Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@4.18.0-372.64.1?arch=el8_6
Typerpm
Namespaceredhat
Namekernel
Version4.18.0-372.64.1
Qualifiers
arch el8_6
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1et7-qezd-1bea
vulnerability_id VCID-1et7-qezd-1bea
summary kernel: net: sched: fix memory leak in tcindex_set_parms
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50396.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50396.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50396
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02346
published_at 2026-04-02T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02341
published_at 2026-04-13T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02342
published_at 2026-04-12T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02355
published_at 2026-04-11T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02378
published_at 2026-04-09T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02356
published_at 2026-04-08T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02352
published_at 2026-04-07T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03405
published_at 2026-04-24T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.03291
published_at 2026-04-16T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03301
published_at 2026-04-18T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03419
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50396
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50396
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50396
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/01d0d2b8b4e3cf2110baba9371c0c3d04ad5c77b
reference_id 01d0d2b8b4e3cf2110baba9371c0c3d04ad5c77b
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:54Z/
url https://git.kernel.org/stable/c/01d0d2b8b4e3cf2110baba9371c0c3d04ad5c77b
5
reference_url https://git.kernel.org/stable/c/18c3fa7a7fdbb4d21dafc8a7710ae2c1680930f6
reference_id 18c3fa7a7fdbb4d21dafc8a7710ae2c1680930f6
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:54Z/
url https://git.kernel.org/stable/c/18c3fa7a7fdbb4d21dafc8a7710ae2c1680930f6
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2396378
reference_id 2396378
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2396378
7
reference_url https://git.kernel.org/stable/c/372ae77cf11d11fb118cbe2d37def9dd5f826abd
reference_id 372ae77cf11d11fb118cbe2d37def9dd5f826abd
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:54Z/
url https://git.kernel.org/stable/c/372ae77cf11d11fb118cbe2d37def9dd5f826abd
8
reference_url https://git.kernel.org/stable/c/399ab7fe0fa0d846881685fd4e57e9a8ef7559f7
reference_id 399ab7fe0fa0d846881685fd4e57e9a8ef7559f7
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:54Z/
url https://git.kernel.org/stable/c/399ab7fe0fa0d846881685fd4e57e9a8ef7559f7
9
reference_url https://git.kernel.org/stable/c/3abebc503a5148072052c229c6b04b329a420ecd
reference_id 3abebc503a5148072052c229c6b04b329a420ecd
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:54Z/
url https://git.kernel.org/stable/c/3abebc503a5148072052c229c6b04b329a420ecd
10
reference_url https://git.kernel.org/stable/c/53af9c793f644d5841d84d8e0ad83bd7ab47f3e0
reference_id 53af9c793f644d5841d84d8e0ad83bd7ab47f3e0
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:54Z/
url https://git.kernel.org/stable/c/53af9c793f644d5841d84d8e0ad83bd7ab47f3e0
11
reference_url https://git.kernel.org/stable/c/55ac68b53f1cea1926ee2313afc5d66b91daad71
reference_id 55ac68b53f1cea1926ee2313afc5d66b91daad71
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:54Z/
url https://git.kernel.org/stable/c/55ac68b53f1cea1926ee2313afc5d66b91daad71
12
reference_url https://git.kernel.org/stable/c/6c55953e232ea668731091d111066521f3b7719b
reference_id 6c55953e232ea668731091d111066521f3b7719b
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:54Z/
url https://git.kernel.org/stable/c/6c55953e232ea668731091d111066521f3b7719b
13
reference_url https://git.kernel.org/stable/c/7a6fb69bbcb21e9ce13bdf18c008c268874f0480
reference_id 7a6fb69bbcb21e9ce13bdf18c008c268874f0480
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:54Z/
url https://git.kernel.org/stable/c/7a6fb69bbcb21e9ce13bdf18c008c268874f0480
14
reference_url https://git.kernel.org/stable/c/7c183dc0af472dec33d2c0786a5e356baa8cad19
reference_id 7c183dc0af472dec33d2c0786a5e356baa8cad19
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:54Z/
url https://git.kernel.org/stable/c/7c183dc0af472dec33d2c0786a5e356baa8cad19
15
reference_url https://git.kernel.org/stable/c/b314f6c3512108d7a656c5caf07c82d1bbbdc0f1
reference_id b314f6c3512108d7a656c5caf07c82d1bbbdc0f1
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:54Z/
url https://git.kernel.org/stable/c/b314f6c3512108d7a656c5caf07c82d1bbbdc0f1
16
