Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@5.14.0-284.30.1?arch=el9_2
Typerpm
Namespaceredhat
Namekernel
Version5.14.0-284.30.1
Qualifiers
arch el9_2
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1xy1-qbed-y3c9
vulnerability_id VCID-1xy1-qbed-y3c9
summary kernel: bypass of shadow stack protection due to a logic error
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21102.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21102.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21102
reference_id
reference_type
scores
0
value 6e-05
scoring_system epss
scoring_elements 0.0035
published_at 2026-04-02T12:55:00Z
1
value 6e-05
scoring_system epss
scoring_elements 0.00351
published_at 2026-04-26T12:55:00Z
2
value 6e-05
scoring_system epss
scoring_elements 0.00333
published_at 2026-04-13T12:55:00Z
3
value 6e-05
scoring_system epss
scoring_elements 0.00327
published_at 2026-04-16T12:55:00Z
4
value 6e-05
scoring_system epss
scoring_elements 0.00331
published_at 2026-04-18T12:55:00Z
5
value 6e-05
scoring_system epss
scoring_elements 0.00352
published_at 2026-04-21T12:55:00Z
6
value 6e-05
scoring_system epss
scoring_elements 0.00341
published_at 2026-04-07T12:55:00Z
7
value 6e-05
scoring_system epss
scoring_elements 0.00338
published_at 2026-04-08T12:55:00Z
8
value 6e-05
scoring_system epss
scoring_elements 0.00339
published_at 2026-04-09T12:55:00Z
9
value 6e-05
scoring_system epss
scoring_elements 0.00337
published_at 2026-04-11T12:55:00Z
10
value 6e-05
scoring_system epss
scoring_elements 0.00336
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21102
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21102
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://source.android.com/security/bulletin/2023-05-01
reference_id 2023-05-01
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-24T18:04:09Z/
url https://source.android.com/security/bulletin/2023-05-01
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2213455
reference_id 2213455
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2213455
6
reference_url https://access.redhat.com/errata/RHSA-2023:5069
reference_id RHSA-2023:5069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5069
7
reference_url https://access.redhat.com/errata/RHSA-2023:5091
reference_id RHSA-2023:5091
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5091
8
reference_url https://usn.ubuntu.com/6079-1/
reference_id USN-6079-1
reference_type
scores
url https://usn.ubuntu.com/6079-1/
9
reference_url https://usn.ubuntu.com/6091-1/
reference_id USN-6091-1
reference_type
scores
url https://usn.ubuntu.com/6091-1/
10
reference_url https://usn.ubuntu.com/6096-1/
reference_id USN-6096-1
reference_type
scores
url https://usn.ubuntu.com/6096-1/
11
reference_url https://usn.ubuntu.com/6134-1/
reference_id USN-6134-1
reference_type
scores
url https://usn.ubuntu.com/6134-1/
fixed_packages
aliases CVE-2023-21102
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1xy1-qbed-y3c9
1
url VCID-5fqg-muej-83f2
vulnerability_id VCID-5fqg-muej-83f2
summary kernel: nf_tables: use-after-free in nft_chain_lookup_byid()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-31248.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-31248.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-31248
reference_id
reference_type
scores
0
value 0.00204
scoring_system epss
scoring_elements 0.42481
published_at 2026-04-26T12:55:00Z
1
value 0.00204
scoring_system epss
scoring_elements 0.42579
published_at 2026-04-02T12:55:00Z
2
value 0.00204
scoring_system epss
scoring_elements 0.42607
published_at 2026-04-04T12:55:00Z
3
value 0.00204
scoring_system epss
scoring_elements 0.42546
published_at 2026-04-07T12:55:00Z
4
value 0.00204
scoring_system epss
scoring_elements 0.42598
published_at 2026-04-08T12:55:00Z
5
value 0.00204
scoring_system epss
scoring_elements 0.42609
published_at 2026-04-09T12:55:00Z
6
value 0.00204
scoring_system epss
scoring_elements 0.42631
published_at 2026-04-11T12:55:00Z
7
value 0.00204
scoring_system epss
scoring_elements 0.42594
published_at 2026-04-12T12:55:00Z
8
value 0.00204
scoring_system epss
scoring_elements 0.42566
published_at 2026-04-13T12:55:00Z
9
value 0.00204
scoring_system epss
scoring_elements 0.42625
published_at 2026-04-16T12:55:00Z
10
value 0.00204
scoring_system epss
scoring_elements 0.4261
published_at 2026-04-18T12:55:00Z
11
value 0.00204
scoring_system epss
scoring_elements 0.42544
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-31248
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2156
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31248
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35001
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://www.openwall.com/lists/oss-security/2023/07/05/2
reference_id 2
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:50Z/
url https://www.openwall.com/lists/oss-security/2023/07/05/2
7
reference_url http://www.openwall.com/lists/oss-security/2023/07/05/2
reference_id 2
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:50Z/
url http://www.openwall.com/lists/oss-security/2023/07/05/2
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2220893
reference_id 2220893
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2220893
9
reference_url https://www.debian.org/security/2023/dsa-5453
reference_id dsa-5453
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:50Z/
url https://www.debian.org/security/2023/dsa-5453
10
reference_url http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html
reference_id Kernel-Live-Patch-Security-Notice-LSN-0096-1.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:50Z/
url http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html
11
reference_url http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html
reference_id Kernel-Live-Patch-Security-Notice-LSN-0097-1.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:50Z/
url http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html
12
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html
reference_id msg00001.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:50Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html
13
reference_url https://security.netapp.com/advisory/ntap-20240201-0001/
reference_id ntap-20240201-0001
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:50Z/
url https://security.netapp.com/advisory/ntap-20240201-0001/
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGZC5XOANA75OJ4XARBBXYSLDKUIJI5E/
reference_id RGZC5XOANA75OJ4XARBBXYSLDKUIJI5E
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGZC5XOANA75OJ4XARBBXYSLDKUIJI5E/
15
reference_url https://access.redhat.com/errata/RHSA-2023:5069
reference_id RHSA-2023:5069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5069
16
reference_url https://access.redhat.com/errata/RHSA-2023:5091
reference_id RHSA-2023:5091
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5091
17
reference_url https://access.redhat.com/errata/RHSA-2023:5093
reference_id RHSA-2023:5093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5093
18
reference_url https://access.redhat.com/errata/RHSA-2023:5575
reference_id RHSA-2023:5575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5575
19
reference_url https://access.redhat.com/errata/RHSA-2023:5603
reference_id RHSA-2023:5603
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5603
20
reference_url https://access.redhat.com/errata/RHSA-2023:5604
reference_id RHSA-2023:5604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5604
21
reference_url https://lore.kernel.org/netfilter-devel/20230705121627.GC19489@breakpoint.cc/T/
reference_id T
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:50Z/
url https://lore.kernel.org/netfilter-devel/20230705121627.GC19489@breakpoint.cc/T/
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPHI46ROSSLVAV4R5LJWJYU747JGOS6D/
reference_id UPHI46ROSSLVAV4R5LJWJYU747JGOS6D
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPHI46ROSSLVAV4R5LJWJYU747JGOS6D/
23
reference_url https://usn.ubuntu.com/6246-1/
reference_id USN-6246-1
reference_type
scores
url https://usn.ubuntu.com/6246-1/
24
reference_url https://usn.ubuntu.com/6247-1/
reference_id USN-6247-1
reference_type
scores
url https://usn.ubuntu.com/6247-1/
25
reference_url https://usn.ubuntu.com/6248-1/
reference_id USN-6248-1
reference_type
scores
url https://usn.ubuntu.com/6248-1/
26
reference_url https://usn.ubuntu.com/6250-1/
reference_id USN-6250-1
reference_type
scores
url https://usn.ubuntu.com/6250-1/
27
reference_url https://usn.ubuntu.com/6255-1/
reference_id USN-6255-1
reference_type
scores
url https://usn.ubuntu.com/6255-1/
28
reference_url https://usn.ubuntu.com/6260-1/
reference_id USN-6260-1
reference_type
scores
url https://usn.ubuntu.com/6260-1/
29
reference_url https://usn.ubuntu.com/6285-1/
reference_id USN-6285-1
reference_type
scores
url https://usn.ubuntu.com/6285-1/
fixed_packages
aliases CVE-2023-31248
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5fqg-muej-83f2
2
url VCID-7a2r-7emu-zqdt
vulnerability_id VCID-7a2r-7emu-zqdt
summary kernel: netfilter: nf_tables_newrule when adding a rule with NFTA_RULE_CHAIN_ID leads to use-after-free
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4147.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4147.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4147
reference_id
reference_type
scores
0
value 0.00161
scoring_system epss
