Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@4.18.0-372.75.1?arch=el8_6
Typerpm
Namespaceredhat
Namekernel
Version4.18.0-372.75.1
Qualifiers
arch el8_6
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1b2u-7w7f-wudv
vulnerability_id VCID-1b2u-7w7f-wudv
summary kernel: use-after-free due to race condition in qdisc_graft()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0590.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0590.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0590
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01789
published_at 2026-04-02T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01801
published_at 2026-04-07T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01804
published_at 2026-04-08T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01818
published_at 2026-04-09T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02654
published_at 2026-04-18T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02766
published_at 2026-04-21T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02756
published_at 2026-04-24T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02682
published_at 2026-04-11T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02668
published_at 2026-04-12T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02665
published_at 2026-04-13T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02646
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0590
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0590
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2165741
reference_id 2165741
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2165741
5
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
6
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
7
reference_url https://access.redhat.com/errata/RHSA-2023:5627
reference_id RHSA-2023:5627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5627
8
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
9
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
10
reference_url https://access.redhat.com/errata/RHSA-2023:7382
reference_id RHSA-2023:7382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7382
11
reference_url https://access.redhat.com/errata/RHSA-2023:7389
reference_id RHSA-2023:7389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7389
12
reference_url https://usn.ubuntu.com/5850-1/
reference_id USN-5850-1
reference_type
scores
url https://usn.ubuntu.com/5850-1/
13
reference_url https://usn.ubuntu.com/5851-1/
reference_id USN-5851-1
reference_type
scores
url https://usn.ubuntu.com/5851-1/
14
reference_url https://usn.ubuntu.com/5860-1/
reference_id USN-5860-1
reference_type
scores
url https://usn.ubuntu.com/5860-1/
15
reference_url https://usn.ubuntu.com/5876-1/
reference_id USN-5876-1
reference_type
scores
url https://usn.ubuntu.com/5876-1/
16
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
17
reference_url https://usn.ubuntu.com/5878-1/
reference_id USN-5878-1
reference_type
scores
url https://usn.ubuntu.com/5878-1/
18
reference_url https://usn.ubuntu.com/5879-1/
reference_id USN-5879-1
reference_type
scores
url https://usn.ubuntu.com/5879-1/
19
reference_url https://usn.ubuntu.com/6284-1/
reference_id USN-6284-1
reference_type
scores
url https://usn.ubuntu.com/6284-1/
20
reference_url https://usn.ubuntu.com/6301-1/
reference_id USN-6301-1
reference_type
scores
url https://usn.ubuntu.com/6301-1/
21
reference_url https://usn.ubuntu.com/6312-1/
reference_id USN-6312-1
reference_type
scores
url https://usn.ubuntu.com/6312-1/
22
reference_url https://usn.ubuntu.com/6314-1/
reference_id USN-6314-1
reference_type
scores
url https://usn.ubuntu.com/6314-1/
23
reference_url https://usn.ubuntu.com/6331-1/
reference_id USN-6331-1
reference_type
scores
url https://usn.ubuntu.com/6331-1/
24
reference_url https://usn.ubuntu.com/6337-1/
reference_id USN-6337-1
reference_type
scores
url https://usn.ubuntu.com/6337-1/
fixed_packages
aliases CVE-2023-0590
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1b2u-7w7f-wudv
1
url VCID-9cat-tz9k-9kcb
vulnerability_id VCID-9cat-tz9k-9kcb
summary kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4004.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4004.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4004
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03162
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03172
published_at 2026-04-04T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03174
published_at 2026-04-07T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03179
published_at 2026-04-08T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03205
published_at 2026-04-09T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03163
published_at 2026-04-11T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.03138
published_at 2026-04-12T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03124
published_at 2026-04-13T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.031
published_at 2026-04-16T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03107
published_at 2026-04-18T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03227
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4004
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
33
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2225275
reference_id 2225275
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2225275
35
reference_url https://access.redhat.com/errata/RHSA-2023:4961
reference_id RHSA-2023:4961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4961
36
reference_url https://access.redhat.com/errata/RHSA-2023:4962
reference_id RHSA-2023:4962
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4962
37
reference_url https://access.redhat.com/errata/RHSA-2023:4967
reference_id RHSA-2023:4967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4967
38
reference_url https://access.redhat.com/errata/RHSA-2023:5069
reference_id RHSA-2023:5069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5069
39
reference_url https://access.redhat.com/errata/RHSA-2023:5091
reference_id RHSA-2023:5091
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5091
40
reference_url https://access.redhat.com/errata/RHSA-2023:5093
reference_id RHSA-2023:5093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5093
41
reference_url https://access.redhat.com/errata/RHSA-2023:5221
reference_id RHSA-2023:5221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5221
42
reference_url https://access.redhat.com/errata/RHSA-2023:5244
reference_id RHSA-2023:5244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5244
43
reference_url https://access.redhat.com/errata/RHSA-2023:5255
reference_id RHSA-2023:5255
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5255
44
reference_url https://access.redhat.com/errata/RHSA-2023:5548
reference_id RHSA-2023:5548
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5548
45
reference_url https://access.redhat.com/errata/RHSA-2023:5627
reference_id RHSA-2023:5627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5627
46
reference_url https://access.redhat.com/errata/RHSA-2023:7382
reference_id RHSA-2023:7382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7382
47
reference_url https://access.redhat.com/errata/RHSA-2023:7389
reference_id RHSA-2023:7389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7389
48
reference_url https://access.redhat.com/errata/RHSA-2023:7411
reference_id RHSA-2023:7411
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7411
49
reference_url https://access.redhat.com/errata/RHSA-2023:7417
reference_id RHSA-2023:7417
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7417
50
reference_url https://access.redhat.com/errata/RHSA-2023:7431
reference_id RHSA-2023:7431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7431
51
reference_url https://access.redhat.com/errata/RHSA-2023:7434
reference_id RHSA-2023:7434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7434
52
