
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-23T19:06:44Z/
url https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3008.html
6
reference_url https://access.redhat.com/errata/RHSA-2024:2627
reference_id RHSA-2024:2627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2627
7
reference_url https://access.redhat.com/errata/RHSA-2024:2628
reference_id RHSA-2024:2628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2628
8
reference_url https://access.redhat.com/errata/RHSA-2024:2758
reference_id RHSA-2024:2758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2758
9
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
10
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
11
reference_url https://access.redhat.com/errata/RHSA-2024:3421
reference_id RHSA-2024:3421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3421
12
reference_url https://access.redhat.com/errata/RHSA-2024:3810
reference_id RHSA-2024:3810
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3810
13
reference_url https://bugzilla.suse.com/show_bug.cgi?id=1223307
reference_id show_bug.cgi?id=1223307
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-23T19:06:44Z/
url https://bugzilla.suse.com/show_bug.cgi?id=1223307
fixed_packages
aliases CVE-2024-25743
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hucp-gu2u-97e1
7
url VCID-ktvv-15kj-3fg7
vulnerability_id VCID-ktvv-15kj-3fg7
summary kernel: netfilter: nft_set_rbtree: fix null deref on element insertion
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53566.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53566.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53566
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.02951
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.02965
published_at 2026-04-04T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.02973
published_at 2026-04-07T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.02975
published_at 2026-04-08T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03
published_at 2026-04-09T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.0296
published_at 2026-04-11T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.02937
published_at 2026-04-12T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.02927
published_at 2026-04-13T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.02902
published_at 2026-04-16T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.02912
published_at 2026-04-18T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03029
published_at 2026-04-21T12:55:00Z
11
value 0.00015
scoring_system epss
scoring_elements 0.03027
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53566
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53566
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2401550
reference_id 2401550
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2401550
5
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
6
reference_url https://access.redhat.com/errata/RHSA-2024:3421
reference_id RHSA-2024:3421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3421
fixed_packages
aliases CVE-2023-53566
risk_score 2.9
exploitability 0.5
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ktvv-15kj-3fg7
8
url VCID-nw16-hvw6-k7dn
vulnerability_id VCID-nw16-hvw6-k7dn
summary kernel: netfilter: nf_tables: netlink notifier might race to release objects
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49920.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49920.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49920
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11478
published_at 2026-04-02T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11339
published_at 2026-04-24T12:55:00Z
2
value 0.00038
scoring_system epss
scoring_elements 0.11463
published_at 2026-04-09T12:55:00Z
3
value 0.00038
scoring_system epss
scoring_elements 0.11469
published_at 2026-04-11T12:55:00Z
4
value 0.00038
scoring_system epss
scoring_elements 0.11435
published_at 2026-04-12T12:55:00Z
5
value 0.00038
scoring_system epss
scoring_elements 0.11407
published_at 2026-04-13T12:55:00Z
6
value 0.00038
scoring_system epss
scoring_elements 0.11269
published_at 2026-04-16T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.1127
published_at 2026-04-18T12:55:00Z
8
value 0.00038
scoring_system epss
scoring_elements 0.11397
published_at 2026-04-21T12:55:00Z
9
value 0.00038
scoring_system epss
scoring_elements 0.11537
published_at 2026-04-04T12:55:00Z
10
value 0.00038
scoring_system epss
scoring_elements 0.11322
published_at 2026-04-07T12:55:00Z
11
value 0.00038
scoring_system epss
scoring_elements 0.11404