scoring_elements 0.37109
published_at 2026-04-02T12:55:00Z
1
value 0.00161
scoring_system epss
scoring_elements 0.37141
published_at 2026-04-04T12:55:00Z
2
value 0.00161
scoring_system epss
scoring_elements 0.36969
published_at 2026-04-07T12:55:00Z
3
value 0.00161
scoring_system epss
scoring_elements 0.3702
published_at 2026-04-08T12:55:00Z
4
value 0.00161
scoring_system epss
scoring_elements 0.37033
published_at 2026-04-09T12:55:00Z
5
value 0.00161
scoring_system epss
scoring_elements 0.37043
published_at 2026-04-11T12:55:00Z
6
value 0.00161
scoring_system epss
scoring_elements 0.37008
published_at 2026-04-12T12:55:00Z
7
value 0.00161
scoring_system epss
scoring_elements 0.36982
published_at 2026-04-13T12:55:00Z
8
value 0.00161
scoring_system epss
scoring_elements 0.37027
published_at 2026-04-16T12:55:00Z
9
value 0.00161
scoring_system epss
scoring_elements 0.37009
published_at 2026-04-18T12:55:00Z
10
value 0.00161
scoring_system epss
scoring_elements 0.36949
published_at 2026-04-21T12:55:00Z
11
value 0.00161
scoring_system epss
scoring_elements 0.36724
published_at 2026-04-24T12:55:00Z
12
value 0.00161
scoring_system epss
scoring_elements 0.36692
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4147
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
33
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2225239
reference_id 2225239
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2225239
35
reference_url https://access.redhat.com/errata/RHSA-2023:5069
reference_id RHSA-2023:5069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5069
36
reference_url https://access.redhat.com/errata/RHSA-2023:5091
reference_id RHSA-2023:5091
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5091
37
reference_url https://access.redhat.com/errata/RHSA-2023:5093
reference_id RHSA-2023:5093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5093
38
reference_url https://access.redhat.com/errata/RHSA-2023:7382
reference_id RHSA-2023:7382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7382
39
reference_url https://access.redhat.com/errata/RHSA-2023:7389
reference_id RHSA-2023:7389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7389
40
reference_url https://access.redhat.com/errata/RHSA-2023:7411
reference_id RHSA-2023:7411
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7411
fixed_packages
aliases CVE-2023-4147
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7a2r-7emu-zqdt
3
url VCID-7jsu-xc3w-z3a2
vulnerability_id VCID-7jsu-xc3w-z3a2
summary kernel: buffer overflow in ceph file net/ceph/messenger_v2.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-44466.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-44466.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-44466
reference_id
reference_type
scores
0
value 0.13171
scoring_system epss
scoring_elements 0.94097
published_at 2026-04-02T12:55:00Z
1
value 0.13171
scoring_system epss
scoring_elements 0.94108
published_at 2026-04-04T12:55:00Z
2
value 0.13171
scoring_system epss
scoring_elements 0.94112
published_at 2026-04-07T12:55:00Z
3
value 0.13171
scoring_system epss
scoring_elements 0.94121
published_at 2026-04-08T12:55:00Z
4
value 0.13171
scoring_system epss
scoring_elements 0.94125
published_at 2026-04-09T12:55:00Z
5
value 0.13171
scoring_system epss
scoring_elements 0.9413
published_at 2026-04-13T12:55:00Z
6
value 0.13171
scoring_system epss
scoring_elements 0.94129
published_at 2026-04-12T12:55:00Z
7
value 0.13171
scoring_system epss
scoring_elements 0.94146
published_at 2026-04-16T12:55:00Z
8
value 0.13171
scoring_system epss
scoring_elements 0.94151
published_at 2026-04-18T12:55:00Z
9
value 0.15852
scoring_system epss
scoring_elements 0.94762
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-44466
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241342
reference_id 2241342
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2241342
3
reference_url https://access.redhat.com/errata/RHSA-2023:4789
reference_id RHSA-2023:4789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4789
4
reference_url https://access.redhat.com/errata/RHSA-2023:4801
reference_id RHSA-2023:4801
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4801
5
reference_url https://access.redhat.com/errata/RHSA-2023:4962
reference_id RHSA-2023:4962
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4962
6
reference_url https://access.redhat.com/errata/RHSA-2023:5069
reference_id RHSA-2023:5069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5069
7
reference_url https://access.redhat.com/errata/RHSA-2023:5244
reference_id RHSA-2023:5244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5244
8
reference_url https://usn.ubuntu.com/6416-1/
reference_id USN-6416-1
reference_type
scores
url https://usn.ubuntu.com/6416-1/
9
reference_url https://usn.ubuntu.com/6416-2/
reference_id USN-6416-2
reference_type
scores
url https://usn.ubuntu.com/6416-2/
10
reference_url https://usn.ubuntu.com/6416-3/
reference_id USN-6416-3
reference_type
scores
url https://usn.ubuntu.com/6416-3/
11
reference_url https://usn.ubuntu.com/6445-1/
reference_id USN-6445-1
reference_type
scores
url https://usn.ubuntu.com/6445-1/
12
reference_url https://usn.ubuntu.com/6445-2/
reference_id USN-6445-2
reference_type
scores
url https://usn.ubuntu.com/6445-2/
13
reference_url https://usn.ubuntu.com/6464-1/
reference_id USN-6464-1
reference_type
scores
url https://usn.ubuntu.com/6464-1/
14
reference_url https://usn.ubuntu.com/6466-1/
reference_id USN-6466-1
reference_type
scores
url https://usn.ubuntu.com/6466-1/
15
reference_url https://usn.ubuntu.com/6520-1/
reference_id USN-6520-1
reference_type
scores
url https://usn.ubuntu.com/6520-1/
fixed_packages
aliases CVE-2023-44466
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7jsu-xc3w-z3a2
4
url VCID-9cat-tz9k-9kcb
vulnerability_id VCID-9cat-tz9k-9kcb
summary kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4004.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4004.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4004
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03162
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03172
published_at 2026-04-04T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03174
published_at 2026-04-07T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03179
published_at 2026-04-08T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03205
published_at 2026-04-09T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03163
published_at 2026-04-11T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.03138
published_at 2026-04-12T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03124
published_at 2026-04-13T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.031
published_at 2026-04-16T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03107
published_at 2026-04-18T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03227
published_at 2026-04-24T12:55:00Z
11
value 0.00015
scoring_system epss
scoring_elements 0.03222
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4004
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
33
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2225275
reference_id 2225275
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2225275
35
reference_url https://access.redhat.com/errata/RHSA-2023:4961
reference_id RHSA-2023:4961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4961
36
reference_url https://access.redhat.com/errata/RHSA-2023:4962
reference_id RHSA-2023:4962
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4962
37
reference_url https://access.redhat.com/errata/RHSA-2023:4967
reference_id RHSA-2023:4967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4967
38
reference_url https://access.redhat.com/errata/RHSA-2023:5069
reference_id RHSA-2023:5069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5069
39
reference_url https://access.redhat.com/errata/RHSA-2023:5091
reference_id RHSA-2023:5091
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5091
40
reference_url https://access.redhat.com/errata/RHSA-2023:5093
reference_id RHSA-2023:5093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5093
41
reference_url https://access.redhat.com/errata/RHSA-2023:5221
reference_id RHSA-2023:5221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5221
42
reference_url https://access.redhat.com/errata/RHSA-2023:5244
reference_id RHSA-2023:5244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5244
43
reference_url https://access.redhat.com/errata/RHSA-2023:5255
reference_id RHSA-2023:5255
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5255
44
reference_url https://access.redhat.com/errata/RHSA-2023:5548
reference_id RHSA-2023:5548
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5548
45
reference_url https://access.redhat.com/errata/RHSA-2023:5627
reference_id RHSA-2023:5627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5627
46
reference_url https://access.redhat.com/errata/RHSA-2023:7382
reference_id RHSA-2023:7382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7382
47
reference_url https://access.redhat.com/errata/RHSA-2023:7389
reference_id RHSA-2023:7389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7389
48
reference_url https://access.redhat.com/errata/RHSA-2023:7411
reference_id RHSA-2023:7411
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7411
49
reference_url https://access.redhat.com/errata/RHSA-2023:7417
reference_id RHSA-2023:7417