reference_url https://usn.ubuntu.com/6315-1/
reference_id USN-6315-1
reference_type
scores
url https://usn.ubuntu.com/6315-1/
53
reference_url https://usn.ubuntu.com/6316-1/
reference_id USN-6316-1
reference_type
scores
url https://usn.ubuntu.com/6316-1/
54
reference_url https://usn.ubuntu.com/6318-1/
reference_id USN-6318-1
reference_type
scores
url https://usn.ubuntu.com/6318-1/
55
reference_url https://usn.ubuntu.com/6321-1/
reference_id USN-6321-1
reference_type
scores
url https://usn.ubuntu.com/6321-1/
56
reference_url https://usn.ubuntu.com/6325-1/
reference_id USN-6325-1
reference_type
scores
url https://usn.ubuntu.com/6325-1/
57
reference_url https://usn.ubuntu.com/6328-1/
reference_id USN-6328-1
reference_type
scores
url https://usn.ubuntu.com/6328-1/
58
reference_url https://usn.ubuntu.com/6330-1/
reference_id USN-6330-1
reference_type
scores
url https://usn.ubuntu.com/6330-1/
59
reference_url https://usn.ubuntu.com/6332-1/
reference_id USN-6332-1
reference_type
scores
url https://usn.ubuntu.com/6332-1/
60
reference_url https://usn.ubuntu.com/6348-1/
reference_id USN-6348-1
reference_type
scores
url https://usn.ubuntu.com/6348-1/
61
reference_url https://usn.ubuntu.com/6385-1/
reference_id USN-6385-1
reference_type
scores
url https://usn.ubuntu.com/6385-1/
62
reference_url https://usn.ubuntu.com/6442-1/
reference_id USN-6442-1
reference_type
scores
url https://usn.ubuntu.com/6442-1/
fixed_packages
aliases CVE-2023-4004
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9cat-tz9k-9kcb
2
url VCID-axj2-267a-5kdv
vulnerability_id VCID-axj2-267a-5kdv
summary kernel: ipvlan: out-of-bounds write caused by unclear skb->cb
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3090.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3090.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3090
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01738
published_at 2026-04-18T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01748
published_at 2026-04-13T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.0175
published_at 2026-04-12T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.0174
published_at 2026-04-02T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01765
published_at 2026-04-09T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01756
published_at 2026-04-08T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01753
published_at 2026-04-07T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.01754
published_at 2026-04-04T12:55:00Z
8
value 0.00012
scoring_system epss
scoring_elements 0.0176
published_at 2026-04-11T12:55:00Z
9
value 0.00012
scoring_system epss
scoring_elements 0.01823
published_at 2026-04-21T12:55:00Z
10
value 0.00013
scoring_system epss
scoring_elements 0.02145
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3090
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
33
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2218672
reference_id 2218672
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2218672
35
reference_url https://kernel.dance/90cbed5247439a966b645b34eb0a2e037836ea8e
reference_id 90cbed5247439a966b645b34eb0a2e037836ea8e
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-03-05T18:42:13Z/
url https://kernel.dance/90cbed5247439a966b645b34eb0a2e037836ea8e
36
reference_url https://www.debian.org/security/2023/dsa-5448
reference_id dsa-5448
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-03-05T18:42:13Z/
url https://www.debian.org/security/2023/dsa-5448
37
reference_url https://www.debian.org/security/2023/dsa-5480
reference_id dsa-5480
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-03-05T18:42:13Z/
url https://www.debian.org/security/2023/dsa-5480
38
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=90cbed5247439a966b645b34eb0a2e037836ea8e
reference_id ?id=90cbed5247439a966b645b34eb0a2e037836ea8e
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-03-05T18:42:13Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=90cbed5247439a966b645b34eb0a2e037836ea8e
39
reference_url http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html
reference_id Kernel-Live-Patch-Security-Notice-LSN-0097-1.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-03-05T18:42:13Z/
url http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html
40
reference_url http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
reference_id Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-03-05T18:42:13Z/
url http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
41
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-03-05T18:42:13Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
42
reference_url https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
reference_id msg00030.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-03-05T18:42:13Z/
url https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
43
reference_url https://security.netapp.com/advisory/ntap-20230731-0002/
reference_id ntap-20230731-0002
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-03-05T18:42:13Z/
url https://security.netapp.com/advisory/ntap-20230731-0002/
44
reference_url https://access.redhat.com/errata/RHSA-2023:4377
reference_id RHSA-2023:4377
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4377
45
reference_url https://access.redhat.com/errata/RHSA-2023:4378
reference_id RHSA-2023:4378
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4378
46
reference_url https://access.redhat.com/errata/RHSA-2023:4380
reference_id RHSA-2023:4380
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4380
47
reference_url https://access.redhat.com/errata/RHSA-2023:4515
reference_id RHSA-2023:4515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4515
48
reference_url https://access.redhat.com/errata/RHSA-2023:4516
reference_id RHSA-2023:4516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4516
49
reference_url https://access.redhat.com/errata/RHSA-2023:4801
reference_id RHSA-2023:4801
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4801
50
reference_url https://access.redhat.com/errata/RHSA-2023:4814
reference_id RHSA-2023:4814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4814
51
reference_url https://access.redhat.com/errata/RHSA-2023:4815
reference_id RHSA-2023:4815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4815
52
reference_url https://access.redhat.com/errata/RHSA-2023:4817
reference_id RHSA-2023:4817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4817
53
reference_url https://access.redhat.com/errata/RHSA-2023:4828
reference_id RHSA-2023:4828
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4828
54
reference_url https://access.redhat.com/errata/RHSA-2023:4829
reference_id RHSA-2023:4829
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4829
55
reference_url https://access.redhat.com/errata/RHSA-2023:4961
reference_id RHSA-2023:4961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4961
56
reference_url https://access.redhat.com/errata/RHSA-2023:4962
reference_id RHSA-2023:4962
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4962
57
reference_url https://access.redhat.com/errata/RHSA-2023:4967
reference_id RHSA-2023:4967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4967
58
reference_url https://access.redhat.com/errata/RHSA-2023:5221
reference_id RHSA-2023:5221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5221
59
reference_url https://access.redhat.com/errata/RHSA-2023:5244
reference_id RHSA-2023:5244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5244
60
reference_url https://access.redhat.com/errata/RHSA-2023:5255
reference_id RHSA-2023:5255
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5255
61
reference_url https://access.redhat.com/errata/RHSA-2023:5548
reference_id RHSA-2023:5548
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5548
62
reference_url https://access.redhat.com/errata/RHSA-2023:5627
reference_id RHSA-2023:5627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5627
63
reference_url https://usn.ubuntu.com/6231-1/
