Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@4.18.0-477.51.1?arch=el8_8
Typerpm
Namespaceredhat
Namekernel
Version4.18.0-477.51.1
Qualifiers
arch el8_8
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1a4w-wmuv-bkgp
vulnerability_id VCID-1a4w-wmuv-bkgp
summary kernel: out-of-bounds write in hw_atl_utils_fw_rpc_wait() in drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43975.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43975.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-43975
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.04968
published_at 2026-04-01T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.05226
published_at 2026-04-26T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.05059
published_at 2026-04-13T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.05005
published_at 2026-04-16T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.05011
published_at 2026-04-18T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.05157
published_at 2026-04-21T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.05184
published_at 2026-04-24T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.0502
published_at 2026-04-02T12:55:00Z
8
value 0.00019
scoring_system epss
scoring_elements 0.05049
published_at 2026-04-04T12:55:00Z
9
value 0.00019
scoring_system epss
scoring_elements 0.05071
published_at 2026-04-07T12:55:00Z
10
value 0.00019
scoring_system epss
scoring_elements 0.05104
published_at 2026-04-08T12:55:00Z
11
value 0.00019
scoring_system epss
scoring_elements 0.05118
published_at 2026-04-09T12:55:00Z
12
value 0.00019
scoring_system epss
scoring_elements 0.05093
published_at 2026-04-11T12:55:00Z
13
value 0.00019
scoring_system epss
scoring_elements 0.05076
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-43975
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375
53
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
54
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2024989
reference_id 2024989
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2024989
55
reference_url https://security.archlinux.org/AVG-2610
reference_id AVG-2610
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2610
56
reference_url https://security.archlinux.org/AVG-2611
reference_id AVG-2611
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2611
57
reference_url https://security.archlinux.org/AVG-2612
reference_id AVG-2612
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2612
58
reference_url https://security.archlinux.org/AVG-2613
reference_id AVG-2613
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2613
59
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
60
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
61
reference_url https://access.redhat.com/errata/RHSA-2024:1188
reference_id RHSA-2024:1188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1188
62
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
63
reference_url https://usn.ubuntu.com/5278-1/
reference_id USN-5278-1
reference_type
scores
url https://usn.ubuntu.com/5278-1/
64
reference_url https://usn.ubuntu.com/5294-1/
reference_id USN-5294-1
reference_type
scores
url https://usn.ubuntu.com/5294-1/
65
reference_url https://usn.ubuntu.com/5294-2/
reference_id USN-5294-2
reference_type
scores
url https://usn.ubuntu.com/5294-2/
66
reference_url https://usn.ubuntu.com/5297-1/
reference_id USN-5297-1
reference_type
scores
url https://usn.ubuntu.com/5297-1/
67
reference_url https://usn.ubuntu.com/5337-1/
reference_id USN-5337-1
reference_type
scores
url https://usn.ubuntu.com/5337-1/
68
reference_url https://usn.ubuntu.com/5368-1/
reference_id USN-5368-1
reference_type
scores
url https://usn.ubuntu.com/5368-1/
69
reference_url https://usn.ubuntu.com/5385-1/
reference_id USN-5385-1
reference_type
scores
url https://usn.ubuntu.com/5385-1/
fixed_packages
aliases CVE-2021-43975
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1a4w-wmuv-bkgp
1
url VCID-1t1x-4v6d-akdz
vulnerability_id VCID-1t1x-4v6d-akdz
summary kernel: OOB Access in smb2_dump_detail
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6610.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6610.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6610
reference_id
reference_type
scores
0
value 0.0001
scoring_system epss
scoring_elements 0.0117
published_at 2026-04-02T12:55:00Z
1
value 0.0001
scoring_system epss
scoring_elements 0.01176
published_at 2026-04-04T12:55:00Z
2
value 0.0001
scoring_system epss
scoring_elements 0.01189
published_at 2026-04-07T12:55:00Z
3
value 0.0001
scoring_system epss
scoring_elements 0.01195
published_at 2026-04-08T12:55:00Z
4
value 0.0001
scoring_system epss
scoring_elements 0.01197
published_at 2026-04-09T12:55:00Z
5
value 0.0001
scoring_system epss
scoring_elements 0.01182
published_at 2026-04-11T12:55:00Z
6
value 0.0001
scoring_system epss
scoring_elements 0.01175
published_at 2026-04-12T12:55:00Z
7
value 0.0001
scoring_system epss
scoring_elements 0.01177
published_at 2026-04-13T12:55:00Z
8
value 0.0001
scoring_system epss
scoring_elements 0.01167
published_at 2026-04-16T12:55:00Z
9
value 0.0001
scoring_system epss
scoring_elements 0.01179
published_at 2026-04-18T12:55:00Z
10
value 0.0001
scoring_system epss
scoring_elements 0.01248
published_at 2026-04-21T12:55:00Z
11
value 0.0001
scoring_system epss
scoring_elements 0.01253
published_at 2026-04-24T12:55:00Z
12
value 0.0001
scoring_system epss
scoring_elements 0.01259
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6610
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6610
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2253614
reference_id 2253614
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2253614
5
reference_url https://access.redhat.com/errata/RHSA-2024:0723
reference_id RHSA-2024:0723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0723
6
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
7
reference_url https://access.redhat.com/errata/RHSA-2024:0725
reference_id RHSA-2024:0725
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0725
8
reference_url https://access.redhat.com/errata/RHSA-2024:0881
reference_id RHSA-2024:0881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0881
9
reference_url https://access.redhat.com/errata/RHSA-2024:0897
reference_id RHSA-2024:0897
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0897
10
reference_url https://access.redhat.com/errata/RHSA-2024:1248
reference_id RHSA-2024:1248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1248
11
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
12
reference_url https://access.redhat.com/errata/RHSA-2024:2094
reference_id RHSA-2024:2094
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2094
13
reference_url https://usn.ubuntu.com/6688-1/
reference_id USN-6688-1
reference_type
scores
url https://usn.ubuntu.com/6688-1/
14
reference_url https://usn.ubuntu.com/6724-1/
reference_id USN-6724-1
reference_type
scores
url https://usn.ubuntu.com/6724-1/
15
reference_url https://usn.ubuntu.com/6724-2/
reference_id USN-6724-2
reference_type
scores
url https://usn.ubuntu.com/6724-2/
16
reference_url https://usn.ubuntu.com/7123-1/
reference_id USN-7123-1
reference_type
scores
url https://usn.ubuntu.com/7123-1/
17
reference_url https://usn.ubuntu.com/7194-1/
reference_id USN-7194-1
reference_type
scores
url https://usn.ubuntu.com/7194-1/
fixed_packages
aliases CVE-2023-6610
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1t1x-4v6d-akdz
2
url VCID-2n9k-dqfk-gkb9
vulnerability_id VCID-2n9k-dqfk-gkb9
summary kernel: blocking operation in dvb_frontend_get_event and wait_event_interruptible
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-31084.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-31084.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-31084
reference_id
reference_type
scores
0
value 9e-05
scoring_system epss
scoring_elements 0.00829
published_at 2026-04-04T12:55:00Z
1
value 9e-05
scoring_system epss
scoring_elements 0.00869
published_at 2026-04-26T12:55:00Z
2
value 9e-05
scoring_system epss
scoring_elements 0.0083
published_at 2026-04-07T12:55:00Z
3
value 9e-05
scoring_system epss
scoring_elements 0.00834
published_at 2026-04-08T12:55:00Z
4
value 9e-05
scoring_system epss
scoring_elements 0.00831
published_at 2026-04-09T12:55:00Z
5
value 9e-05
scoring_system epss
scoring_elements 0.0082
published_at 2026-04-18T12:55:00Z
6
value 9e-05
scoring_system epss
scoring_elements 0.00815
published_at 2026-04-16T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.00816
published_at 2026-04-13T12:55:00Z
8
value 9e-05
scoring_system epss
scoring_elements 0.00865
published_at 2026-04-21T12:55:00Z
9
value 9e-05
scoring_system epss
scoring_elements 0.00867
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-31084
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
33
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2213139
reference_id 2213139
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2213139
35
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6HIEOLEOURP4BJZMIL7UGGPYRRB44UDN/
reference_id 6HIEOLEOURP4BJZMIL7UGGPYRRB44UDN
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6HIEOLEOURP4BJZMIL7UGGPYRRB44UDN/
36
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AOATNX5UFL7V7W2QDIQKOHFFHYKWFP4W/
reference_id AOATNX5UFL7V7W2QDIQKOHFFHYKWFP4W
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AOATNX5UFL7V7W2QDIQKOHFFHYKWFP4W/
37
reference_url https://lore.kernel.org/all/CA+UBctCu7fXn4q41O_3=id1+OdyQ85tZY1x+TkT-6OVBL6KAUw%40mail.gmail.com/
reference_id CA+UBctCu7fXn4q41O_3=id1+OdyQ85tZY1x+TkT-6OVBL6KAUw%40mail.gmail.com
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/
url https://lore.kernel.org/all/CA+UBctCu7fXn4q41O_3=id1+OdyQ85tZY1x+TkT-6OVBL6KAUw%40mail.gmail.com/
38
reference_url https://www.debian.org/security/2023/dsa-5448
reference_id dsa-5448
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/
url https://www.debian.org/security/2023/dsa-5448
39
reference_url https://www.debian.org/security/2023/dsa-5480
reference_id dsa-5480
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/
url https://www.debian.org/security/2023/dsa-5480
40
reference_url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b8c75e4a1b325ea0a9433fa8834be97b5836b946
reference_id ?id=b8c75e4a1b325ea0a9433fa8834be97b5836b946
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/
url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b8c75e4a1b325ea0a9433fa8834be97b5836b946
41
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
42
reference_url https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
reference_id msg00030.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/
url https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
43