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7417
50
reference_url https://access.redhat.com/errata/RHSA-2023:7431
reference_id RHSA-2023:7431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7431
51
reference_url https://access.redhat.com/errata/RHSA-2023:7434
reference_id RHSA-2023:7434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7434
52
reference_url https://usn.ubuntu.com/6315-1/
reference_id USN-6315-1
reference_type
scores
url https://usn.ubuntu.com/6315-1/
53
reference_url https://usn.ubuntu.com/6316-1/
reference_id USN-6316-1
reference_type
scores
url https://usn.ubuntu.com/6316-1/
54
reference_url https://usn.ubuntu.com/6318-1/
reference_id USN-6318-1
reference_type
scores
url https://usn.ubuntu.com/6318-1/
55
reference_url https://usn.ubuntu.com/6321-1/
reference_id USN-6321-1
reference_type
scores
url https://usn.ubuntu.com/6321-1/
56
reference_url https://usn.ubuntu.com/6325-1/
reference_id USN-6325-1
reference_type
scores
url https://usn.ubuntu.com/6325-1/
57
reference_url https://usn.ubuntu.com/6328-1/
reference_id USN-6328-1
reference_type
scores
url https://usn.ubuntu.com/6328-1/
58
reference_url https://usn.ubuntu.com/6330-1/
reference_id USN-6330-1
reference_type
scores
url https://usn.ubuntu.com/6330-1/
59
reference_url https://usn.ubuntu.com/6332-1/
reference_id USN-6332-1
reference_type
scores
url https://usn.ubuntu.com/6332-1/
60
reference_url https://usn.ubuntu.com/6348-1/
reference_id USN-6348-1
reference_type
scores
url https://usn.ubuntu.com/6348-1/
61
reference_url https://usn.ubuntu.com/6385-1/
reference_id USN-6385-1
reference_type
scores
url https://usn.ubuntu.com/6385-1/
62
reference_url https://usn.ubuntu.com/6442-1/
reference_id USN-6442-1
reference_type
scores
url https://usn.ubuntu.com/6442-1/
fixed_packages
aliases CVE-2023-4004
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9cat-tz9k-9kcb
5
url VCID-9qaw-87cm-jubs
vulnerability_id VCID-9qaw-87cm-jubs
summary kernel: seccomp: Move copy_seccomp() to no failure path
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50661.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50661.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50661
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07494
published_at 2026-04-02T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07533
published_at 2026-04-04T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07514
published_at 2026-04-07T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07573
published_at 2026-04-08T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07593
published_at 2026-04-09T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10231
published_at 2026-04-21T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.10211
published_at 2026-04-24T12:55:00Z
7
value 0.00035
scoring_system epss
scoring_elements 0.10199
published_at 2026-04-26T12:55:00Z
8
value 0.00035
scoring_system epss
scoring_elements 0.10305
published_at 2026-04-11T12:55:00Z
9
value 0.00035
scoring_system epss
scoring_elements 0.10265
published_at 2026-04-12T12:55:00Z
10
value 0.00035
scoring_system epss
scoring_elements 0.10246
published_at 2026-04-13T12:55:00Z
11
value 0.00035
scoring_system epss
scoring_elements 0.10119
published_at 2026-04-16T12:55:00Z
12
value 0.00035
scoring_system epss
scoring_elements 0.10098
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50661
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50661
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2420323
reference_id 2420323
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2420323
5
reference_url https://access.redhat.com/errata/RHSA-2023:5069
reference_id RHSA-2023:5069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5069
fixed_packages
aliases CVE-2022-50661
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9qaw-87cm-jubs
6
url VCID-dm3r-us9z-5uc3
vulnerability_id VCID-dm3r-us9z-5uc3
summary kernel: Linux kernel iavf driver: Denial of Service via use-after-free vulnerability
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53556.json
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53556.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53556
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03107
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.0312
published_at 2026-04-07T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03125
published_at 2026-04-08T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.0315
published_at 2026-04-09T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03109
published_at 2026-04-11T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03083
published_at 2026-04-12T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.0307
published_at 2026-04-13T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03045
published_at 2026-04-16T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.03054
published_at 2026-04-18T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03172
published_at 2026-04-21T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03175
published_at 2026-04-24T12:55:00Z
11
value 0.00015
scoring_system epss
scoring_elements 0.03168
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53556
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53556
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2401478
reference_id 2401478
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2401478
5
reference_url https://access.redhat.com/errata/RHSA-2023:5069
reference_id RHSA-2023:5069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5069
6
reference_url https://access.redhat.com/errata/RHSA-2023:5627
reference_id RHSA-2023:5627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5627
7
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
8
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
fixed_packages
aliases CVE-2023-53556
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dm3r-us9z-5uc3
7
url VCID-gdf7-z8wt-zqae
vulnerability_id VCID-gdf7-z8wt-zqae
summary kernel: virt/coco/sev-guest: Double-buffer messages
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53769.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53769.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53769
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03173
published_at 2026-04-07T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03178
published_at 2026-04-08T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.0316
published_at 2026-04-02T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.0317
published_at 2026-04-04T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05152
published_at 2026-04-16T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05154
published_at 2026-04-18T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.05307
published_at 2026-04-21T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05345
published_at 2026-04-24T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05387
published_at 2026-04-26T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.05268
published_at 2026-04-09T12:55:00Z
10
value 0.0002
scoring_system epss
scoring_elements 0.05236
published_at 2026-04-11T12:55:00Z
11
value 0.0002
scoring_system epss
scoring_elements 0.0522
published_at 2026-04-12T12:55:00Z
12
value 0.0002
scoring_system epss
scoring_elements 0.05207
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53769
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2419909
reference_id 2419909
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2419909
4
reference_url https://access.redhat.com/errata/RHSA-2023:5069
reference_id RHSA-2023:5069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5069
5
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
fixed_packages
aliases CVE-2023-53769
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gdf7-z8wt-zqae
8
url VCID-j6td-3edb-rugg
vulnerability_id VCID-j6td-3edb-rugg
summary kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3776.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3776.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3776
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.11971
published_at 2026-04-26T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.12111
published_at 2026-04-02T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.12157
published_at 2026-04-04T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.11961
published_at 2026-04-07T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.12044
published_at 2026-04-08T12:55:00Z
5
value 0.0004
scoring_system epss
scoring_elements 0.12096
published_at 2026-04-09T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.12103
published_at 2026-04-11T12:55:00Z
7
value 0.0004
scoring_system epss
scoring_elements 0.12067
published_at 2026-04-12T12:55:00Z
8
value 0.0004
scoring_system epss
scoring_elements 0.12037
published_at 2026-04-13T12:55:00Z
9
value 0.0004
scoring_system epss
scoring_elements 0.11909
published_at 2026-04-16T12:55:00Z
10
value 0.0004
scoring_system epss
scoring_elements 0.11905
published_at 2026-04-18T12:55:00Z
11
value 0.0004
scoring_system epss
scoring_elements 0.12025
published_at 2026-04-21T12:55:00Z
12
value 0.0004
scoring_system epss
scoring_elements 0.12002
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3776
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
33
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
34
reference_url https://kernel.dance/0323bce598eea038714f941ce2b22541c46d488f