reference_id USN-6231-1
reference_type
scores
url https://usn.ubuntu.com/6231-1/
64
reference_url https://usn.ubuntu.com/6246-1/
reference_id USN-6246-1
reference_type
scores
url https://usn.ubuntu.com/6246-1/
65
reference_url https://usn.ubuntu.com/6250-1/
reference_id USN-6250-1
reference_type
scores
url https://usn.ubuntu.com/6250-1/
66
reference_url https://usn.ubuntu.com/6251-1/
reference_id USN-6251-1
reference_type
scores
url https://usn.ubuntu.com/6251-1/
67
reference_url https://usn.ubuntu.com/6252-1/
reference_id USN-6252-1
reference_type
scores
url https://usn.ubuntu.com/6252-1/
68
reference_url https://usn.ubuntu.com/6254-1/
reference_id USN-6254-1
reference_type
scores
url https://usn.ubuntu.com/6254-1/
69
reference_url https://usn.ubuntu.com/6255-1/
reference_id USN-6255-1
reference_type
scores
url https://usn.ubuntu.com/6255-1/
70
reference_url https://usn.ubuntu.com/6260-1/
reference_id USN-6260-1
reference_type
scores
url https://usn.ubuntu.com/6260-1/
71
reference_url https://usn.ubuntu.com/6261-1/
reference_id USN-6261-1
reference_type
scores
url https://usn.ubuntu.com/6261-1/
72
reference_url https://usn.ubuntu.com/6385-1/
reference_id USN-6385-1
reference_type
scores
url https://usn.ubuntu.com/6385-1/
fixed_packages
aliases CVE-2023-3090
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-axj2-267a-5kdv
3
url VCID-bp6k-v3c5-gudy
vulnerability_id VCID-bp6k-v3c5-gudy
summary kernel: LoadPin bypass via dm-verity table reload
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2503.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2503.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2503
reference_id
reference_type
scores
0
value 4e-05
scoring_system epss
scoring_elements 0.00202
published_at 2026-04-24T12:55:00Z
1
value 4e-05
scoring_system epss
scoring_elements 0.00194
published_at 2026-04-07T12:55:00Z
2
value 4e-05
scoring_system epss
scoring_elements 0.00197
published_at 2026-04-18T12:55:00Z
3
value 4e-05
scoring_system epss
scoring_elements 0.00193
published_at 2026-04-09T12:55:00Z
4
value 4e-05
scoring_system epss
scoring_elements 0.00195
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2503
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2503
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2177862
reference_id 2177862
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2177862
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://github.com/google/security-research/security/advisories/GHSA-6vq3-w69p-w63m
reference_id GHSA-6vq3-w69p-w63m
reference_type
scores
0
value 6.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-21T13:39:52Z/
url https://github.com/google/security-research/security/advisories/GHSA-6vq3-w69p-w63m
10
reference_url https://security.netapp.com/advisory/ntap-20230214-0005/
reference_id ntap-20230214-0005
reference_type
scores
0
value 6.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-21T13:39:52Z/
url https://security.netapp.com/advisory/ntap-20230214-0005/
11
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
12
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
13
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
14
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
15
reference_url https://access.redhat.com/errata/RHSA-2023:5627
reference_id RHSA-2023:5627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5627
16
reference_url https://usn.ubuntu.com/5594-1/
reference_id USN-5594-1
reference_type
scores
url https://usn.ubuntu.com/5594-1/
17
reference_url https://usn.ubuntu.com/5599-1/
reference_id USN-5599-1
reference_type
scores
url https://usn.ubuntu.com/5599-1/
18
reference_url https://usn.ubuntu.com/5602-1/
reference_id USN-5602-1
reference_type
scores
url https://usn.ubuntu.com/5602-1/
19
reference_url https://usn.ubuntu.com/5616-1/
reference_id USN-5616-1
reference_type
scores
url https://usn.ubuntu.com/5616-1/
20
reference_url https://usn.ubuntu.com/5622-1/
reference_id USN-5622-1
reference_type
scores
url https://usn.ubuntu.com/5622-1/
21
reference_url https://usn.ubuntu.com/5623-1/
reference_id USN-5623-1
reference_type
scores
url https://usn.ubuntu.com/5623-1/
22
reference_url https://usn.ubuntu.com/5630-1/
reference_id USN-5630-1
reference_type
scores
url https://usn.ubuntu.com/5630-1/
23
reference_url https://usn.ubuntu.com/5639-1/
reference_id USN-5639-1
reference_type
scores
url https://usn.ubuntu.com/5639-1/
24
reference_url https://usn.ubuntu.com/5647-1/
reference_id USN-5647-1
reference_type
scores
url https://usn.ubuntu.com/5647-1/
25
reference_url https://usn.ubuntu.com/5654-1/
reference_id USN-5654-1
reference_type
scores
url https://usn.ubuntu.com/5654-1/
26
reference_url https://usn.ubuntu.com/5660-1/
reference_id USN-5660-1
reference_type
scores
url https://usn.ubuntu.com/5660-1/
27
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
28
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
29
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
fixed_packages
aliases CVE-2022-2503
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bp6k-v3c5-gudy
4
url VCID-dm3r-us9z-5uc3
vulnerability_id VCID-dm3r-us9z-5uc3
summary kernel: Linux kernel iavf driver: Denial of Service via use-after-free vulnerability
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53556.json
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53556.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53556
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03107
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.0312
published_at 2026-04-07T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03125
published_at 2026-04-08T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.0315
published_at 2026-04-09T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03109
published_at 2026-04-11T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03083
published_at 2026-04-12T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.0307
published_at 2026-04-13T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03045
published_at 2026-04-16T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.03054
published_at 2026-04-18T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03172
published_at 2026-04-21T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03175
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53556
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53556
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2401478
reference_id 2401478
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2401478
5
reference_url https://access.redhat.com/errata/RHSA-2023:5069
reference_id RHSA-2023:5069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5069
6
reference_url https://access.redhat.com/errata/RHSA-2023:5627
reference_id RHSA-2023:5627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5627
7
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
8
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
fixed_packages
aliases CVE-2023-53556
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dm3r-us9z-5uc3
5
url VCID-ensk-7dvm-p7g7
vulnerability_id VCID-ensk-7dvm-p7g7
summary kernel: an out-of-bounds vulnerability in i2c-ismt driver
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2873.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2873.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2873
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.12202
published_at 2026-04-24T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.12256
published_at 2026-04-12T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.12219
published_at 2026-04-13T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.12109
published_at 2026-04-16T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.12113
published_at 2026-04-18T12:55:00Z
5
value 0.0004
scoring_system epss
scoring_elements 0.12224
published_at 2026-04-21T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.1231
published_at 2026-04-02T12:55:00Z
7
value 0.0004
scoring_system epss