reference_url https://security.netapp.com/advisory/ntap-20230929-0003/
reference_id ntap-20230929-0003
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/
url https://security.netapp.com/advisory/ntap-20230929-0003/
44
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
45
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
46
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
47
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
48
reference_url https://usn.ubuntu.com/6231-1/
reference_id USN-6231-1
reference_type
scores
url https://usn.ubuntu.com/6231-1/
49
reference_url https://usn.ubuntu.com/6309-1/
reference_id USN-6309-1
reference_type
scores
url https://usn.ubuntu.com/6309-1/
50
reference_url https://usn.ubuntu.com/6327-1/
reference_id USN-6327-1
reference_type
scores
url https://usn.ubuntu.com/6327-1/
51
reference_url https://usn.ubuntu.com/6338-1/
reference_id USN-6338-1
reference_type
scores
url https://usn.ubuntu.com/6338-1/
52
reference_url https://usn.ubuntu.com/6338-2/
reference_id USN-6338-2
reference_type
scores
url https://usn.ubuntu.com/6338-2/
53
reference_url https://usn.ubuntu.com/6339-1/
reference_id USN-6339-1
reference_type
scores
url https://usn.ubuntu.com/6339-1/
54
reference_url https://usn.ubuntu.com/6339-2/
reference_id USN-6339-2
reference_type
scores
url https://usn.ubuntu.com/6339-2/
55
reference_url https://usn.ubuntu.com/6339-3/
reference_id USN-6339-3
reference_type
scores
url https://usn.ubuntu.com/6339-3/
56
reference_url https://usn.ubuntu.com/6339-4/
reference_id USN-6339-4
reference_type
scores
url https://usn.ubuntu.com/6339-4/
57
reference_url https://usn.ubuntu.com/6340-1/
reference_id USN-6340-1
reference_type
scores
url https://usn.ubuntu.com/6340-1/
58
reference_url https://usn.ubuntu.com/6340-2/
reference_id USN-6340-2
reference_type
scores
url https://usn.ubuntu.com/6340-2/
59
reference_url https://usn.ubuntu.com/6342-1/
reference_id USN-6342-1
reference_type
scores
url https://usn.ubuntu.com/6342-1/
60
reference_url https://usn.ubuntu.com/6342-2/
reference_id USN-6342-2
reference_type
scores
url https://usn.ubuntu.com/6342-2/
61
reference_url https://usn.ubuntu.com/6344-1/
reference_id USN-6344-1
reference_type
scores
url https://usn.ubuntu.com/6344-1/
62
reference_url https://usn.ubuntu.com/6349-1/
reference_id USN-6349-1
reference_type
scores
url https://usn.ubuntu.com/6349-1/
63
reference_url https://usn.ubuntu.com/6350-1/
reference_id USN-6350-1
reference_type
scores
url https://usn.ubuntu.com/6350-1/
64
reference_url https://usn.ubuntu.com/6351-1/
reference_id USN-6351-1
reference_type
scores
url https://usn.ubuntu.com/6351-1/
65
reference_url https://usn.ubuntu.com/6357-1/
reference_id USN-6357-1
reference_type
scores
url https://usn.ubuntu.com/6357-1/
66
reference_url https://usn.ubuntu.com/6397-1/
reference_id USN-6397-1
reference_type
scores
url https://usn.ubuntu.com/6397-1/
fixed_packages
aliases CVE-2023-31084
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2n9k-dqfk-gkb9
3
url VCID-3nwm-cb6f-vkbv
vulnerability_id VCID-3nwm-cb6f-vkbv
summary kernel: null-ptr-deref vulnerabilities in sl_tx_timeout in drivers/net/slip
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41858.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41858.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-41858
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02761
published_at 2026-04-02T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02843
published_at 2026-04-26T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02754
published_at 2026-04-13T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02738
published_at 2026-04-16T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.0275
published_at 2026-04-18T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02861
published_at 2026-04-21T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02855
published_at 2026-04-24T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02776
published_at 2026-04-04T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02783
published_at 2026-04-07T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02787
published_at 2026-04-08T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02806
published_at 2026-04-09T12:55:00Z
11
value 0.00014
scoring_system epss
scoring_elements 0.02777
published_at 2026-04-11T12:55:00Z
12
value 0.00014
scoring_system epss
scoring_elements 0.02758
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-41858
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41858
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2144379
reference_id 2144379
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2144379
5
reference_url https://github.com/torvalds/linux/commit/ec4eb8a86ade4d22633e1da2a7d85a846b7d1798
reference_id ec4eb8a86ade4d22633e1da2a7d85a846b7d1798
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-07T16:46:04Z/
url https://github.com/torvalds/linux/commit/ec4eb8a86ade4d22633e1da2a7d85a846b7d1798
6
reference_url https://security.netapp.com/advisory/ntap-20230223-0006/
reference_id ntap-20230223-0006
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-07T16:46:04Z/
url https://security.netapp.com/advisory/ntap-20230223-0006/
7
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
8
reference_url https://access.redhat.com/errata/RHSA-2024:0431
reference_id RHSA-2024:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0431
9
reference_url https://access.redhat.com/errata/RHSA-2024:0432
reference_id RHSA-2024:0432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0432
10
reference_url https://access.redhat.com/errata/RHSA-2024:0439
reference_id RHSA-2024:0439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0439
11
reference_url https://access.redhat.com/errata/RHSA-2024:0448
reference_id RHSA-2024:0448
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0448
12
reference_url https://access.redhat.com/errata/RHSA-2024:0461
reference_id RHSA-2024:0461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0461
13
reference_url https://access.redhat.com/errata/RHSA-2024:0881
reference_id RHSA-2024:0881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0881
14
reference_url https://access.redhat.com/errata/RHSA-2024:0897
reference_id RHSA-2024:0897
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0897
15
reference_url https://access.redhat.com/errata/RHSA-2024:1268
reference_id RHSA-2024:1268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1268
16
reference_url https://access.redhat.com/errata/RHSA-2024:1269
reference_id RHSA-2024:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1269
17
reference_url https://access.redhat.com/errata/RHSA-2024:1367
reference_id RHSA-2024:1367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1367
18
reference_url https://access.redhat.com/errata/RHSA-2024:1382
reference_id RHSA-2024:1382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1382
19
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
20
reference_url https://usn.ubuntu.com/5884-1/
reference_id USN-5884-1
reference_type
scores
url https://usn.ubuntu.com/5884-1/
21
reference_url https://usn.ubuntu.com/5926-1/
reference_id USN-5926-1
reference_type
scores
url https://usn.ubuntu.com/5926-1/
fixed_packages
aliases CVE-2022-41858
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3nwm-cb6f-vkbv
4
url VCID-4ce1-c57m-j7c6
vulnerability_id VCID-4ce1-c57m-j7c6
summary kernel: Out-Of-Bounds Read vulnerability in smbCalcSize
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6606.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6606.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6606
reference_id
reference_type
scores
0
value 9e-05
scoring_system epss
scoring_elements 0.00842
published_at 2026-04-26T12:55:00Z
1
value 9e-05
scoring_system epss
scoring_elements 0.00794
published_at 2026-04-13T12:55:00Z
2
value 9e-05
scoring_system epss
scoring_elements 0.00797
published_at 2026-04-18T12:55:00Z
3
value 9e-05
scoring_system epss
scoring_elements 0.00841
published_at 2026-04-21T12:55:00Z
4
value 9e-05
scoring_system epss
scoring_elements 0.00843
published_at 2026-04-24T12:55:00Z
5
value 9e-05
scoring_system epss
scoring_elements 0.00801
published_at 2026-04-02T12:55:00Z
6
value 9e-05
scoring_system epss
scoring_elements 0.00803
published_at 2026-04-04T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.00806
published_at 2026-04-07T12:55:00Z
8
value 9e-05
scoring_system epss
scoring_elements 0.00809
published_at 2026-04-08T12:55:00Z
9
value 9e-05
scoring_system epss
scoring_elements 0.00807
published_at 2026-04-09T12:55:00Z
10
value 9e-05
scoring_system epss
scoring_elements 0.00799
published_at 2026-04-11T12:55:00Z
11
value 9e-05
scoring_system epss
scoring_elements 0.00793
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6606
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6606
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2253611
reference_id 2253611
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-11T21:20:47Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2253611
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv
reference_id cpe:/a:redhat:enterprise_linux:8::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime
reference_id cpe:/a:redhat:enterprise_linux:8::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv
reference_id cpe:/a:redhat:enterprise_linux:9::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime
reference_id cpe:/a:redhat:enterprise_linux:9::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:logging:5.8::el9
reference_id cpe:/a:redhat:logging:5.8::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:logging:5.8::el9
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb
reference_id cpe:/a:redhat:rhel_eus:8.6::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb
reference_id cpe:/a:redhat:rhel_eus:8.8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb
reference_id cpe:/a:redhat:rhel_eus:9.2::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv
reference_id cpe:/a:redhat:rhel_eus:9.2::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime
reference_id cpe:/a:redhat:rhel_eus:9.2::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
reference_id cpe:/o:redhat:rhel_eus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
reference_id cpe:/o:redhat:rhel_eus:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8
reference_id cpe:/o:redhat:rhev_hypervisor:4.4::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8
28
reference_url https://access.redhat.com/security/cve/CVE-2023-6606
reference_id CVE-2023-6606
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-11T21:20:47Z/
url https://access.redhat.com/security/cve/CVE-2023-6606
29
reference_url https://access.redhat.com/errata/RHSA-2024:0723
reference_id RHSA-2024:0723