reference_id 0323bce598eea038714f941ce2b22541c46d488f
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:21Z/
url https://kernel.dance/0323bce598eea038714f941ce2b22541c46d488f
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2225097
reference_id 2225097
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2225097
36
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=0323bce598eea038714f941ce2b22541c46d488f
reference_id commit?id=0323bce598eea038714f941ce2b22541c46d488f
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:21Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=0323bce598eea038714f941ce2b22541c46d488f
37
reference_url https://www.debian.org/security/2023/dsa-5480
reference_id dsa-5480
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:21Z/
url https://www.debian.org/security/2023/dsa-5480
38
reference_url https://www.debian.org/security/2023/dsa-5492
reference_id dsa-5492
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:21Z/
url https://www.debian.org/security/2023/dsa-5492
39
reference_url http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
reference_id Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:21Z/
url http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
40
reference_url http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
reference_id Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:21Z/
url http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
41
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
reference_id msg00004.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:21Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
42
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:21Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
43
reference_url https://security.netapp.com/advisory/ntap-20240202-0003/
reference_id ntap-20240202-0003
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:21Z/
url https://security.netapp.com/advisory/ntap-20240202-0003/
44
reference_url https://access.redhat.com/errata/RHSA-2023:5069
reference_id RHSA-2023:5069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5069
45
reference_url https://access.redhat.com/errata/RHSA-2023:5091
reference_id RHSA-2023:5091
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5091
46
reference_url https://access.redhat.com/errata/RHSA-2023:5093
reference_id RHSA-2023:5093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5093
47
reference_url https://access.redhat.com/errata/RHSA-2023:5221
reference_id RHSA-2023:5221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5221
48
reference_url https://access.redhat.com/errata/RHSA-2023:5244
reference_id RHSA-2023:5244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5244
49
reference_url https://access.redhat.com/errata/RHSA-2023:5255
reference_id RHSA-2023:5255
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5255
50
reference_url https://access.redhat.com/errata/RHSA-2023:5628
reference_id RHSA-2023:5628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5628
51
reference_url https://access.redhat.com/errata/RHSA-2023:5775
reference_id RHSA-2023:5775
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5775
52
reference_url https://access.redhat.com/errata/RHSA-2023:5794
reference_id RHSA-2023:5794
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5794
53
reference_url https://access.redhat.com/errata/RHSA-2023:6799
reference_id RHSA-2023:6799
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6799
54
reference_url https://access.redhat.com/errata/RHSA-2023:6813
reference_id RHSA-2023:6813
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6813
55
reference_url https://access.redhat.com/errata/RHSA-2023:7294
reference_id RHSA-2023:7294
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7294
56
reference_url https://access.redhat.com/errata/RHSA-2023:7382
reference_id RHSA-2023:7382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7382
57
reference_url https://access.redhat.com/errata/RHSA-2023:7389
reference_id RHSA-2023:7389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7389
58
reference_url https://access.redhat.com/errata/RHSA-2023:7398
reference_id RHSA-2023:7398
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7398
59
reference_url https://access.redhat.com/errata/RHSA-2023:7410
reference_id RHSA-2023:7410
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7410
60
reference_url https://access.redhat.com/errata/RHSA-2023:7411
reference_id RHSA-2023:7411
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7411
61
reference_url https://access.redhat.com/errata/RHSA-2023:7417
reference_id RHSA-2023:7417
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7417
62
reference_url https://access.redhat.com/errata/RHSA-2023:7419
reference_id RHSA-2023:7419
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7419
63
reference_url https://access.redhat.com/errata/RHSA-2023:7423
reference_id RHSA-2023:7423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7423
64
reference_url https://access.redhat.com/errata/RHSA-2023:7424
reference_id RHSA-2023:7424
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7424
65
reference_url https://access.redhat.com/errata/RHSA-2023:7431
reference_id RHSA-2023:7431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7431
66
reference_url https://access.redhat.com/errata/RHSA-2023:7434
reference_id RHSA-2023:7434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7434
67
reference_url https://access.redhat.com/errata/RHSA-2024:0262
reference_id RHSA-2024:0262
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0262
68
reference_url https://access.redhat.com/errata/RHSA-2024:1831
reference_id RHSA-2024:1831
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1831
69
reference_url https://usn.ubuntu.com/6285-1/
reference_id USN-6285-1
reference_type
scores
url https://usn.ubuntu.com/6285-1/
70
reference_url https://usn.ubuntu.com/6309-1/
reference_id USN-6309-1
reference_type
scores
url https://usn.ubuntu.com/6309-1/
71
reference_url https://usn.ubuntu.com/6315-1/
reference_id USN-6315-1
reference_type
scores
url https://usn.ubuntu.com/6315-1/
72
reference_url https://usn.ubuntu.com/6317-1/
reference_id USN-6317-1
reference_type
scores
url https://usn.ubuntu.com/6317-1/
73
reference_url https://usn.ubuntu.com/6318-1/
reference_id USN-6318-1
reference_type
scores
url https://usn.ubuntu.com/6318-1/
74
reference_url https://usn.ubuntu.com/6321-1/
reference_id USN-6321-1
reference_type
scores
url https://usn.ubuntu.com/6321-1/
75
reference_url https://usn.ubuntu.com/6324-1/
reference_id USN-6324-1
reference_type
scores
url https://usn.ubuntu.com/6324-1/
76
reference_url https://usn.ubuntu.com/6325-1/
reference_id USN-6325-1
reference_type
scores
url https://usn.ubuntu.com/6325-1/
77
reference_url https://usn.ubuntu.com/6327-1/
reference_id USN-6327-1
reference_type
scores
url https://usn.ubuntu.com/6327-1/
78
reference_url https://usn.ubuntu.com/6328-1/
reference_id USN-6328-1
reference_type
scores
url https://usn.ubuntu.com/6328-1/
79
reference_url https://usn.ubuntu.com/6329-1/
reference_id USN-6329-1
reference_type
scores
url https://usn.ubuntu.com/6329-1/
80
reference_url https://usn.ubuntu.com/6330-1/
reference_id USN-6330-1
reference_type
scores
url https://usn.ubuntu.com/6330-1/
81
reference_url https://usn.ubuntu.com/6331-1/
reference_id USN-6331-1
reference_type
scores
url https://usn.ubuntu.com/6331-1/
82
reference_url https://usn.ubuntu.com/6332-1/
reference_id USN-6332-1
reference_type
scores
url https://usn.ubuntu.com/6332-1/
83
reference_url https://usn.ubuntu.com/6341-1/
reference_id USN-6341-1
reference_type
scores
url https://usn.ubuntu.com/6341-1/
84
reference_url https://usn.ubuntu.com/6342-1/
reference_id USN-6342-1
reference_type
scores
url https://usn.ubuntu.com/6342-1/
85
reference_url https://usn.ubuntu.com/6342-2/
reference_id USN-6342-2
reference_type
scores
url https://usn.ubuntu.com/6342-2/
86
reference_url https://usn.ubuntu.com/6346-1/
reference_id USN-6346-1
reference_type
scores
url https://usn.ubuntu.com/6346-1/
87
reference_url https://usn.ubuntu.com/6348-1/
reference_id USN-6348-1
reference_type
scores
url https://usn.ubuntu.com/6348-1/
88
reference_url https://usn.ubuntu.com/6357-1/
reference_id USN-6357-1
reference_type
scores
url https://usn.ubuntu.com/6357-1/
89
reference_url https://usn.ubuntu.com/6385-1/
reference_id USN-6385-1
reference_type
scores
url https://usn.ubuntu.com/6385-1/
90
reference_url https://usn.ubuntu.com/6397-1/
reference_id USN-6397-1
reference_type
scores
url https://usn.ubuntu.com/6397-1/
fixed_packages
aliases CVE-2023-3776
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j6td-3edb-rugg
9
url VCID-mza3-5d1d-byfs
vulnerability_id VCID-mza3-5d1d-byfs
summary kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3390.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3390.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3390
reference_id
reference_type
scores
0
value 0.00095
scoring_system epss
scoring_elements 0.26574
published_at 2026-04-02T12:55:00Z
1
value 0.00095
scoring_system epss
scoring_elements 0.26618
published_at 2026-04-04T12:55:00Z
2
value 0.00095
scoring_system epss
scoring_elements 0.26403
published_at 2026-04-07T12:55:00Z
3
value 0.00095
scoring_system epss
scoring_elements 0.26472
published_at 2026-04-08T12:55:00Z
4
value 0.00095
scoring_system epss
scoring_elements 0.26521