scoring_elements 0.12358
published_at 2026-04-04T12:55:00Z
8
value 0.0004
scoring_system epss
scoring_elements 0.12156
published_at 2026-04-07T12:55:00Z
9
value 0.0004
scoring_system epss
scoring_elements 0.12235
published_at 2026-04-08T12:55:00Z
10
value 0.0004
scoring_system epss
scoring_elements 0.12285
published_at 2026-04-09T12:55:00Z
11
value 0.0004
scoring_system epss
scoring_elements 0.12293
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2873
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2119048
reference_id 2119048
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2119048
17
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
18
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
19
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
20
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
21
reference_url https://access.redhat.com/errata/RHSA-2023:0832
reference_id RHSA-2023:0832
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0832
22
reference_url https://access.redhat.com/errata/RHSA-2023:0854
reference_id RHSA-2023:0854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0854
23
reference_url https://access.redhat.com/errata/RHSA-2023:0951
reference_id RHSA-2023:0951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0951
24
reference_url https://access.redhat.com/errata/RHSA-2023:0979
reference_id RHSA-2023:0979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0979
25
reference_url https://access.redhat.com/errata/RHSA-2023:5627
reference_id RHSA-2023:5627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5627
26
reference_url https://usn.ubuntu.com/5594-1/
reference_id USN-5594-1
reference_type
scores
url https://usn.ubuntu.com/5594-1/
27
reference_url https://usn.ubuntu.com/5599-1/
reference_id USN-5599-1
reference_type
scores
url https://usn.ubuntu.com/5599-1/
28
reference_url https://usn.ubuntu.com/5602-1/
reference_id USN-5602-1
reference_type
scores
url https://usn.ubuntu.com/5602-1/
29
reference_url https://usn.ubuntu.com/5616-1/
reference_id USN-5616-1
reference_type
scores
url https://usn.ubuntu.com/5616-1/
30
reference_url https://usn.ubuntu.com/5623-1/
reference_id USN-5623-1
reference_type
scores
url https://usn.ubuntu.com/5623-1/
fixed_packages
aliases CVE-2022-2873
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ensk-7dvm-p7g7
6
url VCID-j7z5-3htn-vkd2
vulnerability_id VCID-j7z5-3htn-vkd2
summary kernel: hash collisions in the IPv6 connection lookup table
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1206.json
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1206.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1206
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11447
published_at 2026-04-02T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11307
published_at 2026-04-24T12:55:00Z
2
value 0.00038
scoring_system epss
scoring_elements 0.11435
published_at 2026-04-09T12:55:00Z
3
value 0.00038
scoring_system epss
scoring_elements 0.1144
published_at 2026-04-11T12:55:00Z
4
value 0.00038
scoring_system epss
scoring_elements 0.11408
published_at 2026-04-12T12:55:00Z
5
value 0.00038
scoring_system epss
scoring_elements 0.11378
published_at 2026-04-13T12:55:00Z
6
value 0.00038
scoring_system epss
scoring_elements 0.11236
published_at 2026-04-16T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.11238
published_at 2026-04-18T12:55:00Z
8
value 0.00038
scoring_system epss
scoring_elements 0.11366
published_at 2026-04-21T12:55:00Z
9
value 0.00038
scoring_system epss
scoring_elements 0.11506
published_at 2026-04-04T12:55:00Z
10
value 0.00038
scoring_system epss
scoring_elements 0.11294
published_at 2026-04-07T12:55:00Z
11
value 0.00038
scoring_system epss
scoring_elements 0.11376
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1206
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
33
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2175903
reference_id 2175903
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:04Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2175903
35
reference_url https://www.debian.org/security/2023/dsa-5480
reference_id dsa-5480
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:04Z/
url https://www.debian.org/security/2023/dsa-5480
36
reference_url https://www.debian.org/security/2023/dsa-5492
reference_id dsa-5492
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:04Z/
url https://www.debian.org/security/2023/dsa-5492
37
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
reference_id msg00004.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:04Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
38
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:04Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
39
reference_url https://security.netapp.com/advisory/ntap-20230929-0006/
reference_id ntap-20230929-0006
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:04Z/
url https://security.netapp.com/advisory/ntap-20230929-0006/
40
reference_url https://access.redhat.com/errata/RHSA-2023:5603
reference_id RHSA-2023:5603
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5603
41
reference_url https://access.redhat.com/errata/RHSA-2023:5604
reference_id RHSA-2023:5604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5604
42
reference_url https://access.redhat.com/errata/RHSA-2023:5627
reference_id RHSA-2023:5627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5627
43
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
44
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
45
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
46
reference_url https://usn.ubuntu.com/6343-1/
reference_id USN-6343-1
reference_type
scores
url https://usn.ubuntu.com/6343-1/
47
reference_url https://usn.ubuntu.com/6385-1/
reference_id USN-6385-1
reference_type
scores
url https://usn.ubuntu.com/6385-1/
48
reference_url https://usn.ubuntu.com/6412-1/
reference_id USN-6412-1
reference_type
scores
url https://usn.ubuntu.com/6412-1/
49
reference_url https://usn.ubuntu.com/6416-1/
reference_id USN-6416-1
reference_type
scores
url https://usn.ubuntu.com/6416-1/
50
reference_url https://usn.ubuntu.com/6416-2/
reference_id USN-6416-2
reference_type
scores
url https://usn.ubuntu.com/6416-2/
51
reference_url https://usn.ubuntu.com/6416-3/
reference_id USN-6416-3
reference_type
scores
url https://usn.ubuntu.com/6416-3/
52
reference_url https://usn.ubuntu.com/6417-1/
reference_id USN-6417-1
reference_type
scores
url https://usn.ubuntu.com/6417-1/
53
reference_url https://usn.ubuntu.com/6439-1/
reference_id USN-6439-1
reference_type
scores
url https://usn.ubuntu.com/6439-1/
54
reference_url https://usn.ubuntu.com/6439-2/
reference_id USN-6439-2
reference_type
scores
url https://usn.ubuntu.com/6439-2/
55
reference_url https://usn.ubuntu.com/6440-1/
reference_id USN-6440-1
reference_type
scores
url https://usn.ubuntu.com/6440-1/
56
reference_url https://usn.ubuntu.com/6440-2/
reference_id USN-6440-2
reference_type
scores
url https://usn.ubuntu.com/6440-2/
57
reference_url https://usn.ubuntu.com/6440-3/
reference_id USN-6440-3
reference_type
scores
url https://usn.ubuntu.com/6440-3/
58
reference_url https://usn.ubuntu.com/6445-1/
reference_id USN-6445-1
reference_type
scores
url https://usn.ubuntu.com/6445-1/
59
reference_url https://usn.ubuntu.com/6445-2/
reference_id USN-6445-2
reference_type
scores
url https://usn.ubuntu.com/6445-2/
60
reference_url https://usn.ubuntu.com/6460-1/
reference_id USN-6460-1
reference_type
scores
url https://usn.ubuntu.com/6460-1/
61
reference_url https://usn.ubuntu.com/6466-1/
reference_id USN-6466-1
reference_type
scores
url https://usn.ubuntu.com/6466-1/
fixed_packages
aliases CVE-2023-1206
risk_score 2.5
exploitability 0.5
weighted_severity 5.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j7z5-3htn-vkd2
7
url VCID-myxg-t4ps-p7ew
vulnerability_id VCID-myxg-t4ps-p7ew
summary kernel: scsi: storvsc: Fix handling of virtual Fibre Channel timeouts