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49920
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://git.kernel.org/stable/c/1ffe7100411a8b9015115ce124cd6c9c9da6f8e3
reference_id 1ffe7100411a8b9015115ce124cd6c9c9da6f8e3
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T14:58:43Z/
url https://git.kernel.org/stable/c/1ffe7100411a8b9015115ce124cd6c9c9da6f8e3
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2363410
reference_id 2363410
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2363410
5
reference_url https://git.kernel.org/stable/c/d4bc8271db21ea9f1c86a1ca4d64999f184d4aae
reference_id d4bc8271db21ea9f1c86a1ca4d64999f184d4aae
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T14:58:43Z/
url https://git.kernel.org/stable/c/d4bc8271db21ea9f1c86a1ca4d64999f184d4aae
6
reference_url https://git.kernel.org/stable/c/e40b7c44d19e327ad8b49a491ef1fa8dcc4566e0
reference_id e40b7c44d19e327ad8b49a491ef1fa8dcc4566e0
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T14:58:43Z/
url https://git.kernel.org/stable/c/e40b7c44d19e327ad8b49a491ef1fa8dcc4566e0
7
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
8
reference_url https://access.redhat.com/errata/RHSA-2024:3421
reference_id RHSA-2024:3421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3421
fixed_packages
aliases CVE-2022-49920
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nw16-hvw6-k7dn
9
url VCID-p7n2-tzd3-buhk
vulnerability_id VCID-p7n2-tzd3-buhk
summary kernel: netfilter: nftables: exthdr: fix 4-byte stack OOB write
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52628.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52628.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-52628
reference_id
reference_type
scores
0
value 7e-05
scoring_system epss
scoring_elements 0.00548
published_at 2026-04-02T12:55:00Z
1
value 7e-05
scoring_system epss
scoring_elements 0.00562
published_at 2026-04-24T12:55:00Z
2
value 7e-05
scoring_system epss
scoring_elements 0.0054
published_at 2026-04-04T12:55:00Z
3
value 7e-05
scoring_system epss
scoring_elements 0.00539
published_at 2026-04-07T12:55:00Z
4
value 7e-05
scoring_system epss
scoring_elements 0.00536
published_at 2026-04-08T12:55:00Z
5
value 7e-05
scoring_system epss
scoring_elements 0.00531
published_at 2026-04-13T12:55:00Z
6
value 7e-05
scoring_system epss
scoring_elements 0.00532
published_at 2026-04-18T12:55:00Z
7
value 7e-05
scoring_system epss
scoring_elements 0.0053
published_at 2026-04-12T12:55:00Z
8
value 7e-05
scoring_system epss
scoring_elements 0.00528
published_at 2026-04-16T12:55:00Z
9
value 7e-05
scoring_system epss
scoring_elements 0.00567
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-52628
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52628
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/1ad7b189cc1411048434e8595ffcbe7873b71082
reference_id 1ad7b189cc1411048434e8595ffcbe7873b71082
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:07:47Z/
url https://git.kernel.org/stable/c/1ad7b189cc1411048434e8595ffcbe7873b71082
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2272041
reference_id 2272041
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2272041
6
reference_url https://git.kernel.org/stable/c/28a97c43c9e32f437ebb8d6126f9bb7f3ca9521a
reference_id 28a97c43c9e32f437ebb8d6126f9bb7f3ca9521a
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:07:47Z/
url https://git.kernel.org/stable/c/28a97c43c9e32f437ebb8d6126f9bb7f3ca9521a
7
reference_url https://git.kernel.org/stable/c/a7d86a77c33ba1c357a7504341172cc1507f0698
reference_id a7d86a77c33ba1c357a7504341172cc1507f0698
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:07:47Z/
url https://git.kernel.org/stable/c/a7d86a77c33ba1c357a7504341172cc1507f0698
8
reference_url https://git.kernel.org/stable/c/c8f292322ff16b9a2272a67de396c09a50e09dce
reference_id c8f292322ff16b9a2272a67de396c09a50e09dce
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:07:47Z/
url https://git.kernel.org/stable/c/c8f292322ff16b9a2272a67de396c09a50e09dce
9
reference_url https://git.kernel.org/stable/c/cf39c4f77a773a547ac2bcf30ecdd303bb0c80cb
reference_id cf39c4f77a773a547ac2bcf30ecdd303bb0c80cb
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:07:47Z/
url https://git.kernel.org/stable/c/cf39c4f77a773a547ac2bcf30ecdd303bb0c80cb
10
reference_url https://git.kernel.org/stable/c/d9ebfc0f21377690837ebbd119e679243e0099cc
reference_id d9ebfc0f21377690837ebbd119e679243e0099cc
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:07:47Z/
url https://git.kernel.org/stable/c/d9ebfc0f21377690837ebbd119e679243e0099cc
11
reference_url https://git.kernel.org/stable/c/fd94d9dadee58e09b49075240fe83423eb1dcd36