published_at 2026-04-09T12:55:00Z
5
value 0.00095
scoring_system epss
scoring_elements 0.26528
published_at 2026-04-11T12:55:00Z
6
value 0.00095
scoring_system epss
scoring_elements 0.2643
published_at 2026-04-16T12:55:00Z
7
value 0.00095
scoring_system epss
scoring_elements 0.26401
published_at 2026-04-18T12:55:00Z
8
value 0.00095
scoring_system epss
scoring_elements 0.26364
published_at 2026-04-21T12:55:00Z
9
value 0.00095
scoring_system epss
scoring_elements 0.26482
published_at 2026-04-12T12:55:00Z
10
value 0.00095
scoring_system epss
scoring_elements 0.26424
published_at 2026-04-13T12:55:00Z
11
value 0.00102
scoring_system epss
scoring_elements 0.27709
published_at 2026-04-26T12:55:00Z
12
value 0.00102
scoring_system epss
scoring_elements 0.27821
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3390
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20593
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3390
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3610
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2213260
reference_id 2213260
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2213260
7
reference_url https://access.redhat.com/errata/RHSA-2023:4789
reference_id RHSA-2023:4789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4789
8
reference_url https://access.redhat.com/errata/RHSA-2023:4888
reference_id RHSA-2023:4888
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4888
9
reference_url https://access.redhat.com/errata/RHSA-2023:4961
reference_id RHSA-2023:4961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4961
10
reference_url https://access.redhat.com/errata/RHSA-2023:4962
reference_id RHSA-2023:4962
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4962
11
reference_url https://access.redhat.com/errata/RHSA-2023:4967
reference_id RHSA-2023:4967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4967
12
reference_url https://access.redhat.com/errata/RHSA-2023:5069
reference_id RHSA-2023:5069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5069
13
reference_url https://access.redhat.com/errata/RHSA-2023:5091
reference_id RHSA-2023:5091
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5091
14
reference_url https://access.redhat.com/errata/RHSA-2023:5093
reference_id RHSA-2023:5093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5093
15
reference_url https://access.redhat.com/errata/RHSA-2023:5221
reference_id RHSA-2023:5221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5221
16
reference_url https://access.redhat.com/errata/RHSA-2023:5235
reference_id RHSA-2023:5235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5235
17
reference_url https://access.redhat.com/errata/RHSA-2023:5238
reference_id RHSA-2023:5238
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5238
18
reference_url https://access.redhat.com/errata/RHSA-2023:5244
reference_id RHSA-2023:5244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5244
19
reference_url https://access.redhat.com/errata/RHSA-2023:5255
reference_id RHSA-2023:5255
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5255
20
reference_url https://access.redhat.com/errata/RHSA-2024:1250
reference_id RHSA-2024:1250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1250
21
reference_url https://access.redhat.com/errata/RHSA-2024:1253
reference_id RHSA-2024:1253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1253
22
reference_url https://access.redhat.com/errata/RHSA-2024:1268
reference_id RHSA-2024:1268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1268
23
reference_url https://access.redhat.com/errata/RHSA-2024:1269
reference_id RHSA-2024:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1269
24
reference_url https://access.redhat.com/errata/RHSA-2024:1278
reference_id RHSA-2024:1278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1278
25
reference_url https://access.redhat.com/errata/RHSA-2024:1306
reference_id RHSA-2024:1306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1306
26
reference_url https://usn.ubuntu.com/6246-1/
reference_id USN-6246-1
reference_type
scores
url https://usn.ubuntu.com/6246-1/
27
reference_url https://usn.ubuntu.com/6250-1/
reference_id USN-6250-1
reference_type
scores
url https://usn.ubuntu.com/6250-1/
28
reference_url https://usn.ubuntu.com/6251-1/
reference_id USN-6251-1
reference_type
scores
url https://usn.ubuntu.com/6251-1/
29
reference_url https://usn.ubuntu.com/6252-1/
reference_id USN-6252-1
reference_type
scores
url https://usn.ubuntu.com/6252-1/
30
reference_url https://usn.ubuntu.com/6254-1/
reference_id USN-6254-1
reference_type
scores
url https://usn.ubuntu.com/6254-1/
31
reference_url https://usn.ubuntu.com/6255-1/
reference_id USN-6255-1
reference_type
scores
url https://usn.ubuntu.com/6255-1/
32
reference_url https://usn.ubuntu.com/6260-1/
reference_id USN-6260-1
reference_type
scores
url https://usn.ubuntu.com/6260-1/
33
reference_url https://usn.ubuntu.com/6261-1/
reference_id USN-6261-1
reference_type
scores
url https://usn.ubuntu.com/6261-1/
34
reference_url https://usn.ubuntu.com/6285-1/
reference_id USN-6285-1
reference_type
scores
url https://usn.ubuntu.com/6285-1/
35
reference_url https://usn.ubuntu.com/6385-1/
reference_id USN-6385-1
reference_type
scores
url https://usn.ubuntu.com/6385-1/
fixed_packages
aliases CVE-2023-3390
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mza3-5d1d-byfs
10
url VCID-re1w-a633-sfa1
vulnerability_id VCID-re1w-a633-sfa1
summary kernel: netfilter: nf_tables: fix chain binding transaction logic in the abort path of NFT_MSG_NEWRULE
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3610.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3610.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3610
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.05062
published_at 2026-04-02T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.05091
published_at 2026-04-04T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.05112
published_at 2026-04-07T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.05145
published_at 2026-04-08T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.05161
published_at 2026-04-09T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.05136
published_at 2026-04-11T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.05119
published_at 2026-04-12T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.05105
published_at 2026-04-13T12:55:00Z
8
value 0.00019
scoring_system epss
scoring_elements 0.05052
published_at 2026-04-16T12:55:00Z
9
value 0.00019
scoring_system epss
scoring_elements 0.05058
published_at 2026-04-18T12:55:00Z
10
value 0.00019
scoring_system epss
scoring_elements 0.05206
published_at 2026-04-21T12:55:00Z
11
value 0.00019
scoring_system epss
scoring_elements 0.05237
published_at 2026-04-24T12:55:00Z
12
value 0.00019
scoring_system epss
scoring_elements 0.0528
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3610
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20593
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3390
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3610
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2225198
reference_id 2225198
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2225198
7
reference_url https://access.redhat.com/errata/RHSA-2023:5069
reference_id RHSA-2023:5069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5069
8
reference_url https://access.redhat.com/errata/RHSA-2023:5091
reference_id RHSA-2023:5091
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5091
9
reference_url https://access.redhat.com/errata/RHSA-2023:5093
reference_id RHSA-2023:5093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5093
10
reference_url https://usn.ubuntu.com/6285-1/
reference_id USN-6285-1
reference_type
scores
url https://usn.ubuntu.com/6285-1/
11
reference_url https://usn.ubuntu.com/6315-1/
reference_id USN-6315-1
reference_type
scores
url https://usn.ubuntu.com/6315-1/
12
reference_url https://usn.ubuntu.com/6318-1/
reference_id USN-6318-1
reference_type
scores
url https://usn.ubuntu.com/6318-1/
13
reference_url https://usn.ubuntu.com/6321-1/
reference_id USN-6321-1
reference_type
scores
url https://usn.ubuntu.com/6321-1/
14
reference_url https://usn.ubuntu.com/6325-1/
reference_id USN-6325-1
reference_type
scores
url https://usn.ubuntu.com/6325-1/
15
reference_url https://usn.ubuntu.com/6328-1/
reference_id USN-6328-1
reference_type
scores
url https://usn.ubuntu.com/6328-1/
16
reference_url https://usn.ubuntu.com/6330-1/
reference_id USN-6330-1
reference_type
scores
url https://usn.ubuntu.com/6330-1/
17
reference_url https://usn.ubuntu.com/6332-1/
reference_id USN-6332-1
reference_type
scores
url https://usn.ubuntu.com/6332-1/
18
reference_url https://usn.ubuntu.com/6348-1/
reference_id USN-6348-1
reference_type
scores
url https://usn.ubuntu.com/6348-1/
19
reference_url https://usn.ubuntu.com/6385-1/
reference_id USN-6385-1
reference_type
scores
url https://usn.ubuntu.com/6385-1/
fixed_packages
aliases CVE-2023-3610
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-re1w-a633-sfa1
11
url VCID-rrkb-m7jz-1fgj
vulnerability_id VCID-rrkb-m7jz-1fgj
summary x86/AMD: Zenbleed
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-20593.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-20593.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-20593
reference_id
reference_type
scores
0
value 0.05876
scoring_system epss