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53245.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53245.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53245
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05261
published_at 2026-04-04T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05229
published_at 2026-04-02T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05344
published_at 2026-04-09T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05322
published_at 2026-04-08T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05286
published_at 2026-04-07T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06208
published_at 2026-04-24T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06085
published_at 2026-04-11T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06079
published_at 2026-04-12T12:55:00Z
8
value 0.00023
scoring_system epss
scoring_elements 0.06071
published_at 2026-04-13T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06036
published_at 2026-04-16T12:55:00Z
10
value 0.00023
scoring_system epss
scoring_elements 0.06045
published_at 2026-04-18T12:55:00Z
11
value 0.00023
scoring_system epss
scoring_elements 0.06194
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53245
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53245
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53245
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/048ebc9a28fb918ee635dd4b2fcf4248eb6e4050
reference_id 048ebc9a28fb918ee635dd4b2fcf4248eb6e4050
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:58:58Z/
url https://git.kernel.org/stable/c/048ebc9a28fb918ee635dd4b2fcf4248eb6e4050
5
reference_url https://git.kernel.org/stable/c/1678408d08f31a694d5150a56796dd04c9710b22
reference_id 1678408d08f31a694d5150a56796dd04c9710b22
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:58:58Z/
url https://git.kernel.org/stable/c/1678408d08f31a694d5150a56796dd04c9710b22
6
reference_url https://git.kernel.org/stable/c/175544ad48cbf56affeef2a679c6a4d4fb1e2881
reference_id 175544ad48cbf56affeef2a679c6a4d4fb1e2881
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:58:58Z/
url https://git.kernel.org/stable/c/175544ad48cbf56affeef2a679c6a4d4fb1e2881
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2395372
reference_id 2395372
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2395372
8
reference_url https://git.kernel.org/stable/c/311db605e07f0d4fc0cc7ddb74f1e5692ea2f469
reference_id 311db605e07f0d4fc0cc7ddb74f1e5692ea2f469
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:58:58Z/
url https://git.kernel.org/stable/c/311db605e07f0d4fc0cc7ddb74f1e5692ea2f469
9
reference_url https://git.kernel.org/stable/c/763c06565055ae373fe7f89c11e1447bd1ded264
reference_id 763c06565055ae373fe7f89c11e1447bd1ded264
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:58:58Z/
url https://git.kernel.org/stable/c/763c06565055ae373fe7f89c11e1447bd1ded264
10
reference_url https://git.kernel.org/stable/c/7a792b3d888aab2c65389f9f4f9f2f6c000b1a0d
reference_id 7a792b3d888aab2c65389f9f4f9f2f6c000b1a0d
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:58:58Z/
url https://git.kernel.org/stable/c/7a792b3d888aab2c65389f9f4f9f2f6c000b1a0d
11
reference_url https://git.kernel.org/stable/c/cd87f4df9865a53807001ed12c0f0420b14ececd
reference_id cd87f4df9865a53807001ed12c0f0420b14ececd
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:58:58Z/
url https://git.kernel.org/stable/c/cd87f4df9865a53807001ed12c0f0420b14ececd
12
reference_url https://git.kernel.org/stable/c/ed70fa5629a8b992a5372d7044d1db1f8fa6de29
reference_id ed70fa5629a8b992a5372d7044d1db1f8fa6de29
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T17:58:58Z/
url https://git.kernel.org/stable/c/ed70fa5629a8b992a5372d7044d1db1f8fa6de29
13
reference_url https://access.redhat.com/errata/RHSA-2023:5604
reference_id RHSA-2023:5604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5604
14
reference_url https://access.redhat.com/errata/RHSA-2023:5627
reference_id RHSA-2023:5627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5627
15
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
16
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
fixed_packages
aliases CVE-2023-53245
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-myxg-t4ps-p7ew
8
url VCID-n89e-y6eu-4ucf
vulnerability_id VCID-n89e-y6eu-4ucf
summary kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4128.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4128.json
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2261965
reference_id 2261965
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2261965
3
reference_url https://access.redhat.com/errata/RHSA-2023:5235
reference_id RHSA-2023:5235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5235
4
reference_url https://access.redhat.com/errata/RHSA-2023:5238
reference_id RHSA-2023:5238
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5238
5
reference_url https://access.redhat.com/errata/RHSA-2023:5548
reference_id RHSA-2023:5548
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5548
6
reference_url https://access.redhat.com/errata/RHSA-2023:5575
reference_id RHSA-2023:5575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5575
7
reference_url https://access.redhat.com/errata/RHSA-2023:5580
reference_id RHSA-2023:5580
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5580
8
reference_url https://access.redhat.com/errata/RHSA-2023:5588
reference_id RHSA-2023:5588
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5588
9
reference_url https://access.redhat.com/errata/RHSA-2023:5589
reference_id RHSA-2023:5589
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5589
10
reference_url https://access.redhat.com/errata/RHSA-2023:5603
reference_id RHSA-2023:5603
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5603
11
reference_url https://access.redhat.com/errata/RHSA-2023:5604
reference_id RHSA-2023:5604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5604
12
reference_url https://access.redhat.com/errata/RHSA-2023:5627
reference_id RHSA-2023:5627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5627
13
reference_url https://access.redhat.com/errata/RHSA-2023:5628
reference_id RHSA-2023:5628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5628
14
reference_url https://access.redhat.com/errata/RHSA-2023:5775
reference_id RHSA-2023:5775
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5775
15
reference_url https://access.redhat.com/errata/RHSA-2023:5794
reference_id RHSA-2023:5794
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5794
16
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
17
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
18
reference_url https://access.redhat.com/errata/RHSA-2023:7370
reference_id RHSA-2023:7370
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7370
19
reference_url https://access.redhat.com/errata/RHSA-2023:7379
reference_id RHSA-2023:7379
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7379
20
reference_url https://access.redhat.com/errata/RHSA-2023:7418
reference_id RHSA-2023:7418
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7418
21
reference_url https://access.redhat.com/errata/RHSA-2023:7419
reference_id RHSA-2023:7419
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7419
22
reference_url https://access.redhat.com/errata/RHSA-2023:7423
reference_id RHSA-2023:7423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7423
23
reference_url https://access.redhat.com/errata/RHSA-2023:7424
reference_id RHSA-2023:7424
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7424
24
reference_url https://access.redhat.com/errata/RHSA-2023:7539
reference_id RHSA-2023:7539
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7539
25
reference_url https://access.redhat.com/errata/RHSA-2023:7558
reference_id RHSA-2023:7558
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7558
26
reference_url https://access.redhat.com/errata/RHSA-2024:0261
reference_id RHSA-2024:0261
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0261