reference_id fd94d9dadee58e09b49075240fe83423eb1dcd36
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:07:47Z/
url https://git.kernel.org/stable/c/fd94d9dadee58e09b49075240fe83423eb1dcd36
12
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
13
reference_url https://access.redhat.com/errata/RHSA-2024:2845
reference_id RHSA-2024:2845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2845
14
reference_url https://access.redhat.com/errata/RHSA-2024:2846
reference_id RHSA-2024:2846
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2846
15
reference_url https://access.redhat.com/errata/RHSA-2024:3414
reference_id RHSA-2024:3414
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3414
16
reference_url https://access.redhat.com/errata/RHSA-2024:3421
reference_id RHSA-2024:3421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3421
fixed_packages
aliases CVE-2023-52628
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p7n2-tzd3-buhk
10
url VCID-qkq7-ws9x-43f7
vulnerability_id VCID-qkq7-ws9x-43f7
summary kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1086.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1086.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-1086
reference_id
reference_type
scores
0
value 0.85405
scoring_system epss
scoring_elements 0.99364
published_at 2026-04-07T12:55:00Z
1
value 0.85405
scoring_system epss
scoring_elements 0.99369
published_at 2026-04-18T12:55:00Z
2
value 0.85405
scoring_system epss
scoring_elements 0.99367
published_at 2026-04-13T12:55:00Z
3
value 0.85405
scoring_system epss
scoring_elements 0.99366
published_at 2026-04-11T12:55:00Z
4
value 0.85405
scoring_system epss
scoring_elements 0.99365
published_at 2026-04-09T12:55:00Z
5
value 0.85911
scoring_system epss
scoring_elements 0.99383
published_at 2026-04-04T12:55:00Z
6
value 0.86056
scoring_system epss
scoring_elements 0.99389
published_at 2026-04-02T12:55:00Z
7
value 0.86753
scoring_system epss
scoring_elements 0.99429
published_at 2026-04-24T12:55:00Z
8
value 0.86753
scoring_system epss
scoring_elements 0.99427
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-1086
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1086
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1086
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://www.openwall.com/lists/oss-security/2024/04/14/1
reference_id 1
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url http://www.openwall.com/lists/oss-security/2024/04/14/1
5
reference_url http://www.openwall.com/lists/oss-security/2024/04/15/2
reference_id 2
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url http://www.openwall.com/lists/oss-security/2024/04/15/2
6
reference_url http://www.openwall.com/lists/oss-security/2024/04/10/22
reference_id 22
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url http://www.openwall.com/lists/oss-security/2024/04/10/22
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2262126
reference_id 2262126
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2262126
8
reference_url http://www.openwall.com/lists/oss-security/2024/04/10/23
reference_id 23
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url http://www.openwall.com/lists/oss-security/2024/04/10/23
9
reference_url http://www.openwall.com/lists/oss-security/2024/04/17/5
reference_id 5
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url http://www.openwall.com/lists/oss-security/2024/04/17/5
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/
reference_id 7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/
11
reference_url https://github.com/Notselwyn/CVE-2024-1086
reference_id CVE-2024-1086
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url https://github.com/Notselwyn/CVE-2024-1086
12
reference_url https://kernel.dance/f342de4e2f33e0e39165d8639387aa6c19dff660
reference_id f342de4e2f33e0e39165d8639387aa6c19dff660
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url https://kernel.dance/f342de4e2f33e0e39165d8639387aa6c19dff660
13
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660
reference_id ?id=f342de4e2f33e0e39165d8639387aa6c19dff660
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660
14
reference_url https://news.ycombinator.com/item?id=39828424
reference_id item?id=39828424
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url https://news.ycombinator.com/item?id=39828424
15
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
reference_id msg00016.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
16
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
reference_id msg00020.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
17
reference_url https://pwning.tech/nftables/