scoring_elements 0.90578
published_at 2026-04-12T12:55:00Z
1
value 0.05876
scoring_system epss
scoring_elements 0.90602
published_at 2026-04-26T12:55:00Z
2
value 0.05876
scoring_system epss
scoring_elements 0.9059
published_at 2026-04-18T12:55:00Z
3
value 0.05876
scoring_system epss
scoring_elements 0.90572
published_at 2026-04-13T12:55:00Z
4
value 0.06027
scoring_system epss
scoring_elements 0.90735
published_at 2026-04-21T12:55:00Z
5
value 0.0632
scoring_system epss
scoring_elements 0.90937
published_at 2026-04-04T12:55:00Z
6
value 0.0632
scoring_system epss
scoring_elements 0.90959
published_at 2026-04-08T12:55:00Z
7
value 0.0632
scoring_system epss
scoring_elements 0.90928
published_at 2026-04-02T12:55:00Z
8
value 0.0632
scoring_system epss
scoring_elements 0.90948
published_at 2026-04-07T12:55:00Z
9
value 0.0632
scoring_system epss
scoring_elements 0.90965
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-20593
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20593
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3390
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3610
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url http://www.openwall.com/lists/oss-security/2023/07/25/1
reference_id 1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/
url http://www.openwall.com/lists/oss-security/2023/07/25/1
7
reference_url http://www.openwall.com/lists/oss-security/2023/07/26/1
reference_id 1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/
url http://www.openwall.com/lists/oss-security/2023/07/26/1
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041863
reference_id 1041863
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041863
9
reference_url http://www.openwall.com/lists/oss-security/2023/09/22/11
reference_id 11
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/
url http://www.openwall.com/lists/oss-security/2023/09/22/11
10
reference_url http://www.openwall.com/lists/oss-security/2023/07/25/12
reference_id 12
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/
url http://www.openwall.com/lists/oss-security/2023/07/25/12
11
reference_url http://www.openwall.com/lists/oss-security/2023/07/25/13
reference_id 13
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/
url http://www.openwall.com/lists/oss-security/2023/07/25/13
12
reference_url http://www.openwall.com/lists/oss-security/2023/07/25/14
reference_id 14
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/
url http://www.openwall.com/lists/oss-security/2023/07/25/14
13
reference_url http://www.openwall.com/lists/oss-security/2023/07/25/15
reference_id 15
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/
url http://www.openwall.com/lists/oss-security/2023/07/25/15
14
reference_url http://www.openwall.com/lists/oss-security/2023/07/25/16
reference_id 16
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/
url http://www.openwall.com/lists/oss-security/2023/07/25/16
15
reference_url http://www.openwall.com/lists/oss-security/2023/07/25/17
reference_id 17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/
url http://www.openwall.com/lists/oss-security/2023/07/25/17
16
reference_url http://www.openwall.com/lists/oss-security/2023/07/31/2
reference_id 2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/
url http://www.openwall.com/lists/oss-security/2023/07/31/2
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2217845
reference_id 2217845
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2217845
18
reference_url http://www.openwall.com/lists/oss-security/2023/07/24/3
reference_id 3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/
url http://www.openwall.com/lists/oss-security/2023/07/24/3
19
reference_url http://www.openwall.com/lists/oss-security/2023/08/16/4
reference_id 4
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/
url http://www.openwall.com/lists/oss-security/2023/08/16/4
20
reference_url http://www.openwall.com/lists/oss-security/2023/09/25/4
reference_id 4
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/
url http://www.openwall.com/lists/oss-security/2023/09/25/4
21
reference_url http://www.openwall.com/lists/oss-security/2023/07/25/5
reference_id 5
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/
url http://www.openwall.com/lists/oss-security/2023/07/25/5
22
reference_url http://www.openwall.com/lists/oss-security/2023/08/16/5
reference_id 5
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/
url http://www.openwall.com/lists/oss-security/2023/08/16/5
23
reference_url http://www.openwall.com/lists/oss-security/2023/07/25/6
reference_id 6
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/
url http://www.openwall.com/lists/oss-security/2023/07/25/6
24
reference_url http://www.openwall.com/lists/oss-security/2023/08/08/6
reference_id 6
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/
url http://www.openwall.com/lists/oss-security/2023/08/08/6
25
reference_url http://www.openwall.com/lists/oss-security/2023/08/08/7
reference_id 7
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/
url http://www.openwall.com/lists/oss-security/2023/08/08/7
26
reference_url http://www.openwall.com/lists/oss-security/2023/09/25/7
reference_id 7
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/
url http://www.openwall.com/lists/oss-security/2023/09/25/7
27
reference_url http://www.openwall.com/lists/oss-security/2023/08/08/8
reference_id 8
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/
url http://www.openwall.com/lists/oss-security/2023/08/08/8
28
reference_url http://www.openwall.com/lists/oss-security/2023/09/22/9
reference_id 9
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/
url http://www.openwall.com/lists/oss-security/2023/09/22/9
29
reference_url http://xenbits.xen.org/xsa/advisory-433.html
reference_id advisory-433.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/
url http://xenbits.xen.org/xsa/advisory-433.html
30
reference_url https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7008
reference_id AMD-SB-7008
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/
url https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7008
31
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP6WQO3CDPLE5O635N7TAL5KCZ6HZ4FE/
reference_id CP6WQO3CDPLE5O635N7TAL5KCZ6HZ4FE
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP6WQO3CDPLE5O635N7TAL5KCZ6HZ4FE/
32
reference_url https://www.debian.org/security/2023/dsa-5459
reference_id dsa-5459
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/
url https://www.debian.org/security/2023/dsa-5459
33
reference_url https://www.debian.org/security/2023/dsa-5461
reference_id dsa-5461
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/
url https://www.debian.org/security/2023/dsa-5461
34
reference_url https://www.debian.org/security/2023/dsa-5462
reference_id dsa-5462
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/
url https://www.debian.org/security/2023/dsa-5462
35
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/
reference_id HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/
36
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html
reference_id msg00001.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html
37
reference_url https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
reference_id msg00030.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/
url https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
38
reference_url https://lists.debian.org/debian-lts-announce/2023/07/msg00033.html
reference_id msg00033.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/
url https://lists.debian.org/debian-lts-announce/2023/07/msg00033.html
39
reference_url https://security.netapp.com/advisory/ntap-20240531-0004/
reference_id ntap-20240531-0004
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/
url https://security.netapp.com/advisory/ntap-20240531-0004/
40
reference_url https://access.redhat.com/errata/RHSA-2023:4696
reference_id RHSA-2023:4696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4696
41
reference_url https://access.redhat.com/errata/RHSA-2023:4699
reference_id RHSA-2023:4699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4699
42
reference_url https://access.redhat.com/errata/RHSA-2023:4789
reference_id RHSA-2023:4789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4789
43
reference_url https://access.redhat.com/errata/RHSA-2023:4819
reference_id RHSA-2023:4819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4819
44
reference_url https://access.redhat.com/errata/RHSA-2023:4821
reference_id RHSA-2023:4821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4821
45
reference_url https://access.redhat.com/errata/RHSA-2023:5068
reference_id RHSA-2023:5068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5068
46
reference_url https://access.redhat.com/errata/RHSA-2023:5069
reference_id RHSA-2023:5069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5069
47
reference_url https://access.redhat.com/errata/RHSA-2023:5091
reference_id RHSA-2023:5091
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5091
48
reference_url https://access.redhat.com/errata/RHSA-2023:5244
reference_id RHSA-2023:5244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5244
49
reference_url https://access.redhat.com/errata/RHSA-2023:5245
reference_id RHSA-2023:5245
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5245
50
reference_url https://access.redhat.com/errata/RHSA-2023:5255