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-11T21:20:47Z/
url https://access.redhat.com/errata/RHSA-2024:0723
30
reference_url https://access.redhat.com/errata/RHSA-2024:0725
reference_id RHSA-2024:0725
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-11T21:20:47Z/
url https://access.redhat.com/errata/RHSA-2024:0725
31
reference_url https://access.redhat.com/errata/RHSA-2024:0881
reference_id RHSA-2024:0881
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-11T21:20:47Z/
url https://access.redhat.com/errata/RHSA-2024:0881
32
reference_url https://access.redhat.com/errata/RHSA-2024:0897
reference_id RHSA-2024:0897
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-11T21:20:47Z/
url https://access.redhat.com/errata/RHSA-2024:0897
33
reference_url https://access.redhat.com/errata/RHSA-2024:1188
reference_id RHSA-2024:1188
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-11T21:20:47Z/
url https://access.redhat.com/errata/RHSA-2024:1188
34
reference_url https://access.redhat.com/errata/RHSA-2024:1248
reference_id RHSA-2024:1248
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-11T21:20:47Z/
url https://access.redhat.com/errata/RHSA-2024:1248
35
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-11T21:20:47Z/
url https://access.redhat.com/errata/RHSA-2024:1404
36
reference_url https://access.redhat.com/errata/RHSA-2024:2094
reference_id RHSA-2024:2094
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-11T21:20:47Z/
url https://access.redhat.com/errata/RHSA-2024:2094
37
reference_url https://bugzilla.kernel.org/show_bug.cgi?id=218218
reference_id show_bug.cgi?id=218218
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-11T21:20:47Z/
url https://bugzilla.kernel.org/show_bug.cgi?id=218218
38
reference_url https://usn.ubuntu.com/6602-1/
reference_id USN-6602-1
reference_type
scores
url https://usn.ubuntu.com/6602-1/
39
reference_url https://usn.ubuntu.com/6603-1/
reference_id USN-6603-1
reference_type
scores
url https://usn.ubuntu.com/6603-1/
40
reference_url https://usn.ubuntu.com/6604-1/
reference_id USN-6604-1
reference_type
scores
url https://usn.ubuntu.com/6604-1/
41
reference_url https://usn.ubuntu.com/6604-2/
reference_id USN-6604-2
reference_type
scores
url https://usn.ubuntu.com/6604-2/
42
reference_url https://usn.ubuntu.com/6605-1/
reference_id USN-6605-1
reference_type
scores
url https://usn.ubuntu.com/6605-1/
43
reference_url https://usn.ubuntu.com/6605-2/
reference_id USN-6605-2
reference_type
scores
url https://usn.ubuntu.com/6605-2/
44
reference_url https://usn.ubuntu.com/6606-1/
reference_id USN-6606-1
reference_type
scores
url https://usn.ubuntu.com/6606-1/
45
reference_url https://usn.ubuntu.com/6607-1/
reference_id USN-6607-1
reference_type
scores
url https://usn.ubuntu.com/6607-1/
46
reference_url https://usn.ubuntu.com/6608-1/
reference_id USN-6608-1
reference_type
scores
url https://usn.ubuntu.com/6608-1/
47
reference_url https://usn.ubuntu.com/6608-2/
reference_id USN-6608-2
reference_type
scores
url https://usn.ubuntu.com/6608-2/
48
reference_url https://usn.ubuntu.com/6609-1/
reference_id USN-6609-1
reference_type
scores
url https://usn.ubuntu.com/6609-1/
49
reference_url https://usn.ubuntu.com/6609-2/
reference_id USN-6609-2
reference_type
scores
url https://usn.ubuntu.com/6609-2/
50
reference_url https://usn.ubuntu.com/6609-3/
reference_id USN-6609-3
reference_type
scores
url https://usn.ubuntu.com/6609-3/
51
reference_url https://usn.ubuntu.com/6628-1/
reference_id USN-6628-1
reference_type
scores
url https://usn.ubuntu.com/6628-1/
52
reference_url https://usn.ubuntu.com/6628-2/
reference_id USN-6628-2
reference_type
scores
url https://usn.ubuntu.com/6628-2/
53
reference_url https://usn.ubuntu.com/6635-1/
reference_id USN-6635-1
reference_type
scores
url https://usn.ubuntu.com/6635-1/
fixed_packages
aliases CVE-2023-6606
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4ce1-c57m-j7c6
5
url VCID-4gq7-1egy-p7a4
vulnerability_id VCID-4gq7-1egy-p7a4
summary kernel: vmwgfx: use-after-free in vmw_cmd_res_check
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38457.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38457.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-38457
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.1298
published_at 2026-04-11T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12969
published_at 2026-04-08T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.1302
published_at 2026-04-09T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12944
published_at 2026-04-12T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.129
published_at 2026-04-13T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.128
published_at 2026-04-16T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.12803
published_at 2026-04-18T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.1289
published_at 2026-04-07T12:55:00Z
8
value 0.00044
scoring_system epss
scoring_elements 0.13448
published_at 2026-04-02T12:55:00Z
9
value 0.00044
scoring_system epss
scoring_elements 0.13513
published_at 2026-04-04T12:55:00Z
10
value 0.00044
scoring_system epss
scoring_elements 0.13295
published_at 2026-04-26T12:55:00Z
11
value 0.00044
scoring_system epss
scoring_elements 0.13315
published_at 2026-04-21T12:55:00Z
12
value 0.00044
scoring_system epss
scoring_elements 0.13322
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-38457
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38457
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38457
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2133455
reference_id 2133455
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2133455
5
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
6
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
7
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
8
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
9
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
10
reference_url https://access.redhat.com/errata/RHSA-2024:4823
reference_id RHSA-2024:4823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4823
11
reference_url https://access.redhat.com/errata/RHSA-2024:4831
reference_id RHSA-2024:4831
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4831
fixed_packages
aliases CVE-2022-38457
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4gq7-1egy-p7a4
6
url VCID-5yqp-43hw-cuhu
vulnerability_id VCID-5yqp-43hw-cuhu
summary kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38096.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38096.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-38096
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10537
published_at 2026-04-08T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10463
published_at 2026-04-07T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.10604
published_at 2026-04-09T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10633
published_at 2026-04-11T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.106
published_at 2026-04-12T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.10576
published_at 2026-04-13T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10445
published_at 2026-04-16T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10427
published_at 2026-04-18T12:55:00Z
8
value 0.00037
scoring_system epss
scoring_elements 0.11039
published_at 2026-04-04T12:55:00Z
9
value 0.00037
scoring_system epss
scoring_elements 0.10937
published_at 2026-04-21T12:55:00Z
10
value 0.00037
scoring_system epss
scoring_elements 0.10892
published_at 2026-04-24T12:55:00Z
11
value 0.00037
scoring_system epss
scoring_elements 0.10977
published_at 2026-04-02T12:55:00Z
12
value 0.00037
scoring_system epss
scoring_elements 0.10851
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-38096
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38096
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2133452
reference_id 2133452
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2133452
5
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T13:45:25Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
6
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
7
reference_url https://access.redhat.com/errata/RHSA-2024:1018
reference_id RHSA-2024:1018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1018
8
reference_url https://access.redhat.com/errata/RHSA-2024:1019
reference_id RHSA-2024:1019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1019
9
reference_url https://access.redhat.com/errata/RHSA-2024:1250
reference_id RHSA-2024:1250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1250
10
reference_url https://access.redhat.com/errata/RHSA-2024:1268
reference_id RHSA-2024:1268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1268
11
reference_url https://access.redhat.com/errata/RHSA-2024:1269
reference_id RHSA-2024:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1269
12
reference_url https://access.redhat.com/errata/RHSA-2024:1306
reference_id RHSA-2024:1306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1306
13
reference_url https://access.redhat.com/errata/RHSA-2024:1367
reference_id RHSA-2024:1367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1367
14
reference_url https://access.redhat.com/errata/RHSA-2024:1382
reference_id RHSA-2024:1382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1382
15
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
16
reference_url https://access.redhat.com/errata/RHSA-2024:1607
reference_id RHSA-2024:1607
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1607
17
reference_url https://access.redhat.com/errata/RHSA-2024:1614
reference_id RHSA-2024:1614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1614
18
reference_url https://access.redhat.com/errata/RHSA-2024:2093
reference_id RHSA-2024:2093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2093
19
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
20
reference_url https://bugzilla.openanolis.cn/show_bug.cgi?id=2073
reference_id show_bug.cgi?id=2073
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T13:45:25Z/
url https://bugzilla.openanolis.cn/show_bug.cgi?id=2073
21
reference_url https://usn.ubuntu.com/6816-1/
reference_id USN-6816-1
reference_type
scores
url https://usn.ubuntu.com/6816-1/
22
reference_url https://usn.ubuntu.com/6817-1/
reference_id USN-6817-1
reference_type
scores
url https://usn.ubuntu.com/6817-1/
23
reference_url https://usn.ubuntu.com/6817-2/
reference_id USN-6817-2
reference_type
scores
url https://usn.ubuntu.com/6817-2/
24
reference_url https://usn.ubuntu.com/6817-3/
reference_id USN-6817-3
reference_type
scores
url https://usn.ubuntu.com/6817-3/
25
reference_url https://usn.ubuntu.com/6878-1/
reference_id USN-6878-1
reference_type
scores
url https://usn.ubuntu.com/6878-1/
26
reference_url https://usn.ubuntu.com/6898-1/