reference_id nftables
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url https://pwning.tech/nftables/
18
reference_url https://security.netapp.com/advisory/ntap-20240614-0009/
reference_id ntap-20240614-0009
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url https://security.netapp.com/advisory/ntap-20240614-0009/
19
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
20
reference_url https://access.redhat.com/errata/RHSA-2024:1018
reference_id RHSA-2024:1018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1018
21
reference_url https://access.redhat.com/errata/RHSA-2024:1019
reference_id RHSA-2024:1019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1019
22
reference_url https://access.redhat.com/errata/RHSA-2024:1249
reference_id RHSA-2024:1249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1249
23
reference_url https://access.redhat.com/errata/RHSA-2024:1332
reference_id RHSA-2024:1332
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1332
24
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
25
reference_url https://access.redhat.com/errata/RHSA-2024:1607
reference_id RHSA-2024:1607
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1607
26
reference_url https://access.redhat.com/errata/RHSA-2024:1614
reference_id RHSA-2024:1614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1614
27
reference_url https://access.redhat.com/errata/RHSA-2024:2093
reference_id RHSA-2024:2093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2093
28
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
29
reference_url https://access.redhat.com/errata/RHSA-2024:2697
reference_id RHSA-2024:2697
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2697
30
reference_url https://access.redhat.com/errata/RHSA-2024:3318
reference_id RHSA-2024:3318
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3318
31
reference_url https://access.redhat.com/errata/RHSA-2024:3319
reference_id RHSA-2024:3319
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3319
32
reference_url https://access.redhat.com/errata/RHSA-2024:3414
reference_id RHSA-2024:3414
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3414
33
reference_url https://access.redhat.com/errata/RHSA-2024:3421
reference_id RHSA-2024:3421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3421
34
reference_url https://access.redhat.com/errata/RHSA-2024:3427
reference_id RHSA-2024:3427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3427
35
reference_url https://access.redhat.com/errata/RHSA-2024:3528
reference_id RHSA-2024:3528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3528
36
reference_url https://access.redhat.com/errata/RHSA-2024:3529
reference_id RHSA-2024:3529
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3529
37
reference_url https://access.redhat.com/errata/RHSA-2024:3530
reference_id RHSA-2024:3530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3530
38
reference_url https://access.redhat.com/errata/RHSA-2024:3805
reference_id RHSA-2024:3805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3805
39
reference_url https://access.redhat.com/errata/RHSA-2024:4073
reference_id RHSA-2024:4073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4073
40
reference_url https://access.redhat.com/errata/RHSA-2024:4074
reference_id RHSA-2024:4074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4074
41
reference_url https://access.redhat.com/errata/RHSA-2024:4075
reference_id RHSA-2024:4075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4075
42
reference_url https://usn.ubuntu.com/6688-1/
reference_id USN-6688-1
reference_type
scores
url https://usn.ubuntu.com/6688-1/
43
reference_url https://usn.ubuntu.com/6700-1/
reference_id USN-6700-1
reference_type
scores
url https://usn.ubuntu.com/6700-1/
44
reference_url https://usn.ubuntu.com/6700-2/
reference_id USN-6700-2
reference_type
scores
url https://usn.ubuntu.com/6700-2/
45
reference_url https://usn.ubuntu.com/6701-1/
reference_id USN-6701-1
reference_type
scores
url https://usn.ubuntu.com/6701-1/
46
reference_url https://usn.ubuntu.com/6701-2/
reference_id USN-6701-2
reference_type
scores
url https://usn.ubuntu.com/6701-2/
47
reference_url https://usn.ubuntu.com/6701-3/
reference_id USN-6701-3
reference_type
scores
url https://usn.ubuntu.com/6701-3/
48
reference_url https://usn.ubuntu.com/6701-4/
reference_id USN-6701-4
reference_type
scores
url https://usn.ubuntu.com/6701-4/
49
reference_url https://usn.ubuntu.com/6702-1/
reference_id USN-6702-1
reference_type
scores
url https://usn.ubuntu.com/6702-1/
50
reference_url https://usn.ubuntu.com/6702-2/
reference_id USN-6702-2
reference_type
scores