reference_id RHSA-2023:5255
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5255
51
reference_url https://access.redhat.com/errata/RHSA-2023:5419
reference_id RHSA-2023:5419
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5419
52
reference_url https://access.redhat.com/errata/RHSA-2023:5591
reference_id RHSA-2023:5591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5591
53
reference_url https://access.redhat.com/errata/RHSA-2023:5607
reference_id RHSA-2023:5607
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5607
54
reference_url https://access.redhat.com/errata/RHSA-2023:7244
reference_id RHSA-2023:7244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7244
55
reference_url https://access.redhat.com/errata/RHSA-2023:7382
reference_id RHSA-2023:7382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7382
56
reference_url https://access.redhat.com/errata/RHSA-2023:7389
reference_id RHSA-2023:7389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7389
57
reference_url https://access.redhat.com/errata/RHSA-2023:7401
reference_id RHSA-2023:7401
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7401
58
reference_url https://access.redhat.com/errata/RHSA-2023:7513
reference_id RHSA-2023:7513
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7513
59
reference_url https://access.redhat.com/errata/RHSA-2023:7551
reference_id RHSA-2023:7551
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7551
60
reference_url https://access.redhat.com/errata/RHSA-2023:7557
reference_id RHSA-2023:7557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7557
61
reference_url https://access.redhat.com/errata/RHSA-2023:7665
reference_id RHSA-2023:7665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7665
62
reference_url https://access.redhat.com/errata/RHSA-2023:7782
reference_id RHSA-2023:7782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7782
63
reference_url https://access.redhat.com/errata/RHSA-2024:0402
reference_id RHSA-2024:0402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0402
64
reference_url https://access.redhat.com/errata/RHSA-2024:0403
reference_id RHSA-2024:0403
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0403
65
reference_url https://access.redhat.com/errata/RHSA-2024:0561
reference_id RHSA-2024:0561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0561
66
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD2G74BXS2SWOE3FIQJ6X76S3A7PDGML/
reference_id SD2G74BXS2SWOE3FIQJ6X76S3A7PDGML
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD2G74BXS2SWOE3FIQJ6X76S3A7PDGML/
67
reference_url https://usn.ubuntu.com/6244-1/
reference_id USN-6244-1
reference_type
scores
url https://usn.ubuntu.com/6244-1/
68
reference_url https://usn.ubuntu.com/6315-1/
reference_id USN-6315-1
reference_type
scores
url https://usn.ubuntu.com/6315-1/
69
reference_url https://usn.ubuntu.com/6316-1/
reference_id USN-6316-1
reference_type
scores
url https://usn.ubuntu.com/6316-1/
70
reference_url https://usn.ubuntu.com/6317-1/
reference_id USN-6317-1
reference_type
scores
url https://usn.ubuntu.com/6317-1/
71
reference_url https://usn.ubuntu.com/6318-1/
reference_id USN-6318-1
reference_type
scores
url https://usn.ubuntu.com/6318-1/
72
reference_url https://usn.ubuntu.com/6321-1/
reference_id USN-6321-1
reference_type
scores
url https://usn.ubuntu.com/6321-1/
73
reference_url https://usn.ubuntu.com/6324-1/
reference_id USN-6324-1
reference_type
scores
url https://usn.ubuntu.com/6324-1/
74
reference_url https://usn.ubuntu.com/6325-1/
reference_id USN-6325-1
reference_type
scores
url https://usn.ubuntu.com/6325-1/
75
reference_url https://usn.ubuntu.com/6328-1/
reference_id USN-6328-1
reference_type
scores
url https://usn.ubuntu.com/6328-1/
76
reference_url https://usn.ubuntu.com/6329-1/
reference_id USN-6329-1
reference_type
scores
url https://usn.ubuntu.com/6329-1/
77
reference_url https://usn.ubuntu.com/6330-1/
reference_id USN-6330-1
reference_type
scores
url https://usn.ubuntu.com/6330-1/
78
reference_url https://usn.ubuntu.com/6331-1/
reference_id USN-6331-1
reference_type
scores
url https://usn.ubuntu.com/6331-1/
79
reference_url https://usn.ubuntu.com/6332-1/
reference_id USN-6332-1
reference_type
scores
url https://usn.ubuntu.com/6332-1/
80
reference_url https://usn.ubuntu.com/6342-1/
reference_id USN-6342-1
reference_type
scores
url https://usn.ubuntu.com/6342-1/
81
reference_url https://usn.ubuntu.com/6342-2/
reference_id USN-6342-2
reference_type
scores
url https://usn.ubuntu.com/6342-2/
82
reference_url https://usn.ubuntu.com/6346-1/
reference_id USN-6346-1
reference_type
scores
url https://usn.ubuntu.com/6346-1/
83
reference_url https://usn.ubuntu.com/6348-1/
reference_id USN-6348-1
reference_type
scores
url https://usn.ubuntu.com/6348-1/
84
reference_url https://usn.ubuntu.com/6357-1/
reference_id USN-6357-1
reference_type
scores
url https://usn.ubuntu.com/6357-1/
85
reference_url https://usn.ubuntu.com/6385-1/
reference_id USN-6385-1
reference_type
scores
url https://usn.ubuntu.com/6385-1/
86
reference_url https://usn.ubuntu.com/6397-1/
reference_id USN-6397-1
reference_type
scores
url https://usn.ubuntu.com/6397-1/
87
reference_url https://usn.ubuntu.com/6532-1/
reference_id USN-6532-1
reference_type
scores
url https://usn.ubuntu.com/6532-1/
88
reference_url https://xenbits.xen.org/xsa/advisory-433.html
reference_id XSA-433
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-433.html
89
reference_url https://cmpxchg8b.com/zenbleed.html
reference_id zenbleed.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/
url https://cmpxchg8b.com/zenbleed.html
fixed_packages
aliases CVE-2023-20593, XSA-433
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rrkb-m7jz-1fgj
12
url VCID-swxd-qvb2-tfat
vulnerability_id VCID-swxd-qvb2-tfat
summary kernel: irqchip/gicv3: Workaround for NVIDIA erratum T241-FABRIC-4
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53383.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53383.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53383
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01525
published_at 2026-04-26T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01416
published_at 2026-04-16T12:55:00Z
2
value 0.00011
scoring_system epss
scoring_elements 0.0143
published_at 2026-04-18T12:55:00Z
3
value 0.00011
scoring_system epss
scoring_elements 0.01518
published_at 2026-04-21T12:55:00Z
4
value 0.00011
scoring_system epss
scoring_elements 0.01526
published_at 2026-04-24T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01486
published_at 2026-04-12T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01498
published_at 2026-04-08T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.01502
published_at 2026-04-09T12:55:00Z
8
value 0.00012
scoring_system epss
scoring_elements 0.01487
published_at 2026-04-13T12:55:00Z
9
value 0.00012
scoring_system epss
scoring_elements 0.01488
published_at 2026-04-04T12:55:00Z
10
value 0.00012
scoring_system epss
scoring_elements 0.01494
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53383
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53383
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2396396
reference_id 2396396
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2396396
5
reference_url https://git.kernel.org/stable/c/35727af2b15d98a2dd2811d631d3a3886111312e
reference_id 35727af2b15d98a2dd2811d631d3a3886111312e
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:56:56Z/
url https://git.kernel.org/stable/c/35727af2b15d98a2dd2811d631d3a3886111312e
6
reference_url https://git.kernel.org/stable/c/867a4f6cf1a8f511c06e131477988b3b3e7a0633
reference_id 867a4f6cf1a8f511c06e131477988b3b3e7a0633
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:56:56Z/
url https://git.kernel.org/stable/c/867a4f6cf1a8f511c06e131477988b3b3e7a0633
7
reference_url https://git.kernel.org/stable/c/86ba4f7b9f949e4c4bcb425f2a1ce490fea30df0
reference_id 86ba4f7b9f949e4c4bcb425f2a1ce490fea30df0
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:56:56Z/
url https://git.kernel.org/stable/c/86ba4f7b9f949e4c4bcb425f2a1ce490fea30df0
8
reference_url https://access.redhat.com/errata/RHSA-2023:5069
reference_id RHSA-2023:5069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5069
9
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
fixed_packages
aliases CVE-2023-53383
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-swxd-qvb2-tfat
13
url VCID-u8bs-4aab-z3fu
vulnerability_id VCID-u8bs-4aab-z3fu
summary kernel: save/restore speculative MSRs during S3 suspend/resume
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1637.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1637.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1637
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.0201
published_at 2026-04-02T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02018
published_at 2026-04-11T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.0202
published_at 2026-04-04T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02016
published_at 2026-04-07T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02035
published_at 2026-04-09T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02003
published_at 2026-04-12T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.01999
published_at 2026-04-13T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.02891
published_at 2026-04-18T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.0301