reference_id USN-6898-1
reference_type
scores
url https://usn.ubuntu.com/6898-1/
27
reference_url https://usn.ubuntu.com/6898-2/
reference_id USN-6898-2
reference_type
scores
url https://usn.ubuntu.com/6898-2/
28
reference_url https://usn.ubuntu.com/6898-3/
reference_id USN-6898-3
reference_type
scores
url https://usn.ubuntu.com/6898-3/
29
reference_url https://usn.ubuntu.com/6898-4/
reference_id USN-6898-4
reference_type
scores
url https://usn.ubuntu.com/6898-4/
30
reference_url https://usn.ubuntu.com/6917-1/
reference_id USN-6917-1
reference_type
scores
url https://usn.ubuntu.com/6917-1/
31
reference_url https://usn.ubuntu.com/6919-1/
reference_id USN-6919-1
reference_type
scores
url https://usn.ubuntu.com/6919-1/
32
reference_url https://usn.ubuntu.com/6927-1/
reference_id USN-6927-1
reference_type
scores
url https://usn.ubuntu.com/6927-1/
33
reference_url https://usn.ubuntu.com/7019-1/
reference_id USN-7019-1
reference_type
scores
url https://usn.ubuntu.com/7019-1/
34
reference_url https://usn.ubuntu.com/7173-1/
reference_id USN-7173-1
reference_type
scores
url https://usn.ubuntu.com/7173-1/
35
reference_url https://usn.ubuntu.com/7173-2/
reference_id USN-7173-2
reference_type
scores
url https://usn.ubuntu.com/7173-2/
36
reference_url https://usn.ubuntu.com/7173-3/
reference_id USN-7173-3
reference_type
scores
url https://usn.ubuntu.com/7173-3/
37
reference_url https://usn.ubuntu.com/7195-1/
reference_id USN-7195-1
reference_type
scores
url https://usn.ubuntu.com/7195-1/
38
reference_url https://usn.ubuntu.com/7195-2/
reference_id USN-7195-2
reference_type
scores
url https://usn.ubuntu.com/7195-2/
39
reference_url https://usn.ubuntu.com/7413-1/
reference_id USN-7413-1
reference_type
scores
url https://usn.ubuntu.com/7413-1/
fixed_packages
aliases CVE-2022-38096
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5yqp-43hw-cuhu
7
url VCID-5zmf-5v9v-k3h1
vulnerability_id VCID-5zmf-5v9v-k3h1
summary kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51042.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51042.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-51042
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.0907
published_at 2026-04-02T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09179
published_at 2026-04-24T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.0912
published_at 2026-04-12T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09105
published_at 2026-04-13T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09001
published_at 2026-04-16T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.0898
published_at 2026-04-18T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09136
published_at 2026-04-21T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09123
published_at 2026-04-26T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.09042
published_at 2026-04-07T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.09122
published_at 2026-04-08T12:55:00Z
10
value 0.00032
scoring_system epss
scoring_elements 0.09151
published_at 2026-04-09T12:55:00Z
11
value 0.00032
scoring_system epss
scoring_elements 0.09153
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-51042
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51042
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2259866
reference_id 2259866
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2259866
5
reference_url https://github.com/torvalds/linux/commit/2e54154b9f27262efd0cb4f903cc7d5ad1fe9628
reference_id 2e54154b9f27262efd0cb4f903cc7d5ad1fe9628
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:10Z/
url https://github.com/torvalds/linux/commit/2e54154b9f27262efd0cb4f903cc7d5ad1fe9628
6
reference_url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.12
reference_id ChangeLog-6.4.12
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:10Z/
url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.12
7
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
8
reference_url https://access.redhat.com/errata/RHSA-2024:1018
reference_id RHSA-2024:1018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1018
9
reference_url https://access.redhat.com/errata/RHSA-2024:1019
reference_id RHSA-2024:1019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1019
10
reference_url https://access.redhat.com/errata/RHSA-2024:1248
reference_id RHSA-2024:1248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1248
11
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
12
reference_url https://access.redhat.com/errata/RHSA-2024:1607
reference_id RHSA-2024:1607
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1607
13
reference_url https://access.redhat.com/errata/RHSA-2024:1614
reference_id RHSA-2024:1614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1614
14
reference_url https://access.redhat.com/errata/RHSA-2024:2093
reference_id RHSA-2024:2093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2093
15
reference_url https://access.redhat.com/errata/RHSA-2024:2094
reference_id RHSA-2024:2094
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2094
fixed_packages
aliases CVE-2023-51042
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5zmf-5v9v-k3h1
8
url VCID-69a4-qgg3-hkg5
vulnerability_id VCID-69a4-qgg3-hkg5
summary kernel: vmwgfx: race condition leading to information disclosure vulnerability
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-33951.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-33951.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-33951
reference_id
reference_type
scores
0
value 6e-05
scoring_system epss
scoring_elements 0.0031
published_at 2026-04-26T12:55:00Z
1
value 6e-05
scoring_system epss
scoring_elements 0.00297
published_at 2026-04-08T12:55:00Z
2
value 6e-05
scoring_system epss
scoring_elements 0.00296
published_at 2026-04-11T12:55:00Z
3
value 6e-05
scoring_system epss
scoring_elements 0.00293
published_at 2026-04-18T12:55:00Z
4
value 6e-05
scoring_system epss
scoring_elements 0.00289
published_at 2026-04-16T12:55:00Z
5
value 6e-05
scoring_system epss
scoring_elements 0.00312
published_at 2026-04-24T12:55:00Z
6
value 6e-05
scoring_system epss
scoring_elements 0.00308
published_at 2026-04-04T12:55:00Z
7
value 6e-05
scoring_system epss
scoring_elements 0.00299
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-33951
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2218195
reference_id 2218195
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2218195
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv
reference_id cpe:/a:redhat:enterprise_linux:8::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime
reference_id cpe:/a:redhat:enterprise_linux:8::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv
reference_id cpe:/a:redhat:enterprise_linux:9::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime
reference_id cpe:/a:redhat:enterprise_linux:9::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb
reference_id cpe:/a:redhat:rhel_eus:8.8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb
reference_id cpe:/a:redhat:rhel_eus:9.2::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv
reference_id cpe:/a:redhat:rhel_eus:9.2::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime
reference_id cpe:/a:redhat:rhel_eus:9.2::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
reference_id cpe:/o:redhat:rhel_eus:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
23
reference_url https://access.redhat.com/security/cve/CVE-2023-33951
reference_id CVE-2023-33951
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/
url https://access.redhat.com/security/cve/CVE-2023-33951
24
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/
url https://access.redhat.com/errata/RHSA-2023:6583
25
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/
url https://access.redhat.com/errata/RHSA-2023:6901
26
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/
url https://access.redhat.com/errata/RHSA-2023:7077
27
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/
url https://access.redhat.com/errata/RHSA-2024:1404
28
reference_url https://access.redhat.com/errata/RHSA-2024:4823
reference_id RHSA-2024:4823
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/
url https://access.redhat.com/errata/RHSA-2024:4823
29
reference_url https://access.redhat.com/errata/RHSA-2024:4831
reference_id RHSA-2024:4831
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/
url https://access.redhat.com/errata/RHSA-2024:4831
30
reference_url https://www.zerodayinitiative.com/advisories/ZDI-CAN-20110/
reference_id ZDI-CAN-20110
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/
url https://www.zerodayinitiative.com/advisories/ZDI-CAN-20110/
fixed_packages
aliases CVE-2023-33951
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-69a4-qgg3-hkg5
9
url VCID-6dg2-36gp-2feb
vulnerability_id VCID-6dg2-36gp-2feb
summary kernel: kernfs: fix potential NULL dereference in __kernfs_remove
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50148.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50148.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50148
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04693
published_at 2026-04-02T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04734
published_at 2026-04-04T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04751
published_at 2026-04-13T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04784
published_at 2026-04-08T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04796
published_at 2026-04-09T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04788
published_at 2026-04-11T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04768
published_at 2026-04-12T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.15161
published_at 2026-04-26T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.15058
published_at 2026-04-16T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.15068
published_at 2026-04-18T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.15119
published_at 2026-04-21T12:55:00Z
11
value 0.00049
scoring_system epss
scoring_elements 0.15157
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50148
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373637
reference_id 2373637
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373637
4
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
5
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
6
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
fixed_packages
aliases CVE-2022-50148
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6dg2-36gp-2feb
10
url VCID-6stw-cw42-83ek
vulnerability_id VCID-6stw-cw42-83ek
summary kernel: vmwgfx: reference count issue leads to use-after-free in surface handling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5633.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5633.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5633