url https://usn.ubuntu.com/6702-2/
51
reference_url https://usn.ubuntu.com/6704-1/
reference_id USN-6704-1
reference_type
scores
url https://usn.ubuntu.com/6704-1/
52
reference_url https://usn.ubuntu.com/6704-2/
reference_id USN-6704-2
reference_type
scores
url https://usn.ubuntu.com/6704-2/
53
reference_url https://usn.ubuntu.com/6704-3/
reference_id USN-6704-3
reference_type
scores
url https://usn.ubuntu.com/6704-3/
54
reference_url https://usn.ubuntu.com/6704-4/
reference_id USN-6704-4
reference_type
scores
url https://usn.ubuntu.com/6704-4/
55
reference_url https://usn.ubuntu.com/6705-1/
reference_id USN-6705-1
reference_type
scores
url https://usn.ubuntu.com/6705-1/
56
reference_url https://usn.ubuntu.com/6707-1/
reference_id USN-6707-1
reference_type
scores
url https://usn.ubuntu.com/6707-1/
57
reference_url https://usn.ubuntu.com/6707-2/
reference_id USN-6707-2
reference_type
scores
url https://usn.ubuntu.com/6707-2/
58
reference_url https://usn.ubuntu.com/6707-3/
reference_id USN-6707-3
reference_type
scores
url https://usn.ubuntu.com/6707-3/
59
reference_url https://usn.ubuntu.com/6707-4/
reference_id USN-6707-4
reference_type
scores
url https://usn.ubuntu.com/6707-4/
60
reference_url https://usn.ubuntu.com/6716-1/
reference_id USN-6716-1
reference_type
scores
url https://usn.ubuntu.com/6716-1/
fixed_packages
aliases CVE-2024-1086
risk_score 10.0
exploitability 2.0
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qkq7-ws9x-43f7
11
url VCID-rbrm-7x37-3ugv
vulnerability_id VCID-rbrm-7x37-3ugv
summary kernel: inactive elements in nft_pipapo_walk
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6817.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6817.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6817
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.0549
published_at 2026-04-02T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05524
published_at 2026-04-07T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05561
published_at 2026-04-08T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05585
published_at 2026-04-09T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05558
published_at 2026-04-11T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05545
published_at 2026-04-12T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05537
published_at 2026-04-13T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05488
published_at 2026-04-16T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05498
published_at 2026-04-18T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.0566
published_at 2026-04-21T12:55:00Z
10
value 0.00021
scoring_system epss
scoring_elements 0.05695
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6817
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255139
reference_id 2255139
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255139
22
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
23
reference_url https://access.redhat.com/errata/RHSA-2024:0881
reference_id RHSA-2024:0881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0881
24
reference_url https://access.redhat.com/errata/RHSA-2024:0897
reference_id RHSA-2024:0897
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0897
25
reference_url https://access.redhat.com/errata/RHSA-2024:1018
reference_id RHSA-2024:1018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1018
26
reference_url https://access.redhat.com/errata/RHSA-2024:1019
reference_id RHSA-2024:1019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1019
27
reference_url https://access.redhat.com/errata/RHSA-2024:1248
reference_id RHSA-2024:1248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1248
28
reference_url https://access.redhat.com/errata/RHSA-2024:1268
reference_id RHSA-2024:1268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1268
29
reference_url https://access.redhat.com/errata/RHSA-2024:1269
reference_id RHSA-2024:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1269
30
reference_url https://access.redhat.com/errata/RHSA-2024:1367
reference_id RHSA-2024:1367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1367
31
reference_url https://access.redhat.com/errata/RHSA-2024:1382
reference_id RHSA-2024:1382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1382
32
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
33
reference_url https://access.redhat.com/errata/RHSA-2024:2094
reference_id RHSA-2024:2094
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2094
34
reference_url https://access.redhat.com/errata/RHSA-2024:3414
reference_id RHSA-2024:3414
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3414
35
reference_url https://access.redhat.com/errata/RHSA-2024:3421