27
reference_url https://access.redhat.com/errata/RHSA-2024:0262
reference_id RHSA-2024:0262
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0262
28
reference_url https://usn.ubuntu.com/6343-1/
reference_id USN-6343-1
reference_type
scores
url https://usn.ubuntu.com/6343-1/
29
reference_url https://usn.ubuntu.com/6383-1/
reference_id USN-6383-1
reference_type
scores
url https://usn.ubuntu.com/6383-1/
30
reference_url https://usn.ubuntu.com/6385-1/
reference_id USN-6385-1
reference_type
scores
url https://usn.ubuntu.com/6385-1/
31
reference_url https://usn.ubuntu.com/6386-1/
reference_id USN-6386-1
reference_type
scores
url https://usn.ubuntu.com/6386-1/
32
reference_url https://usn.ubuntu.com/6386-2/
reference_id USN-6386-2
reference_type
scores
url https://usn.ubuntu.com/6386-2/
33
reference_url https://usn.ubuntu.com/6386-3/
reference_id USN-6386-3
reference_type
scores
url https://usn.ubuntu.com/6386-3/
34
reference_url https://usn.ubuntu.com/6387-1/
reference_id USN-6387-1
reference_type
scores
url https://usn.ubuntu.com/6387-1/
35
reference_url https://usn.ubuntu.com/6387-2/
reference_id USN-6387-2
reference_type
scores
url https://usn.ubuntu.com/6387-2/
36
reference_url https://usn.ubuntu.com/6388-1/
reference_id USN-6388-1
reference_type
scores
url https://usn.ubuntu.com/6388-1/
37
reference_url https://usn.ubuntu.com/6396-1/
reference_id USN-6396-1
reference_type
scores
url https://usn.ubuntu.com/6396-1/
38
reference_url https://usn.ubuntu.com/6396-2/
reference_id USN-6396-2
reference_type
scores
url https://usn.ubuntu.com/6396-2/
39
reference_url https://usn.ubuntu.com/6396-3/
reference_id USN-6396-3
reference_type
scores
url https://usn.ubuntu.com/6396-3/
40
reference_url https://usn.ubuntu.com/6466-1/
reference_id USN-6466-1
reference_type
scores
url https://usn.ubuntu.com/6466-1/
fixed_packages
aliases CVE-2023-4128
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n89e-y6eu-4ucf
9
url VCID-q5kt-n8qx-57dd
vulnerability_id VCID-q5kt-n8qx-57dd
summary kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1095.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1095.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1095
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03721
published_at 2026-04-02T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03799
published_at 2026-04-24T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03711
published_at 2026-04-12T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03685
published_at 2026-04-13T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03661
published_at 2026-04-16T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03673
published_at 2026-04-18T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03794
published_at 2026-04-21T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03732
published_at 2026-04-04T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03746
published_at 2026-04-07T12:55:00Z
9
value 0.00016
scoring_system epss
scoring_elements 0.0375
published_at 2026-04-08T12:55:00Z
10
value 0.00016
scoring_system epss
scoring_elements 0.03774
published_at 2026-04-09T12:55:00Z
11
value 0.00016
scoring_system epss
scoring_elements 0.03733
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1095
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1095
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2173973
reference_id 2173973
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T17:30:41Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2173973
5
reference_url https://github.com/torvalds/linux/commit/580077855a40741cf511766129702d97ff02f4d9
reference_id 580077855a40741cf511766129702d97ff02f4d9
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T17:30:41Z/
url https://github.com/torvalds/linux/commit/580077855a40741cf511766129702d97ff02f4d9
6
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
7
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
8
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
9
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
10
reference_url https://access.redhat.com/errata/RHSA-2023:5627
reference_id RHSA-2023:5627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5627
11
reference_url https://access.redhat.com/errata/RHSA-2023:5628
reference_id RHSA-2023:5628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5628
12
reference_url https://access.redhat.com/errata/RHSA-2023:6813
reference_id RHSA-2023:6813
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6813
13
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
14
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
15
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
16
reference_url https://usn.ubuntu.com/6031-1/
reference_id USN-6031-1
reference_type
scores
url https://usn.ubuntu.com/6031-1/
fixed_packages
aliases CVE-2023-1095
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q5kt-n8qx-57dd
10
url VCID-vqy7-37ym-eufr
vulnerability_id VCID-vqy7-37ym-eufr
summary kernel: xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36879.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36879.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-36879
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.06971
published_at 2026-04-24T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.0682
published_at 2026-04-02T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06863
published_at 2026-04-04T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.06849
published_at 2026-04-07T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.06904
published_at 2026-04-08T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.06935
published_at 2026-04-09T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.06932
published_at 2026-04-11T12:55:00Z
7
value 0.00025
scoring_system epss
scoring_elements 0.06925
published_at 2026-04-12T12:55:00Z
8
value 0.00025
scoring_system epss
scoring_elements 0.06921
published_at 2026-04-13T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.0686
published_at 2026-04-16T12:55:00Z
10
value 0.00025
scoring_system epss
scoring_elements 0.06842
published_at 2026-04-18T12:55:00Z
11
value 0.00025
scoring_system epss
scoring_elements 0.06984
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-36879
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2119855
reference_id 2119855
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2119855
12
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
13
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
14
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
15
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=f85daf0e725358be78dfd208dea5fd665d8cb901
reference_id commit?id=f85daf0e725358be78dfd208dea5fd665d8cb901
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=f85daf0e725358be78dfd208dea5fd665d8cb901
16
reference_url https://www.debian.org/security/2022/dsa-5207
reference_id dsa-5207
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/
url https://www.debian.org/security/2022/dsa-5207
17
reference_url https://github.com/torvalds/linux/commit/f85daf0e725358be78dfd208dea5fd665d8cb901
reference_id f85daf0e725358be78dfd208dea5fd665d8cb901
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/
url https://github.com/torvalds/linux/commit/f85daf0e725358be78dfd208dea5fd665d8cb901
18
reference_url https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html
reference_id msg00000.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/
url https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html
19
reference_url https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html
reference_id msg00011.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/
url https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html
20
reference_url https://security.netapp.com/advisory/ntap-20220901-0007/
reference_id ntap-20220901-0007
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/
url https://security.netapp.com/advisory/ntap-20220901-0007/