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.02865
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.02915
published_at 2026-04-09T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.02887
published_at 2026-04-11T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.02868
published_at 2026-04-12T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.02863
published_at 2026-04-13T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.02847
published_at 2026-04-16T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.02857
published_at 2026-04-18T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.02881
published_at 2026-04-04T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.02889
published_at 2026-04-07T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.02891
published_at 2026-04-08T12:55:00Z
10
value 0.00016
scoring_system epss
scoring_elements 0.0352
published_at 2026-04-21T12:55:00Z
11
value 0.00016
scoring_system epss
scoring_elements 0.03526
published_at 2026-04-24T12:55:00Z
12
value 0.00016
scoring_system epss
scoring_elements 0.03531
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5633
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245663
reference_id 2245663
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:11Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2245663
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv
reference_id cpe:/a:redhat:enterprise_linux:8::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime
reference_id cpe:/a:redhat:enterprise_linux:8::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv
reference_id cpe:/a:redhat:enterprise_linux:9::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime
reference_id cpe:/a:redhat:enterprise_linux:9::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb
reference_id cpe:/a:redhat:rhel_eus:8.8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb
reference_id cpe:/a:redhat:rhel_eus:9.2::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv
reference_id cpe:/a:redhat:rhel_eus:9.2::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime
reference_id cpe:/a:redhat:rhel_eus:9.2::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
reference_id cpe:/o:redhat:rhel_eus:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
23
reference_url https://access.redhat.com/security/cve/CVE-2023-5633
reference_id CVE-2023-5633
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:11Z/
url https://access.redhat.com/security/cve/CVE-2023-5633
24
reference_url https://access.redhat.com/errata/RHSA-2024:0113
reference_id RHSA-2024:0113
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:11Z/
url https://access.redhat.com/errata/RHSA-2024:0113
25
reference_url https://access.redhat.com/errata/RHSA-2024:0134
reference_id RHSA-2024:0134
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:11Z/
url https://access.redhat.com/errata/RHSA-2024:0134
26
reference_url https://access.redhat.com/errata/RHSA-2024:0461
reference_id RHSA-2024:0461
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:11Z/
url https://access.redhat.com/errata/RHSA-2024:0461
27
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:11Z/
url https://access.redhat.com/errata/RHSA-2024:1404
28
reference_url https://access.redhat.com/errata/RHSA-2024:4823
reference_id RHSA-2024:4823
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:11Z/
url https://access.redhat.com/errata/RHSA-2024:4823
29
reference_url https://access.redhat.com/errata/RHSA-2024:4831
reference_id RHSA-2024:4831
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:11Z/
url https://access.redhat.com/errata/RHSA-2024:4831
30
reference_url https://usn.ubuntu.com/6503-1/
reference_id USN-6503-1
reference_type
scores
url https://usn.ubuntu.com/6503-1/
31
reference_url https://usn.ubuntu.com/6537-1/
reference_id USN-6537-1
reference_type
scores
url https://usn.ubuntu.com/6537-1/
32
reference_url https://usn.ubuntu.com/6572-1/
reference_id USN-6572-1
reference_type
scores
url https://usn.ubuntu.com/6572-1/
33
reference_url https://usn.ubuntu.com/6688-1/
reference_id USN-6688-1
reference_type
scores
url https://usn.ubuntu.com/6688-1/
fixed_packages
aliases CVE-2023-5633
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6stw-cw42-83ek
11
url VCID-8uzn-q3h8-8qfs
vulnerability_id VCID-8uzn-q3h8-8qfs
summary kernel: KVM: nVMX: missing consistency checks for CR0 and CR4
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-30456.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-30456.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-30456
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.0134
published_at 2026-04-21T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01352
published_at 2026-04-26T12:55:00Z
2
value 0.00011
scoring_system epss
scoring_elements 0.01347
published_at 2026-04-24T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03282
published_at 2026-04-04T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03272
published_at 2026-04-02T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03291
published_at 2026-04-07T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.03297
published_at 2026-04-08T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03318
published_at 2026-04-09T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.03295
published_at 2026-04-11T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03267
published_at 2026-04-12T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03246
published_at 2026-04-13T12:55:00Z
11
value 0.00015
scoring_system epss
scoring_elements 0.03223
published_at 2026-04-16T12:55:00Z
12
value 0.00015
scoring_system epss
scoring_elements 0.03233
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-30456
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30456
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/torvalds/linux/commit/112e66017bff7f2837030f34c2bc19501e9212d5
reference_id 112e66017bff7f2837030f34c2bc19501e9212d5
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/
url https://github.com/torvalds/linux/commit/112e66017bff7f2837030f34c2bc19501e9212d5
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188468
reference_id 2188468
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188468
6
reference_url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.8
reference_id ChangeLog-6.2.8
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/
url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.8
7
reference_url http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html
reference_id Kernel-Live-Patch-Security-Notice-LSN-0096-1.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/
url http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html
8
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
9
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
10
reference_url https://security.netapp.com/advisory/ntap-20230511-0007/
reference_id ntap-20230511-0007
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/
url https://security.netapp.com/advisory/ntap-20230511-0007/
11
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
12
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
13
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
14
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
15
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
16
reference_url https://usn.ubuntu.com/6033-1/
reference_id USN-6033-1
reference_type
scores
url https://usn.ubuntu.com/6033-1/
17
reference_url https://usn.ubuntu.com/6123-1/
reference_id USN-6123-1
reference_type
scores
url https://usn.ubuntu.com/6123-1/
18
reference_url https://usn.ubuntu.com/6124-1/
reference_id USN-6124-1
reference_type
scores
url https://usn.ubuntu.com/6124-1/
19
reference_url https://usn.ubuntu.com/6127-1/
reference_id USN-6127-1
reference_type
scores
url https://usn.ubuntu.com/6127-1/
20
reference_url https://usn.ubuntu.com/6130-1/
reference_id USN-6130-1
reference_type
scores
url https://usn.ubuntu.com/6130-1/
21
reference_url https://usn.ubuntu.com/6131-1/
reference_id USN-6131-1
reference_type
scores
url https://usn.ubuntu.com/6131-1/
22
reference_url https://usn.ubuntu.com/6132-1/
reference_id USN-6132-1
reference_type
scores
url https://usn.ubuntu.com/6132-1/
23
reference_url https://usn.ubuntu.com/6135-1/
reference_id USN-6135-1
reference_type
scores
url https://usn.ubuntu.com/6135-1/
24
reference_url https://usn.ubuntu.com/6149-1/
reference_id USN-6149-1
reference_type
scores
url https://usn.ubuntu.com/6149-1/
25
reference_url https://usn.ubuntu.com/6150-1/
reference_id USN-6150-1
reference_type
scores
url https://usn.ubuntu.com/6150-1/
26
reference_url https://usn.ubuntu.com/6162-1/
reference_id USN-6162-1
reference_type
scores
url https://usn.ubuntu.com/6162-1/
27
reference_url https://usn.ubuntu.com/6175-1/
reference_id USN-6175-1
reference_type
scores
url https://usn.ubuntu.com/6175-1/
28
reference_url https://usn.ubuntu.com/6186-1/
reference_id USN-6186-1
reference_type
scores
url https://usn.ubuntu.com/6186-1/
29
reference_url https://usn.ubuntu.com/6222-1/
reference_id USN-6222-1
reference_type
scores
url https://usn.ubuntu.com/6222-1/
30
reference_url https://usn.ubuntu.com/6256-1/
reference_id USN-6256-1
reference_type
scores
url https://usn.ubuntu.com/6256-1/
31
reference_url https://usn.ubuntu.com/6699-1/
reference_id USN-6699-1
reference_type
scores
url https://usn.ubuntu.com/6699-1/
fixed_packages
aliases CVE-2023-30456
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8uzn-q3h8-8qfs
12
url VCID-973c-xm3k-vyed
vulnerability_id VCID-973c-xm3k-vyed
summary kernel: drivers/usb/storage/ene_ub6250.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45862.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45862.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-45862
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06309
published_at 2026-04-02T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06342
published_at 2026-04-04T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.0632
published_at 2026-04-07T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06368
published_at 2026-04-08T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06411
published_at 2026-04-09T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06403
published_at 2026-04-11T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06398
published_at 2026-04-12T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06387
published_at 2026-04-13T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06326
published_at 2026-04-16T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06337
published_at 2026-04-18T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06485
published_at 2026-04-21T12:55:00Z