reference_url https://git.kernel.org/stable/c/c4de6057e7c6654983acb63d939d26ac0d7bbf39
reference_id c4de6057e7c6654983acb63d939d26ac0d7bbf39
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:54Z/
url https://git.kernel.org/stable/c/c4de6057e7c6654983acb63d939d26ac0d7bbf39
17
reference_url https://git.kernel.org/stable/c/facc4405e8b7407e03216207b1d1d640127de0c8
reference_id facc4405e8b7407e03216207b1d1d640127de0c8
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T18:51:54Z/
url https://git.kernel.org/stable/c/facc4405e8b7407e03216207b1d1d640127de0c8
18
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
19
reference_url https://access.redhat.com/errata/RHSA-2023:4130
reference_id RHSA-2023:4130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4130
20
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
fixed_packages
aliases CVE-2022-50396
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1et7-qezd-1bea
1
url VCID-uqu9-hbxy-kqeh
vulnerability_id VCID-uqu9-hbxy-kqeh
summary kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32233.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32233.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32233
reference_id
reference_type
scores
0
value 0.00676
scoring_system epss
scoring_elements 0.71515
published_at 2026-04-16T12:55:00Z
1
value 0.00676
scoring_system epss
scoring_elements 0.71488
published_at 2026-04-12T12:55:00Z
2
value 0.00676
scoring_system epss
scoring_elements 0.71504
published_at 2026-04-11T12:55:00Z
3
value 0.00676
scoring_system epss
scoring_elements 0.71482
published_at 2026-04-09T12:55:00Z
4
value 0.00676
scoring_system epss
scoring_elements 0.7147
published_at 2026-04-13T12:55:00Z
5
value 0.00676
scoring_system epss
scoring_elements 0.71429
published_at 2026-04-07T12:55:00Z
6
value 0.00676
scoring_system epss
scoring_elements 0.71455
published_at 2026-04-04T12:55:00Z
7
value 0.00676
scoring_system epss
scoring_elements 0.71437
published_at 2026-04-02T12:55:00Z
8
value 0.00676
scoring_system epss
scoring_elements 0.71521
published_at 2026-04-18T12:55:00Z
9
value 0.00695
scoring_system epss
scoring_elements 0.71971
published_at 2026-04-24T12:55:00Z
10
value 0.00695
scoring_system epss
scoring_elements 0.71926
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32233
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0386
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0386
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31436
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31436
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32233
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32233
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2196105
reference_id 2196105
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2196105
7
reference_url https://www.openwall.com/lists/oss-security/2023/05/08/4
reference_id 4
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/
url https://www.openwall.com/lists/oss-security/2023/05/08/4
8
reference_url http://www.openwall.com/lists/oss-security/2023/05/15/5
reference_id 5
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/
url http://www.openwall.com/lists/oss-security/2023/05/15/5
9
reference_url https://github.com/torvalds/linux/commit/c1592a89942e9678f7d9c8030efa777c0d57edab
reference_id c1592a89942e9678f7d9c8030efa777c0d57edab
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/
url https://github.com/torvalds/linux/commit/c1592a89942e9678f7d9c8030efa777c0d57edab
10
reference_url https://www.debian.org/security/2023/dsa-5402
reference_id dsa-5402
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/
url https://www.debian.org/security/2023/dsa-5402
11
reference_url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c1592a89942e9678f7d9c8030efa777c0d57edab
reference_id ?id=c1592a89942e9678f7d9c8030efa777c0d57edab
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/
url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c1592a89942e9678f7d9c8030efa777c0d57edab
12
reference_url https://news.ycombinator.com/item?id=35879660
reference_id item?id=35879660
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/
url https://news.ycombinator.com/item?id=35879660
13
reference_url http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html
reference_id Kernel-Live-Patch-Security-Notice-LSN-0095-1.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/
url http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html
14
reference_url https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/
url https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html
15
reference_url https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
reference_id msg00030.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/
url https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
16
reference_url https://security.netapp.com/advisory/ntap-20230616-0002/