21
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
22
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
23
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
24
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
25
reference_url https://access.redhat.com/errata/RHSA-2023:5627
reference_id RHSA-2023:5627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5627
26
reference_url https://access.redhat.com/errata/RHSA-2024:0431
reference_id RHSA-2024:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0431
27
reference_url https://access.redhat.com/errata/RHSA-2024:0432
reference_id RHSA-2024:0432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0432
28
reference_url https://usn.ubuntu.com/5667-1/
reference_id USN-5667-1
reference_type
scores
url https://usn.ubuntu.com/5667-1/
29
reference_url https://usn.ubuntu.com/5668-1/
reference_id USN-5668-1
reference_type
scores
url https://usn.ubuntu.com/5668-1/
30
reference_url https://usn.ubuntu.com/5677-1/
reference_id USN-5677-1
reference_type
scores
url https://usn.ubuntu.com/5677-1/
31
reference_url https://usn.ubuntu.com/5682-1/
reference_id USN-5682-1
reference_type
scores
url https://usn.ubuntu.com/5682-1/
32
reference_url https://usn.ubuntu.com/5683-1/
reference_id USN-5683-1
reference_type
scores
url https://usn.ubuntu.com/5683-1/
33
reference_url https://usn.ubuntu.com/5703-1/
reference_id USN-5703-1
reference_type
scores
url https://usn.ubuntu.com/5703-1/
34
reference_url https://usn.ubuntu.com/5706-1/
reference_id USN-5706-1
reference_type
scores
url https://usn.ubuntu.com/5706-1/
35
reference_url https://usn.ubuntu.com/5727-1/
reference_id USN-5727-1
reference_type
scores
url https://usn.ubuntu.com/5727-1/
36
reference_url https://usn.ubuntu.com/5727-2/
reference_id USN-5727-2
reference_type
scores
url https://usn.ubuntu.com/5727-2/
37
reference_url https://usn.ubuntu.com/5774-1/
reference_id USN-5774-1
reference_type
scores
url https://usn.ubuntu.com/5774-1/
38
reference_url https://usn.ubuntu.com/5913-1/
reference_id USN-5913-1
reference_type
scores
url https://usn.ubuntu.com/5913-1/
39
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
40
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
41
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
fixed_packages
aliases CVE-2022-36879
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vqy7-37ym-eufr
11
url VCID-xm9f-adzk-6bg9
vulnerability_id VCID-xm9f-adzk-6bg9
summary kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36558.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36558.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-36558
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03525
published_at 2026-04-01T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03569
published_at 2026-04-02T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03583
published_at 2026-04-04T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03593
published_at 2026-04-07T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03595
published_at 2026-04-08T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03617
published_at 2026-04-09T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03574
published_at 2026-04-11T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03545
published_at 2026-04-12T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.0352
published_at 2026-04-13T12:55:00Z
9
value 0.00016
scoring_system epss
scoring_elements 0.03495
published_at 2026-04-16T12:55:00Z
10
value 0.00016
scoring_system epss
scoring_elements 0.03507
published_at 2026-04-18T12:55:00Z
11
value 0.00016
scoring_system epss
scoring_elements 0.03632
published_at 2026-04-21T12:55:00Z
12
value 0.00016
scoring_system epss
scoring_elements 0.03638
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-36558
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36558
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2112693
reference_id 2112693
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2112693
5
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
6
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
7
reference_url https://access.redhat.com/errata/RHSA-2023:5627
reference_id RHSA-2023:5627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5627
8
reference_url https://access.redhat.com/errata/RHSA-2024:2003
reference_id RHSA-2024:2003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2003
9
reference_url https://access.redhat.com/errata/RHSA-2024:2004
reference_id RHSA-2024:2004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2004
fixed_packages
aliases CVE-2020-36558
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xm9f-adzk-6bg9
12
url VCID-zsmq-81fu-q3fq
vulnerability_id VCID-zsmq-81fu-q3fq
summary kernel: use-after-free vulnerability in the perf_group_detach function of the Linux Kernel Performance Events
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2235.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2235.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2235
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02509
published_at 2026-04-18T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02601
published_at 2026-04-24T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02529
published_at 2026-04-11T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02518
published_at 2026-04-12T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02517
published_at 2026-04-13T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02504
published_at 2026-04-16T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02616
published_at 2026-04-21T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02522
published_at 2026-04-04T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02524
published_at 2026-04-07T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02528
published_at 2026-04-08T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02549
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2235
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2192589
reference_id 2192589
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2192589
4
reference_url https://kernel.dance/fd0815f632c24878e325821943edccc7fde947a2
reference_id fd0815f632c24878e325821943edccc7fde947a2
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:38:34Z/
url https://kernel.dance/fd0815f632c24878e325821943edccc7fde947a2
5
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fd0815f632c24878e325821943edccc7fde947a2
reference_id ?id=fd0815f632c24878e325821943edccc7fde947a2
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:38:34Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fd0815f632c24878e325821943edccc7fde947a2
6
reference_url https://access.redhat.com/errata/RHSA-2023:3705
reference_id RHSA-2023:3705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3705
7
reference_url https://access.redhat.com/errata/RHSA-2023:3708
reference_id RHSA-2023:3708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3708
8
reference_url https://access.redhat.com/errata/RHSA-2023:3723
reference_id RHSA-2023:3723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3723
9
reference_url https://access.redhat.com/errata/RHSA-2023:4137
reference_id RHSA-2023:4137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4137
10
reference_url https://access.redhat.com/errata/RHSA-2023:4138
reference_id RHSA-2023:4138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4138
11
reference_url https://access.redhat.com/errata/RHSA-2023:4517
reference_id RHSA-2023:4517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4517
12
reference_url https://access.redhat.com/errata/RHSA-2023:4541
reference_id RHSA-2023:4541
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4541
13
reference_url https://access.redhat.com/errata/RHSA-2023:5627
reference_id RHSA-2023:5627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5627
14
reference_url https://usn.ubuntu.com/6175-1/
reference_id USN-6175-1
reference_type
scores
url https://usn.ubuntu.com/6175-1/