11
value 0.00024
scoring_system epss
scoring_elements 0.06497
published_at 2026-04-24T12:55:00Z
12
value 0.00024
scoring_system epss
scoring_elements 0.06513
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-45862
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45862
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2244715
reference_id 2244715
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2244715
5
reference_url https://access.redhat.com/errata/RHSA-2024:0723
reference_id RHSA-2024:0723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0723
6
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
7
reference_url https://access.redhat.com/errata/RHSA-2024:0725
reference_id RHSA-2024:0725
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0725
8
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
9
reference_url https://usn.ubuntu.com/6494-1/
reference_id USN-6494-1
reference_type
scores
url https://usn.ubuntu.com/6494-1/
10
reference_url https://usn.ubuntu.com/6494-2/
reference_id USN-6494-2
reference_type
scores
url https://usn.ubuntu.com/6494-2/
11
reference_url https://usn.ubuntu.com/6532-1/
reference_id USN-6532-1
reference_type
scores
url https://usn.ubuntu.com/6532-1/
fixed_packages
aliases CVE-2023-45862
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-973c-xm3k-vyed
13
url VCID-9wmm-kn83-5kcy
vulnerability_id VCID-9wmm-kn83-5kcy
summary kernel: blk-cgroup: Reinit blkg_iostat_set after clearing in blkcg_reset_stats()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53421.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53421.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53421
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06121
published_at 2026-04-02T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06194
published_at 2026-04-13T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06203
published_at 2026-04-12T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06208
published_at 2026-04-11T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06216
published_at 2026-04-09T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06178
published_at 2026-04-08T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06152
published_at 2026-04-04T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06135
published_at 2026-04-07T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.0737
published_at 2026-04-26T12:55:00Z
9
value 0.00026
scoring_system epss
scoring_elements 0.07285
published_at 2026-04-16T12:55:00Z
10
value 0.00026
scoring_system epss
scoring_elements 0.07363
published_at 2026-04-24T12:55:00Z
11
value 0.00029
scoring_system epss
scoring_elements 0.08352
published_at 2026-04-21T12:55:00Z
12
value 0.00029
scoring_system epss
scoring_elements 0.08189
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53421
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53421
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/0561aa6033dd181594116d705c41fc16e97161a2
reference_id 0561aa6033dd181594116d705c41fc16e97161a2
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:12:11Z/
url https://git.kernel.org/stable/c/0561aa6033dd181594116d705c41fc16e97161a2
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2396500
reference_id 2396500
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2396500
6
reference_url https://git.kernel.org/stable/c/3d2af77e31ade05ff7ccc3658c3635ec1bea0979
reference_id 3d2af77e31ade05ff7ccc3658c3635ec1bea0979
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:12:11Z/
url https://git.kernel.org/stable/c/3d2af77e31ade05ff7ccc3658c3635ec1bea0979
7
reference_url https://git.kernel.org/stable/c/892faa76be894d324bf48b12a55c7af7be2bad83
reference_id 892faa76be894d324bf48b12a55c7af7be2bad83
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:12:11Z/
url https://git.kernel.org/stable/c/892faa76be894d324bf48b12a55c7af7be2bad83
8
reference_url https://git.kernel.org/stable/c/abbce7f82613ea5eeefd0fc3c1c8e449b9cef2a2
reference_id abbce7f82613ea5eeefd0fc3c1c8e449b9cef2a2
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:12:11Z/
url https://git.kernel.org/stable/c/abbce7f82613ea5eeefd0fc3c1c8e449b9cef2a2
9
reference_url https://git.kernel.org/stable/c/b0d26283af612b9e0cc3188b0b88ad7fdea447e8
reference_id b0d26283af612b9e0cc3188b0b88ad7fdea447e8
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:12:11Z/
url https://git.kernel.org/stable/c/b0d26283af612b9e0cc3188b0b88ad7fdea447e8
10
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
11
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
12
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
13
reference_url https://access.redhat.com/errata/RHSA-2024:4823
reference_id RHSA-2024:4823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4823
14
reference_url https://usn.ubuntu.com/8162-1/
reference_id USN-8162-1
reference_type
scores
url https://usn.ubuntu.com/8162-1/
15
reference_url https://usn.ubuntu.com/8180-1/
reference_id USN-8180-1
reference_type
scores
url https://usn.ubuntu.com/8180-1/
16
reference_url https://usn.ubuntu.com/8180-2/
reference_id USN-8180-2
reference_type
scores
url https://usn.ubuntu.com/8180-2/
17
reference_url https://usn.ubuntu.com/8180-3/
reference_id USN-8180-3
reference_type
scores
url https://usn.ubuntu.com/8180-3/
18
reference_url https://usn.ubuntu.com/8180-4/
reference_id USN-8180-4
reference_type
scores
url https://usn.ubuntu.com/8180-4/
19
reference_url https://usn.ubuntu.com/8180-5/
reference_id USN-8180-5
reference_type
scores
url https://usn.ubuntu.com/8180-5/
20
reference_url https://usn.ubuntu.com/8186-1/
reference_id USN-8186-1
reference_type
scores
url https://usn.ubuntu.com/8186-1/
21
reference_url https://usn.ubuntu.com/8187-1/
reference_id USN-8187-1
reference_type
scores
url https://usn.ubuntu.com/8187-1/
22
reference_url https://usn.ubuntu.com/8188-1/
reference_id USN-8188-1
reference_type
scores
url https://usn.ubuntu.com/8188-1/
fixed_packages
aliases CVE-2023-53421
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9wmm-kn83-5kcy
14
url VCID-a5jg-3sk6-eqhw
vulnerability_id VCID-a5jg-3sk6-eqhw
summary kernel: tun: avoid double free in tun_free_netdev
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4744.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4744.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-4744
reference_id
reference_type
scores
0
value 0.00085
scoring_system epss
scoring_elements 0.24747
published_at 2026-04-04T12:55:00Z
1
value 0.00085
scoring_system epss
scoring_elements 0.24708
published_at 2026-04-02T12:55:00Z
2
value 0.00085
scoring_system epss
scoring_elements 0.2452
published_at 2026-04-07T12:55:00Z
3
value 0.00085
scoring_system epss
scoring_elements 0.24591
published_at 2026-04-08T12:55:00Z
4
value 0.00085
scoring_system epss
scoring_elements 0.24637
published_at 2026-04-09T12:55:00Z
5
value 0.00085
scoring_system epss
scoring_elements 0.24654
published_at 2026-04-11T12:55:00Z
6
value 0.00085
scoring_system epss
scoring_elements 0.24611
published_at 2026-04-12T12:55:00Z
7
value 0.00085
scoring_system epss
scoring_elements 0.24556
published_at 2026-04-13T12:55:00Z
8
value 0.00085
scoring_system epss
scoring_elements 0.24569
published_at 2026-04-16T12:55:00Z
9
value 0.00098
scoring_system epss
scoring_elements 0.26956
published_at 2026-04-21T12:55:00Z
10
value 0.00098
scoring_system epss
scoring_elements 0.26909
published_at 2026-04-24T12:55:00Z
11
value 0.00098
scoring_system epss
scoring_elements 0.26902
published_at 2026-04-26T12:55:00Z
12
value 0.00098
scoring_system epss
scoring_elements 0.26993
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-4744
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4744
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2156322
reference_id 2156322
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2156322
5
reference_url http://packetstormsecurity.com/files/171912/CentOS-Stream-9-Missing-Kernel-Security-Fix.html
reference_id CentOS-Stream-9-Missing-Kernel-Security-Fix.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:43:44Z/
url http://packetstormsecurity.com/files/171912/CentOS-Stream-9-Missing-Kernel-Security-Fix.html
6
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=158b515f703e
reference_id ?id=158b515f703e
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:43:44Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=158b515f703e
7
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:43:44Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
8
reference_url https://security.netapp.com/advisory/ntap-20230526-0009/
reference_id ntap-20230526-0009
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:43:44Z/
url https://security.netapp.com/advisory/ntap-20230526-0009/
9
reference_url https://access.redhat.com/errata/RHSA-2023:1466
reference_id RHSA-2023:1466
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1466
10
reference_url https://access.redhat.com/errata/RHSA-2023:1467
reference_id RHSA-2023:1467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1467
11
reference_url https://access.redhat.com/errata/RHSA-2023:1468
reference_id RHSA-2023:1468
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1468
12
reference_url https://access.redhat.com/errata/RHSA-2023:1469
reference_id RHSA-2023:1469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1469
13
reference_url https://access.redhat.com/errata/RHSA-2023:1470
reference_id RHSA-2023:1470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1470
14
reference_url https://access.redhat.com/errata/RHSA-2023:1471
reference_id RHSA-2023:1471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1471
15
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
16
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
17
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
fixed_packages
aliases CVE-2022-4744
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a5jg-3sk6-eqhw
15
url VCID-ap5s-w9uk-zff3
vulnerability_id VCID-ap5s-w9uk-zff3
summary kernel: nfp: use-after-free in area_cache_get()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3545.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3545.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3545
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04263
published_at 2026-04-26T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04131
published_at 2026-04-13T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04102
published_at 2026-04-16T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.0411
published_at 2026-04-18T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.04232
published_at 2026-04-21T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.04244
published_at 2026-04-24T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.04114