reference_id ntap-20230616-0002
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:27Z/
url https://security.netapp.com/advisory/ntap-20230616-0002/
17
reference_url https://access.redhat.com/errata/RHSA-2023:3349
reference_id RHSA-2023:3349
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3349
18
reference_url https://access.redhat.com/errata/RHSA-2023:3350
reference_id RHSA-2023:3350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3350
19
reference_url https://access.redhat.com/errata/RHSA-2023:3351
reference_id RHSA-2023:3351
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3351
20
reference_url https://access.redhat.com/errata/RHSA-2023:3465
reference_id RHSA-2023:3465
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3465
21
reference_url https://access.redhat.com/errata/RHSA-2023:3470
reference_id RHSA-2023:3470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3470
22
reference_url https://access.redhat.com/errata/RHSA-2023:3490
reference_id RHSA-2023:3490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3490
23
reference_url https://access.redhat.com/errata/RHSA-2023:3705
reference_id RHSA-2023:3705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3705
24
reference_url https://access.redhat.com/errata/RHSA-2023:3708
reference_id RHSA-2023:3708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3708
25
reference_url https://access.redhat.com/errata/RHSA-2023:3723
reference_id RHSA-2023:3723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3723
26
reference_url https://access.redhat.com/errata/RHSA-2023:3852
reference_id RHSA-2023:3852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3852
27
reference_url https://access.redhat.com/errata/RHSA-2023:3853
reference_id RHSA-2023:3853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3853
28
reference_url https://access.redhat.com/errata/RHSA-2023:4125
reference_id RHSA-2023:4125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4125
29
reference_url https://access.redhat.com/errata/RHSA-2023:4126
reference_id RHSA-2023:4126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4126
30
reference_url https://access.redhat.com/errata/RHSA-2023:4130
reference_id RHSA-2023:4130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4130
31
reference_url https://access.redhat.com/errata/RHSA-2023:4145
reference_id RHSA-2023:4145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4145
32
reference_url https://access.redhat.com/errata/RHSA-2023:4146
reference_id RHSA-2023:4146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4146
33
reference_url https://access.redhat.com/errata/RHSA-2023:4255
reference_id RHSA-2023:4255
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4255
34
reference_url https://access.redhat.com/errata/RHSA-2023:4256
reference_id RHSA-2023:4256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4256
35
reference_url https://access.redhat.com/errata/RHSA-2023:4262
reference_id RHSA-2023:4262
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4262
36
reference_url https://access.redhat.com/errata/RHSA-2023:4696
reference_id RHSA-2023:4696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4696
37
reference_url https://access.redhat.com/errata/RHSA-2023:4699
reference_id RHSA-2023:4699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4699
38
reference_url https://access.redhat.com/errata/RHSA-2023:5419
reference_id RHSA-2023:5419
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5419
39
reference_url https://access.redhat.com/errata/RHSA-2023:5574
reference_id RHSA-2023:5574
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5574
40
reference_url https://access.redhat.com/errata/RHSA-2023:5621
reference_id RHSA-2023:5621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5621
41
reference_url https://access.redhat.com/errata/RHSA-2023:5622
reference_id RHSA-2023:5622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5622
42
reference_url https://usn.ubuntu.com/6122-1/
reference_id USN-6122-1
reference_type
scores
url https://usn.ubuntu.com/6122-1/
43
reference_url https://usn.ubuntu.com/6123-1/
reference_id USN-6123-1
reference_type
scores
url https://usn.ubuntu.com/6123-1/
44
reference_url https://usn.ubuntu.com/6124-1/
reference_id USN-6124-1
reference_type
scores
url https://usn.ubuntu.com/6124-1/
45
reference_url https://usn.ubuntu.com/6127-1/
reference_id USN-6127-1
reference_type
scores
url https://usn.ubuntu.com/6127-1/
46
reference_url https://usn.ubuntu.com/6130-1/
reference_id USN-6130-1
reference_type
scores
url https://usn.ubuntu.com/6130-1/
47
reference_url https://usn.ubuntu.com/6131-1/
reference_id USN-6131-1
reference_type
scores
url https://usn.ubuntu.com/6131-1/
48
reference_url https://usn.ubuntu.com/6132-1/
reference_id USN-6132-1
reference_type
scores
url https://usn.ubuntu.com/6132-1/
49