15
reference_url https://usn.ubuntu.com/6186-1/
reference_id USN-6186-1
reference_type
scores
url https://usn.ubuntu.com/6186-1/
16
reference_url https://usn.ubuntu.com/6300-1/
reference_id USN-6300-1
reference_type
scores
url https://usn.ubuntu.com/6300-1/
17
reference_url https://usn.ubuntu.com/6311-1/
reference_id USN-6311-1
reference_type
scores
url https://usn.ubuntu.com/6311-1/
18
reference_url https://usn.ubuntu.com/6332-1/
reference_id USN-6332-1
reference_type
scores
url https://usn.ubuntu.com/6332-1/
19
reference_url https://usn.ubuntu.com/6347-1/
reference_id USN-6347-1
reference_type
scores
url https://usn.ubuntu.com/6347-1/
20
reference_url https://usn.ubuntu.com/6385-1/
reference_id USN-6385-1
reference_type
scores
url https://usn.ubuntu.com/6385-1/
fixed_packages
aliases CVE-2023-2235
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zsmq-81fu-q3fq
13
url VCID-zvkd-p15d-7bde
vulnerability_id VCID-zvkd-p15d-7bde
summary kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35001.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35001.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-35001
reference_id
reference_type
scores
0
value 0.00207
scoring_system epss
scoring_elements 0.4311
published_at 2026-04-02T12:55:00Z
1
value 0.00207
scoring_system epss
scoring_elements 0.43138
published_at 2026-04-04T12:55:00Z
2
value 0.00207
scoring_system epss
scoring_elements 0.43076
published_at 2026-04-07T12:55:00Z
3
value 0.00207
scoring_system epss
scoring_elements 0.4313
published_at 2026-04-08T12:55:00Z
4
value 0.00207
scoring_system epss
scoring_elements 0.43142
published_at 2026-04-09T12:55:00Z
5
value 0.00207
scoring_system epss
scoring_elements 0.43163
published_at 2026-04-11T12:55:00Z
6
value 0.00207
scoring_system epss
scoring_elements 0.43131
published_at 2026-04-12T12:55:00Z
7
value 0.00207
scoring_system epss
scoring_elements 0.43116
published_at 2026-04-13T12:55:00Z
8
value 0.00207
scoring_system epss
scoring_elements 0.43176
published_at 2026-04-16T12:55:00Z
9
value 0.00207
scoring_system epss
scoring_elements 0.43165
published_at 2026-04-18T12:55:00Z
10
value 0.00207
scoring_system epss
scoring_elements 0.43099
published_at 2026-04-21T12:55:00Z
11
value 0.00207
scoring_system epss
scoring_elements 0.43034
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-35001
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2156
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31248
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35001
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2220892
reference_id 2220892
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2220892
7
reference_url https://access.redhat.com/errata/RHSA-2023:4961
reference_id RHSA-2023:4961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4961
8
reference_url https://access.redhat.com/errata/RHSA-2023:4962
reference_id RHSA-2023:4962
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4962
9
reference_url https://access.redhat.com/errata/RHSA-2023:4967
reference_id RHSA-2023:4967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4967
10
reference_url https://access.redhat.com/errata/RHSA-2023:5069
reference_id RHSA-2023:5069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5069
11
reference_url https://access.redhat.com/errata/RHSA-2023:5091
reference_id RHSA-2023:5091
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5091
12
reference_url https://access.redhat.com/errata/RHSA-2023:5093
reference_id RHSA-2023:5093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5093
13
reference_url https://access.redhat.com/errata/RHSA-2023:5221
reference_id RHSA-2023:5221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5221
14
reference_url https://access.redhat.com/errata/RHSA-2023:5235
reference_id RHSA-2023:5235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5235
15
reference_url https://access.redhat.com/errata/RHSA-2023:5238
reference_id RHSA-2023:5238
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5238
16
reference_url https://access.redhat.com/errata/RHSA-2023:5244
reference_id RHSA-2023:5244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5244
17
reference_url https://access.redhat.com/errata/RHSA-2023:5255
reference_id RHSA-2023:5255
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5255
18
reference_url https://access.redhat.com/errata/RHSA-2023:5414
reference_id RHSA-2023:5414
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5414
19
reference_url https://access.redhat.com/errata/RHSA-2023:5548
reference_id RHSA-2023:5548
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5548
20
reference_url https://access.redhat.com/errata/RHSA-2023:5574
reference_id RHSA-2023:5574
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5574
21
reference_url https://access.redhat.com/errata/RHSA-2023:5575
reference_id RHSA-2023:5575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5575
22
reference_url https://access.redhat.com/errata/RHSA-2023:5603
reference_id RHSA-2023:5603
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5603
23
reference_url https://access.redhat.com/errata/RHSA-2023:5604
reference_id RHSA-2023:5604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5604
24
reference_url https://access.redhat.com/errata/RHSA-2023:5621
reference_id RHSA-2023:5621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5621
25
reference_url https://access.redhat.com/errata/RHSA-2023:5622
reference_id RHSA-2023:5622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5622
26
reference_url https://access.redhat.com/errata/RHSA-2023:5627
reference_id RHSA-2023:5627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5627
27
reference_url https://access.redhat.com/errata/RHSA-2023:7243
reference_id RHSA-2023:7243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7243
28
reference_url https://access.redhat.com/errata/RHSA-2024:1268
reference_id RHSA-2024:1268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1268
29
reference_url https://access.redhat.com/errata/RHSA-2024:1269
reference_id RHSA-2024:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1269
30
reference_url https://access.redhat.com/errata/RHSA-2024:1278
reference_id RHSA-2024:1278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1278
31
reference_url https://usn.ubuntu.com/6246-1/
reference_id USN-6246-1
reference_type
scores
url https://usn.ubuntu.com/6246-1/
32
reference_url https://usn.ubuntu.com/6247-1/
reference_id USN-6247-1
reference_type
scores
url https://usn.ubuntu.com/6247-1/
33
reference_url https://usn.ubuntu.com/6248-1/
reference_id USN-6248-1
reference_type
scores
url https://usn.ubuntu.com/6248-1/
34
reference_url https://usn.ubuntu.com/6250-1/
reference_id USN-6250-1
reference_type
scores
url https://usn.ubuntu.com/6250-1/
35
reference_url https://usn.ubuntu.com/6251-1/
reference_id USN-6251-1
reference_type
scores
url https://usn.ubuntu.com/6251-1/
36
reference_url https://usn.ubuntu.com/6252-1/
reference_id USN-6252-1
reference_type
scores
url https://usn.ubuntu.com/6252-1/
37
reference_url https://usn.ubuntu.com/6254-1/
reference_id USN-6254-1
reference_type
scores
url https://usn.ubuntu.com/6254-1/
38
reference_url https://usn.ubuntu.com/6255-1/
reference_id USN-6255-1
reference_type
scores
url https://usn.ubuntu.com/6255-1/
39
reference_url https://usn.ubuntu.com/6260-1/
reference_id USN-6260-1
reference_type
scores
url https://usn.ubuntu.com/6260-1/
40
reference_url https://usn.ubuntu.com/6261-1/
reference_id USN-6261-1
reference_type
scores
url https://usn.ubuntu.com/6261-1/
41
reference_url https://usn.ubuntu.com/6285-1/
reference_id USN-6285-1
reference_type
scores
url https://usn.ubuntu.com/6285-1/
42
reference_url https://usn.ubuntu.com/6460-1/
reference_id USN-6460-1
reference_type
scores
url https://usn.ubuntu.com/6460-1/
fixed_packages
aliases CVE-2023-35001
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zvkd-p15d-7bde
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-372.75.1%3Farch=el8_6