published_at 2026-04-02T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.04133
published_at 2026-04-04T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.04149
published_at 2026-04-07T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.04181
published_at 2026-04-08T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.04195
published_at 2026-04-09T12:55:00Z
11
value 0.00017
scoring_system epss
scoring_elements 0.04174
published_at 2026-04-11T12:55:00Z
12
value 0.00017
scoring_system epss
scoring_elements 0.04157
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3545
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2161310
reference_id 2161310
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2161310
17
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
18
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
19
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
20
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
21
reference_url https://access.redhat.com/errata/RHSA-2024:0439
reference_id RHSA-2024:0439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0439
22
reference_url https://access.redhat.com/errata/RHSA-2024:0448
reference_id RHSA-2024:0448
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0448
23
reference_url https://access.redhat.com/errata/RHSA-2024:0461
reference_id RHSA-2024:0461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0461
24
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
25
reference_url https://access.redhat.com/errata/RHSA-2024:0881
reference_id RHSA-2024:0881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0881
26
reference_url https://access.redhat.com/errata/RHSA-2024:0897
reference_id RHSA-2024:0897
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0897
27
reference_url https://access.redhat.com/errata/RHSA-2024:1250
reference_id RHSA-2024:1250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1250
28
reference_url https://access.redhat.com/errata/RHSA-2024:1268
reference_id RHSA-2024:1268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1268
29
reference_url https://access.redhat.com/errata/RHSA-2024:1269
reference_id RHSA-2024:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1269
30
reference_url https://access.redhat.com/errata/RHSA-2024:1306
reference_id RHSA-2024:1306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1306
31
reference_url https://access.redhat.com/errata/RHSA-2024:1367
reference_id RHSA-2024:1367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1367
32
reference_url https://access.redhat.com/errata/RHSA-2024:1382
reference_id RHSA-2024:1382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1382
33
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
34
reference_url https://usn.ubuntu.com/5858-1/
reference_id USN-5858-1
reference_type
scores
url https://usn.ubuntu.com/5858-1/
35
reference_url https://usn.ubuntu.com/5859-1/
reference_id USN-5859-1
reference_type
scores
url https://usn.ubuntu.com/5859-1/
36
reference_url https://usn.ubuntu.com/5883-1/
reference_id USN-5883-1
reference_type
scores
url https://usn.ubuntu.com/5883-1/
37
reference_url https://usn.ubuntu.com/5911-1/
reference_id USN-5911-1
reference_type
scores
url https://usn.ubuntu.com/5911-1/
38
reference_url https://usn.ubuntu.com/5912-1/
reference_id USN-5912-1
reference_type
scores
url https://usn.ubuntu.com/5912-1/
39
reference_url https://usn.ubuntu.com/5917-1/
reference_id USN-5917-1
reference_type
scores
url https://usn.ubuntu.com/5917-1/
40
reference_url https://usn.ubuntu.com/5919-1/
reference_id USN-5919-1
reference_type
scores
url https://usn.ubuntu.com/5919-1/
41
reference_url https://usn.ubuntu.com/5920-1/
reference_id USN-5920-1
reference_type
scores
url https://usn.ubuntu.com/5920-1/
42
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
43
reference_url https://usn.ubuntu.com/5925-1/
reference_id USN-5925-1
reference_type
scores
url https://usn.ubuntu.com/5925-1/
44
reference_url https://usn.ubuntu.com/5927-1/
reference_id USN-5927-1
reference_type
scores
url https://usn.ubuntu.com/5927-1/
45
reference_url https://usn.ubuntu.com/5929-1/
reference_id USN-5929-1
reference_type
scores
url https://usn.ubuntu.com/5929-1/
46
reference_url https://usn.ubuntu.com/5934-1/
reference_id USN-5934-1
reference_type
scores
url https://usn.ubuntu.com/5934-1/
47
reference_url https://usn.ubuntu.com/5935-1/
reference_id USN-5935-1
reference_type
scores
url https://usn.ubuntu.com/5935-1/
48
reference_url https://usn.ubuntu.com/5938-1/
reference_id USN-5938-1
reference_type
scores
url https://usn.ubuntu.com/5938-1/
49
reference_url https://usn.ubuntu.com/5939-1/
reference_id USN-5939-1
reference_type
scores
url https://usn.ubuntu.com/5939-1/
50
reference_url https://usn.ubuntu.com/5940-1/
reference_id USN-5940-1
reference_type
scores
url https://usn.ubuntu.com/5940-1/
51
reference_url https://usn.ubuntu.com/5941-1/
reference_id USN-5941-1
reference_type
scores
url https://usn.ubuntu.com/5941-1/
52
reference_url https://usn.ubuntu.com/5950-1/
reference_id USN-5950-1
reference_type
scores
url https://usn.ubuntu.com/5950-1/
53
reference_url https://usn.ubuntu.com/5951-1/
reference_id USN-5951-1
reference_type
scores
url https://usn.ubuntu.com/5951-1/
54
reference_url https://usn.ubuntu.com/5962-1/
reference_id USN-5962-1
reference_type
scores
url https://usn.ubuntu.com/5962-1/
55
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
56
reference_url https://usn.ubuntu.com/6000-1/
reference_id USN-6000-1
reference_type
scores
url https://usn.ubuntu.com/6000-1/
57
reference_url https://usn.ubuntu.com/6007-1/
reference_id USN-6007-1
reference_type
scores
url https://usn.ubuntu.com/6007-1/
fixed_packages
aliases CVE-2022-3545
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ap5s-w9uk-zff3
16
url VCID-chmw-dmhz-87gx
vulnerability_id VCID-chmw-dmhz-87gx
summary kernel: refcount leak in ctnetlink_create_conntrack()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-7192.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-7192.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-7192
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06334
published_at 2026-04-26T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06127
published_at 2026-04-16T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06138
published_at 2026-04-18T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06291
published_at 2026-04-21T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06308
published_at 2026-04-24T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06096
published_at 2026-04-02T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06126
published_at 2026-04-04T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.0611
published_at 2026-04-07T12:55:00Z
8
value 0.00023
scoring_system epss
scoring_elements 0.06153
published_at 2026-04-08T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.0619
published_at 2026-04-09T12:55:00Z
10
value 0.00023
scoring_system epss
scoring_elements 0.06182
published_at 2026-04-11T12:55:00Z
11
value 0.00023
scoring_system epss
scoring_elements 0.06177
published_at 2026-04-12T12:55:00Z
12
value 0.00023
scoring_system epss
scoring_elements 0.06169
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-7192
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7192
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7192
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2256279
reference_id 2256279
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-16T19:33:50Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2256279
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb
reference_id cpe:/a:redhat:rhel_eus:8.6::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb
reference_id cpe:/a:redhat:rhel_eus:8.8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb
reference_id cpe:/a:redhat:rhel_eus:9.0::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::nfv
reference_id cpe:/a:redhat:rhel_eus:9.0::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::nfv
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::realtime
reference_id cpe:/a:redhat:rhel_eus:9.0::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::realtime
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb
reference_id cpe:/a:redhat:rhel_eus:9.2::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv
reference_id cpe:/a:redhat:rhel_eus:9.2::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime
reference_id cpe:/a:redhat:rhel_eus:9.2::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::nfv
reference_id cpe:/a:redhat:rhel_tus:8.2::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::nfv
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::realtime
reference_id cpe:/a:redhat:rhel_tus:8.2::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::realtime
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::nfv
reference_id cpe:/a:redhat:rhel_tus:8.4::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::nfv
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::realtime
reference_id cpe:/a:redhat:rhel_tus:8.4::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::realtime
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.2::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.2::baseos
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.4::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.4::baseos
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
reference_id cpe:/o:redhat:rhel_eus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos
reference_id cpe:/o:redhat:rhel_eus:9.0::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
reference_id cpe:/o:redhat:rhel_eus:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.2::baseos
reference_id cpe:/o:redhat:rhel_tus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.2::baseos
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.4::baseos
reference_id cpe:/o:redhat:rhel_tus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.4::baseos
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8
reference_id cpe:/o:redhat:rhev_hypervisor:4.4::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8
34
reference_url https://access.redhat.com/security/cve/CVE-2023-7192
reference_id CVE-2023-7192
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-16T19:33:50Z/
url https://access.redhat.com/security/cve/CVE-2023-7192
35
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=ac4893980bbe79ce383daf9a0885666a30fe4c83
reference_id ?id=ac4893980bbe79ce383daf9a0885666a30fe4c83
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-16T19:33:50Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=ac4893980bbe79ce383daf9a0885666a30fe4c83
36
reference_url https://access.redhat.com/errata/RHSA-2024:0723
reference_id RHSA-2024:0723
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-16T19:33:50Z/