reference_url https://usn.ubuntu.com/6135-1/
reference_id USN-6135-1
reference_type
scores
url https://usn.ubuntu.com/6135-1/
50
reference_url https://usn.ubuntu.com/6149-1/
reference_id USN-6149-1
reference_type
scores
url https://usn.ubuntu.com/6149-1/
51
reference_url https://usn.ubuntu.com/6150-1/
reference_id USN-6150-1
reference_type
scores
url https://usn.ubuntu.com/6150-1/
52
reference_url https://usn.ubuntu.com/6162-1/
reference_id USN-6162-1
reference_type
scores
url https://usn.ubuntu.com/6162-1/
53
reference_url https://usn.ubuntu.com/6175-1/
reference_id USN-6175-1
reference_type
scores
url https://usn.ubuntu.com/6175-1/
54
reference_url https://usn.ubuntu.com/6186-1/
reference_id USN-6186-1
reference_type
scores
url https://usn.ubuntu.com/6186-1/
55
reference_url https://usn.ubuntu.com/6222-1/
reference_id USN-6222-1
reference_type
scores
url https://usn.ubuntu.com/6222-1/
56
reference_url https://usn.ubuntu.com/6256-1/
reference_id USN-6256-1
reference_type
scores
url https://usn.ubuntu.com/6256-1/
fixed_packages
aliases CVE-2023-32233
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uqu9-hbxy-kqeh
2
url VCID-va4k-cpus-nqdm
vulnerability_id VCID-va4k-cpus-nqdm
summary kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1281.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1281.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1281
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03927
published_at 2026-04-24T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03914
published_at 2026-04-21T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.03952
published_at 2026-04-04T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.03942
published_at 2026-04-02T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.03969
published_at 2026-04-08T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.03964
published_at 2026-04-07T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04458
published_at 2026-04-18T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04523
published_at 2026-04-09T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.0445
published_at 2026-04-16T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.0448
published_at 2026-04-13T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04497
published_at 2026-04-12T12:55:00Z
11
value 0.00018
scoring_system epss
scoring_elements 0.04512
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1281
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1281
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2181847
reference_id 2181847
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2181847
5
reference_url http://www.openwall.com/lists/oss-security/2023/04/11/3
reference_id 3
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:43:38Z/
url http://www.openwall.com/lists/oss-security/2023/04/11/3
6
reference_url https://kernel.dance/#ee059170b1f7e94e55fa6cadee544e176a6e59c2
reference_id #ee059170b1f7e94e55fa6cadee544e176a6e59c2
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:43:38Z/
url https://kernel.dance/#ee059170b1f7e94e55fa6cadee544e176a6e59c2
7
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee059170b1f7e94e55fa6cadee544e176a6e59c2
reference_id ?id=ee059170b1f7e94e55fa6cadee544e176a6e59c2
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:43:38Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee059170b1f7e94e55fa6cadee544e176a6e59c2
8
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:43:38Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
9
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:43:38Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
10
reference_url https://security.netapp.com/advisory/ntap-20230427-0004/
reference_id ntap-20230427-0004
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:43:38Z/
url https://security.netapp.com/advisory/ntap-20230427-0004/
11
reference_url https://access.redhat.com/errata/RHSA-2023:3852
reference_id RHSA-2023:3852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3852
12
reference_url https://access.redhat.com/errata/RHSA-2023:3853
reference_id RHSA-2023:3853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3853
13
reference_url https://access.redhat.com/errata/RHSA-2023:4125
reference_id RHSA-2023:4125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4125
14
reference_url https://access.redhat.com/errata/RHSA-2023:4126
reference_id RHSA-2023:4126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4126
15
reference_url https://access.redhat.com/errata/RHSA-2023:4130
reference_id RHSA-2023:4130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4130
16
reference_url https://access.redhat.com/errata/RHSA-2023:4145
reference_id RHSA-2023:4145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4145
17
reference_url https://access.redhat.com/errata/RHSA-2023:4146