reference_id RHSA-2024:3421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3421
36
reference_url https://usn.ubuntu.com/6606-1/
reference_id USN-6606-1
reference_type
scores
url https://usn.ubuntu.com/6606-1/
37
reference_url https://usn.ubuntu.com/6607-1/
reference_id USN-6607-1
reference_type
scores
url https://usn.ubuntu.com/6607-1/
38
reference_url https://usn.ubuntu.com/6608-1/
reference_id USN-6608-1
reference_type
scores
url https://usn.ubuntu.com/6608-1/
39
reference_url https://usn.ubuntu.com/6608-2/
reference_id USN-6608-2
reference_type
scores
url https://usn.ubuntu.com/6608-2/
40
reference_url https://usn.ubuntu.com/6609-1/
reference_id USN-6609-1
reference_type
scores
url https://usn.ubuntu.com/6609-1/
41
reference_url https://usn.ubuntu.com/6609-2/
reference_id USN-6609-2
reference_type
scores
url https://usn.ubuntu.com/6609-2/
42
reference_url https://usn.ubuntu.com/6609-3/
reference_id USN-6609-3
reference_type
scores
url https://usn.ubuntu.com/6609-3/
43
reference_url https://usn.ubuntu.com/6628-1/
reference_id USN-6628-1
reference_type
scores
url https://usn.ubuntu.com/6628-1/
44
reference_url https://usn.ubuntu.com/6628-2/
reference_id USN-6628-2
reference_type
scores
url https://usn.ubuntu.com/6628-2/
45
reference_url https://usn.ubuntu.com/6635-1/
reference_id USN-6635-1
reference_type
scores
url https://usn.ubuntu.com/6635-1/
fixed_packages
aliases CVE-2023-6817
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rbrm-7x37-3ugv
12
url VCID-vtu4-ahaf-yyeq
vulnerability_id VCID-vtu4-ahaf-yyeq
summary kernel: Linux kernel: Denial of Service in netfilter due to improper garbage collection
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53304.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53304.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53304
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.02951
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.02965
published_at 2026-04-04T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03
published_at 2026-04-09T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.02975
published_at 2026-04-08T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.02973
published_at 2026-04-07T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.0296
published_at 2026-04-11T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.04166
published_at 2026-04-24T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.04056
published_at 2026-04-12T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.0403
published_at 2026-04-13T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.04019
published_at 2026-04-16T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.04031
published_at 2026-04-18T12:55:00Z
11
value 0.00017
scoring_system epss
scoring_elements 0.04154
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53304
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53304
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53304
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2395846
reference_id 2395846
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2395846
5
reference_url https://git.kernel.org/stable/c/50cbb9d195c197af671869c8cadce3bd483735a0
reference_id 50cbb9d195c197af671869c8cadce3bd483735a0
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:22:49Z/
url https://git.kernel.org/stable/c/50cbb9d195c197af671869c8cadce3bd483735a0
6
reference_url https://git.kernel.org/stable/c/8284a79136c384059e85e278da2210b809730287
reference_id 8284a79136c384059e85e278da2210b809730287
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:22:49Z/
url https://git.kernel.org/stable/c/8284a79136c384059e85e278da2210b809730287
7
reference_url https://git.kernel.org/stable/c/893cb3c3513cf661a0ff45fe0cfa83fe27131f76
reference_id 893cb3c3513cf661a0ff45fe0cfa83fe27131f76
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:22:49Z/
url https://git.kernel.org/stable/c/893cb3c3513cf661a0ff45fe0cfa83fe27131f76
8
reference_url https://git.kernel.org/stable/c/89a4d1a89751a0fbd520e64091873e19cc0979e8
reference_id 89a4d1a89751a0fbd520e64091873e19cc0979e8
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:22:49Z/
url https://git.kernel.org/stable/c/89a4d1a89751a0fbd520e64091873e19cc0979e8
9
reference_url https://git.kernel.org/stable/c/acaee227cf79c45a5d2d49c3e9a66333a462802c
reference_id acaee227cf79c45a5d2d49c3e9a66333a462802c
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:22:49Z/
url https://git.kernel.org/stable/c/acaee227cf79c45a5d2d49c3e9a66333a462802c
10
reference_url https://git.kernel.org/stable/c/cd66733932399475fe933cb3ec03e687ed401462
reference_id cd66733932399475fe933cb3ec03e687ed401462