published_at 2026-04-21T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03006
published_at 2026-04-24T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.02994
published_at 2026-04-26T12:55:00Z
11
value 0.00015
scoring_system epss
scoring_elements 0.0288
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1637
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1637
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2181891
reference_id 2181891
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2181891
5
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e2a1256b17b16f9b9adf1b6fea56819e7b68e463
reference_id ?id=e2a1256b17b16f9b9adf1b6fea56819e7b68e463
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-19T21:05:36Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e2a1256b17b16f9b9adf1b6fea56819e7b68e463
6
reference_url https://access.redhat.com/errata/RHSA-2023:4789
reference_id RHSA-2023:4789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4789
7
reference_url https://access.redhat.com/errata/RHSA-2023:5069
reference_id RHSA-2023:5069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5069
8
reference_url https://access.redhat.com/errata/RHSA-2023:5091
reference_id RHSA-2023:5091
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5091
9
reference_url https://access.redhat.com/errata/RHSA-2023:5244
reference_id RHSA-2023:5244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5244
10
reference_url https://access.redhat.com/errata/RHSA-2023:5255
reference_id RHSA-2023:5255
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5255
11
reference_url https://access.redhat.com/errata/RHSA-2023:5628
reference_id RHSA-2023:5628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5628
12
reference_url https://access.redhat.com/errata/RHSA-2023:5794
reference_id RHSA-2023:5794
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5794
13
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=27398
reference_id show_bug.cgi?id=27398
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-19T21:05:36Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=27398
fixed_packages
aliases CVE-2023-1637
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u8bs-4aab-z3fu
14
url VCID-zvkd-p15d-7bde
vulnerability_id VCID-zvkd-p15d-7bde
summary kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35001.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35001.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-35001
reference_id
reference_type
scores
0
value 0.00207
scoring_system epss
scoring_elements 0.4311
published_at 2026-04-02T12:55:00Z
1
value 0.00207
scoring_system epss
scoring_elements 0.43138
published_at 2026-04-04T12:55:00Z
2
value 0.00207
scoring_system epss
scoring_elements 0.43076
published_at 2026-04-07T12:55:00Z
3
value 0.00207
scoring_system epss
scoring_elements 0.4313
published_at 2026-04-08T12:55:00Z
4
value 0.00207
scoring_system epss
scoring_elements 0.43142
published_at 2026-04-09T12:55:00Z
5
value 0.00207
scoring_system epss
scoring_elements 0.43163
published_at 2026-04-11T12:55:00Z
6
value 0.00207
scoring_system epss
scoring_elements 0.43131
published_at 2026-04-12T12:55:00Z
7
value 0.00207
scoring_system epss
scoring_elements 0.43116
published_at 2026-04-13T12:55:00Z
8
value 0.00207
scoring_system epss
scoring_elements 0.43176
published_at 2026-04-16T12:55:00Z
9
value 0.00207
scoring_system epss
scoring_elements 0.43165
published_at 2026-04-18T12:55:00Z
10
value 0.00207
scoring_system epss
scoring_elements 0.43099
published_at 2026-04-21T12:55:00Z
11
value 0.00207
scoring_system epss
scoring_elements 0.43034
published_at 2026-04-24T12:55:00Z
12
value 0.00207
scoring_system epss
scoring_elements 0.43036
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-35001
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2156
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31248
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35001
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2220892
reference_id 2220892
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2220892
7
reference_url https://access.redhat.com/errata/RHSA-2023:4961
reference_id RHSA-2023:4961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4961
8
reference_url https://access.redhat.com/errata/RHSA-2023:4962
reference_id RHSA-2023:4962
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4962
9
reference_url https://access.redhat.com/errata/RHSA-2023:4967
reference_id RHSA-2023:4967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4967
10
reference_url https://access.redhat.com/errata/RHSA-2023:5069
reference_id RHSA-2023:5069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5069
11
reference_url https://access.redhat.com/errata/RHSA-2023:5091
reference_id RHSA-2023:5091
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5091
12
reference_url https://access.redhat.com/errata/RHSA-2023:5093
reference_id RHSA-2023:5093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5093
13
reference_url https://access.redhat.com/errata/RHSA-2023:5221
reference_id RHSA-2023:5221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5221
14
reference_url https://access.redhat.com/errata/RHSA-2023:5235
reference_id RHSA-2023:5235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5235
15
reference_url https://access.redhat.com/errata/RHSA-2023:5238
reference_id RHSA-2023:5238
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5238
16
reference_url https://access.redhat.com/errata/RHSA-2023:5244
reference_id RHSA-2023:5244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5244
17
reference_url https://access.redhat.com/errata/RHSA-2023:5255
reference_id RHSA-2023:5255
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5255
18
reference_url https://access.redhat.com/errata/RHSA-2023:5414
reference_id RHSA-2023:5414
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5414
19
reference_url https://access.redhat.com/errata/RHSA-2023:5548
reference_id RHSA-2023:5548
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5548
20
reference_url https://access.redhat.com/errata/RHSA-2023:5574
reference_id RHSA-2023:5574
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5574
21
reference_url https://access.redhat.com/errata/RHSA-2023:5575
reference_id RHSA-2023:5575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5575
22
reference_url https://access.redhat.com/errata/RHSA-2023:5603
reference_id RHSA-2023:5603
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5603
23
reference_url https://access.redhat.com/errata/RHSA-2023:5604
reference_id RHSA-2023:5604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5604
24
reference_url https://access.redhat.com/errata/RHSA-2023:5621
reference_id RHSA-2023:5621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5621
25
reference_url https://access.redhat.com/errata/RHSA-2023:5622
reference_id RHSA-2023:5622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5622
26
reference_url https://access.redhat.com/errata/RHSA-2023:5627
reference_id RHSA-2023:5627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5627
27
reference_url https://access.redhat.com/errata/RHSA-2023:7243
reference_id RHSA-2023:7243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7243
28
reference_url https://access.redhat.com/errata/RHSA-2024:1268
reference_id RHSA-2024:1268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1268
29
reference_url https://access.redhat.com/errata/RHSA-2024:1269
reference_id RHSA-2024:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1269
30
reference_url https://access.redhat.com/errata/RHSA-2024:1278
reference_id RHSA-2024:1278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1278
31
reference_url https://usn.ubuntu.com/6246-1/
reference_id USN-6246-1
reference_type
scores
url https://usn.ubuntu.com/6246-1/
32
reference_url https://usn.ubuntu.com/6247-1/
reference_id USN-6247-1
reference_type
scores
url https://usn.ubuntu.com/6247-1/
33
reference_url https://usn.ubuntu.com/6248-1/
reference_id USN-6248-1
reference_type
scores
url https://usn.ubuntu.com/6248-1/
34
reference_url https://usn.ubuntu.com/6250-1/
reference_id USN-6250-1
reference_type
scores
url https://usn.ubuntu.com/6250-1/
35
reference_url https://usn.ubuntu.com/6251-1/
reference_id USN-6251-1
reference_type
scores
url https://usn.ubuntu.com/6251-1/
36
reference_url https://usn.ubuntu.com/6252-1/
reference_id USN-6252-1
reference_type
scores
url https://usn.ubuntu.com/6252-1/
37
reference_url https://usn.ubuntu.com/6254-1/
reference_id USN-6254-1
reference_type
scores
url https://usn.ubuntu.com/6254-1/
38
reference_url https://usn.ubuntu.com/6255-1/
reference_id USN-6255-1
reference_type
scores
url https://usn.ubuntu.com/6255-1/
39
reference_url https://usn.ubuntu.com/6260-1/
reference_id USN-6260-1
reference_type
scores
url https://usn.ubuntu.com/6260-1/
40
reference_url https://usn.ubuntu.com/6261-1/
reference_id USN-6261-1
reference_type
scores
url https://usn.ubuntu.com/6261-1/
41
reference_url https://usn.ubuntu.com/6285-1/
reference_id USN-6285-1
reference_type
scores
url https://usn.ubuntu.com/6285-1/
42
reference_url https://usn.ubuntu.com/6460-1/
reference_id USN-6460-1
reference_type
scores
url https://usn.ubuntu.com/6460-1/
fixed_packages
aliases CVE-2023-35001
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zvkd-p15d-7bde
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@5.14.0-284.30.1%3Farch=el9_2