reference_id RHSA-2023:4146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4146
18
reference_url https://access.redhat.com/errata/RHSA-2023:4255
reference_id RHSA-2023:4255
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4255
19
reference_url https://access.redhat.com/errata/RHSA-2023:4256
reference_id RHSA-2023:4256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4256
20
reference_url https://access.redhat.com/errata/RHSA-2023:4262
reference_id RHSA-2023:4262
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4262
21
reference_url https://access.redhat.com/errata/RHSA-2023:4517
reference_id RHSA-2023:4517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4517
22
reference_url https://access.redhat.com/errata/RHSA-2023:4531
reference_id RHSA-2023:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4531
23
reference_url https://access.redhat.com/errata/RHSA-2023:4541
reference_id RHSA-2023:4541
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4541
24
reference_url https://usn.ubuntu.com/5977-1/
reference_id USN-5977-1
reference_type
scores
url https://usn.ubuntu.com/5977-1/
25
reference_url https://usn.ubuntu.com/5978-1/
reference_id USN-5978-1
reference_type
scores
url https://usn.ubuntu.com/5978-1/
26
reference_url https://usn.ubuntu.com/6024-1/
reference_id USN-6024-1
reference_type
scores
url https://usn.ubuntu.com/6024-1/
27
reference_url https://usn.ubuntu.com/6025-1/
reference_id USN-6025-1
reference_type
scores
url https://usn.ubuntu.com/6025-1/
28
reference_url https://usn.ubuntu.com/6027-1/
reference_id USN-6027-1
reference_type
scores
url https://usn.ubuntu.com/6027-1/
29
reference_url https://usn.ubuntu.com/6029-1/
reference_id USN-6029-1
reference_type
scores
url https://usn.ubuntu.com/6029-1/
30
reference_url https://usn.ubuntu.com/6030-1/
reference_id USN-6030-1
reference_type
scores
url https://usn.ubuntu.com/6030-1/
31
reference_url https://usn.ubuntu.com/6031-1/
reference_id USN-6031-1
reference_type
scores
url https://usn.ubuntu.com/6031-1/
32
reference_url https://usn.ubuntu.com/6040-1/
reference_id USN-6040-1
reference_type
scores
url https://usn.ubuntu.com/6040-1/
33
reference_url https://usn.ubuntu.com/6057-1/
reference_id USN-6057-1
reference_type
scores
url https://usn.ubuntu.com/6057-1/
34
reference_url https://usn.ubuntu.com/6093-1/
reference_id USN-6093-1
reference_type
scores
url https://usn.ubuntu.com/6093-1/
35
reference_url https://usn.ubuntu.com/6134-1/
reference_id USN-6134-1
reference_type
scores
url https://usn.ubuntu.com/6134-1/
36
reference_url https://usn.ubuntu.com/6222-1/
reference_id USN-6222-1
reference_type
scores
url https://usn.ubuntu.com/6222-1/
37
reference_url https://usn.ubuntu.com/6256-1/
reference_id USN-6256-1
reference_type
scores
url https://usn.ubuntu.com/6256-1/
fixed_packages
aliases CVE-2023-1281
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-va4k-cpus-nqdm
3
url VCID-zex7-kjeu-4ugv
vulnerability_id VCID-zex7-kjeu-4ugv
summary kernel: scsi: qla2xxx: Fix crash when I/O abort times out
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50493.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50493.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50493
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03188
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03198
published_at 2026-04-04T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03201
published_at 2026-04-07T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03205
published_at 2026-04-08T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03231
published_at 2026-04-09T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03185
published_at 2026-04-11T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.03158
published_at 2026-04-12T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03142
published_at 2026-04-13T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.03116
published_at 2026-04-16T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03123
published_at 2026-04-18T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03242
published_at 2026-04-21T12:55:00Z
11
value 0.00015
scoring_system epss
scoring_elements 0.03243
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50493
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50493
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2401516
reference_id 2401516
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2401516
5
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
6
reference_url https://access.redhat.com/errata/RHSA-2023:4130
reference_id RHSA-2023:4130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4130
fixed_packages
aliases CVE-2022-50493
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zex7-kjeu-4ugv
Fixing_vulnerabilities
Risk_score3.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-372.64.1%3Farch=el8_6