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:22:49Z/
url https://git.kernel.org/stable/c/cd66733932399475fe933cb3ec03e687ed401462
11
reference_url https://git.kernel.org/stable/c/f718863aca469a109895cb855e6b81fff4827d71
reference_id f718863aca469a109895cb855e6b81fff4827d71
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:22:49Z/
url https://git.kernel.org/stable/c/f718863aca469a109895cb855e6b81fff4827d71
12
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
13
reference_url https://access.redhat.com/errata/RHSA-2024:3421
reference_id RHSA-2024:3421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3421
fixed_packages
aliases CVE-2023-53304
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vtu4-ahaf-yyeq
13
url VCID-yemh-xwuf-myaq
vulnerability_id VCID-yemh-xwuf-myaq
summary kernel: netfilter: nf_tables: do not allow SET_ID to refer to another table
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50213.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50213.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50213
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06385
published_at 2026-04-02T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06428
published_at 2026-04-04T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06416
published_at 2026-04-07T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06466
published_at 2026-04-08T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06508
published_at 2026-04-09T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06505
published_at 2026-04-11T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06498
published_at 2026-04-12T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06488
published_at 2026-04-13T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.19811
published_at 2026-04-24T12:55:00Z
9
value 0.00064
scoring_system epss
scoring_elements 0.19917
published_at 2026-04-16T12:55:00Z
10
value 0.00064
scoring_system epss
scoring_elements 0.19921
published_at 2026-04-18T12:55:00Z
11
value 0.00064
scoring_system epss
scoring_elements 0.19918
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50213
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50213
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373522
reference_id 2373522
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373522
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
7
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
8
reference_url https://access.redhat.com/errata/RHSA-2024:3421
reference_id RHSA-2024:3421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3421
fixed_packages
aliases CVE-2022-50213
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yemh-xwuf-myaq
14
url VCID-ytxq-fc9h-vyfu
vulnerability_id VCID-ytxq-fc9h-vyfu
summary kernel: netfilter: nf_tables: fix underflow in chain reference counter
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54035.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54035.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-54035
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.06793
published_at 2026-04-02T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.0684
published_at 2026-04-04T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06822
published_at 2026-04-07T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.06874
published_at 2026-04-08T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.06907
published_at 2026-04-09T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.069
published_at 2026-04-11T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.06893
published_at 2026-04-12T12:55:00Z
7
value 0.00025
scoring_system epss
scoring_elements 0.06888
published_at 2026-04-13T12:55:00Z
8
value 0.00025
scoring_system epss
scoring_elements 0.0683
published_at 2026-04-16T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.06811
published_at 2026-04-18T12:55:00Z
10
value 0.00025
scoring_system epss
scoring_elements 0.06956
published_at 2026-04-21T12:55:00Z
11
value 0.00025
scoring_system epss
scoring_elements 0.06938
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-54035
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54035
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2424970
reference_id 2424970
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2424970
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2024:3421
reference_id RHSA-2024:3421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3421
fixed_packages
aliases CVE-2023-54035
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ytxq-fc9h-vyfu
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@5.14.0-70.101.1%3Farch=el9_0