url https://access.redhat.com/errata/RHSA-2024:0723
37
reference_url https://access.redhat.com/errata/RHSA-2024:0725
reference_id RHSA-2024:0725
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-16T19:33:50Z/
url https://access.redhat.com/errata/RHSA-2024:0725
38
reference_url https://access.redhat.com/errata/RHSA-2024:1188
reference_id RHSA-2024:1188
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-16T19:33:50Z/
url https://access.redhat.com/errata/RHSA-2024:1188
39
reference_url https://access.redhat.com/errata/RHSA-2024:1250
reference_id RHSA-2024:1250
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-16T19:33:50Z/
url https://access.redhat.com/errata/RHSA-2024:1250
40
reference_url https://access.redhat.com/errata/RHSA-2024:1306
reference_id RHSA-2024:1306
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-16T19:33:50Z/
url https://access.redhat.com/errata/RHSA-2024:1306
41
reference_url https://access.redhat.com/errata/RHSA-2024:1367
reference_id RHSA-2024:1367
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-16T19:33:50Z/
url https://access.redhat.com/errata/RHSA-2024:1367
42
reference_url https://access.redhat.com/errata/RHSA-2024:1382
reference_id RHSA-2024:1382
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-16T19:33:50Z/
url https://access.redhat.com/errata/RHSA-2024:1382
43
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-16T19:33:50Z/
url https://access.redhat.com/errata/RHSA-2024:1404
44
reference_url https://access.redhat.com/errata/RHSA-2024:2006
reference_id RHSA-2024:2006
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-16T19:33:50Z/
url https://access.redhat.com/errata/RHSA-2024:2006
45
reference_url https://access.redhat.com/errata/RHSA-2024:2008
reference_id RHSA-2024:2008
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-16T19:33:50Z/
url https://access.redhat.com/errata/RHSA-2024:2008
46
reference_url https://usn.ubuntu.com/6645-1/
reference_id USN-6645-1
reference_type
scores
url https://usn.ubuntu.com/6645-1/
47
reference_url https://usn.ubuntu.com/6646-1/
reference_id USN-6646-1
reference_type
scores
url https://usn.ubuntu.com/6646-1/
48
reference_url https://usn.ubuntu.com/6647-1/
reference_id USN-6647-1
reference_type
scores
url https://usn.ubuntu.com/6647-1/
49
reference_url https://usn.ubuntu.com/6647-2/
reference_id USN-6647-2
reference_type
scores
url https://usn.ubuntu.com/6647-2/
fixed_packages
aliases CVE-2023-7192
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-chmw-dmhz-87gx
17
url VCID-fhep-d1cx-kqh9
vulnerability_id VCID-fhep-d1cx-kqh9
summary kernel: use-after-free in l2cap_sock_release in net/bluetooth/l2cap_sock.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40283.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40283.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-40283
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01279
published_at 2026-04-02T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01283
published_at 2026-04-11T12:55:00Z
2
value 0.00011
scoring_system epss
scoring_elements 0.01293
published_at 2026-04-07T12:55:00Z
3
value 0.00011
scoring_system epss
scoring_elements 0.01298
published_at 2026-04-08T12:55:00Z
4
value 0.00011
scoring_system epss
scoring_elements 0.01302
published_at 2026-04-09T12:55:00Z
5
value 0.00011
scoring_system epss
scoring_elements 0.01278
published_at 2026-04-12T12:55:00Z
6
value 0.00011
scoring_system epss
scoring_elements 0.0128
published_at 2026-04-13T12:55:00Z
7
value 0.00011
scoring_system epss
scoring_elements 0.01272
published_at 2026-04-16T12:55:00Z
8
value 0.00011
scoring_system epss
scoring_elements 0.01285
published_at 2026-04-18T12:55:00Z
9
value 0.00011
scoring_system epss
scoring_elements 0.0136
published_at 2026-04-21T12:55:00Z
10
value 0.00011
scoring_system epss
scoring_elements 0.01367
published_at 2026-04-24T12:55:00Z
11
value 0.00011
scoring_system epss
scoring_elements 0.01373
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-40283
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
33
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2231800
reference_id 2231800
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2231800
35
reference_url https://access.redhat.com/errata/RHSA-2024:0439
reference_id RHSA-2024:0439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0439
36
reference_url https://access.redhat.com/errata/RHSA-2024:0448
reference_id RHSA-2024:0448
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0448
37
reference_url https://access.redhat.com/errata/RHSA-2024:0461
reference_id RHSA-2024:0461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0461
38
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
39
reference_url https://access.redhat.com/errata/RHSA-2024:0881
reference_id RHSA-2024:0881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0881
40
reference_url https://access.redhat.com/errata/RHSA-2024:0897
reference_id RHSA-2024:0897
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0897
41
reference_url https://access.redhat.com/errata/RHSA-2024:1250
reference_id RHSA-2024:1250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1250
42
reference_url https://access.redhat.com/errata/RHSA-2024:1268
reference_id RHSA-2024:1268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1268
43
reference_url https://access.redhat.com/errata/RHSA-2024:1269
reference_id RHSA-2024:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1269
44
reference_url https://access.redhat.com/errata/RHSA-2024:1306
reference_id RHSA-2024:1306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1306
45
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
46
reference_url https://access.redhat.com/errata/RHSA-2024:2582
reference_id RHSA-2024:2582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2582
47
reference_url https://access.redhat.com/errata/RHSA-2024:2585
reference_id RHSA-2024:2585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2585
48
reference_url https://usn.ubuntu.com/6343-1/
reference_id USN-6343-1
reference_type
scores
url https://usn.ubuntu.com/6343-1/
49
reference_url https://usn.ubuntu.com/6383-1/
reference_id USN-6383-1
reference_type
scores
url https://usn.ubuntu.com/6383-1/
50
reference_url https://usn.ubuntu.com/6385-1/
reference_id USN-6385-1
reference_type
scores
url https://usn.ubuntu.com/6385-1/
51
reference_url https://usn.ubuntu.com/6386-1/
reference_id USN-6386-1
reference_type
scores
url https://usn.ubuntu.com/6386-1/
52
reference_url https://usn.ubuntu.com/6386-2/
reference_id USN-6386-2
reference_type
scores
url https://usn.ubuntu.com/6386-2/
53
reference_url https://usn.ubuntu.com/6386-3/
reference_id USN-6386-3
reference_type
scores
url https://usn.ubuntu.com/6386-3/
54
reference_url https://usn.ubuntu.com/6387-1/
reference_id USN-6387-1
reference_type
scores
url https://usn.ubuntu.com/6387-1/
55
reference_url https://usn.ubuntu.com/6387-2/
reference_id USN-6387-2
reference_type
scores
url https://usn.ubuntu.com/6387-2/
56
reference_url https://usn.ubuntu.com/6388-1/
reference_id USN-6388-1
reference_type
scores
url https://usn.ubuntu.com/6388-1/
57
reference_url https://usn.ubuntu.com/6396-1/
reference_id USN-6396-1
reference_type
scores
url https://usn.ubuntu.com/6396-1/
58
reference_url https://usn.ubuntu.com/6396-2/
reference_id USN-6396-2
reference_type
scores
url https://usn.ubuntu.com/6396-2/
59
reference_url https://usn.ubuntu.com/6396-3/
reference_id USN-6396-3
reference_type
scores
url https://usn.ubuntu.com/6396-3/
60
reference_url https://usn.ubuntu.com/6466-1/
reference_id USN-6466-1
reference_type
scores
url https://usn.ubuntu.com/6466-1/
fixed_packages
aliases CVE-2023-40283
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fhep-d1cx-kqh9
18
url VCID-g6yc-cmf7-kbhf
vulnerability_id VCID-g6yc-cmf7-kbhf
summary kernel: use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51043.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51043.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-51043
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02372
published_at 2026-04-02T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02434
published_at 2026-04-26T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02369
published_at 2026-04-13T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02354
published_at 2026-04-16T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02359
published_at 2026-04-18T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02458
published_at 2026-04-21T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02446
published_at 2026-04-24T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02383
published_at 2026-04-04T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.0238
published_at 2026-04-07T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02385
published_at 2026-04-08T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02405
published_at 2026-04-09T12:55:00Z
11
value 0.00014
scoring_system epss
scoring_elements 0.02382
published_at 2026-04-11T12:55:00Z
12
value 0.00014
scoring_system epss
scoring_elements 0.0237
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-51043
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51043
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2260005
reference_id 2260005
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2260005
5
reference_url https://github.com/torvalds/linux/commit/4e076c73e4f6e90816b30fcd4a0d7ab365087255
reference_id 4e076c73e4f6e90816b30fcd4a0d7ab365087255
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-29T13:47:31Z/
url https://github.com/torvalds/linux/commit/4e076c73e4f6e90816b30fcd4a0d7ab365087255
6
reference_url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.5
reference_id ChangeLog-6.4.5
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-29T13:47:31Z/
url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.5
7
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
8
reference_url https://access.redhat.com/errata/RHSA-2024:1018
reference_id RHSA-2024:1018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1018
9
reference_url https://access.redhat.com/errata/RHSA-2024:1019
reference_id RHSA-2024:1019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1019
10
reference_url https://access.redhat.com/errata/RHSA-2024:1188
reference_id RHSA-2024:1188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1188
11
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
12
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
13
reference_url https://usn.ubuntu.com/6739-1/
reference_id USN-6739-1
reference_type
scores
url https://usn.ubuntu.com/6739-1/
14
reference_url https://usn.ubuntu.com/6740-1/
reference_id USN-6740-1
reference_type
scores
url https://usn.ubuntu.com/6740-1/
fixed_packages
aliases CVE-2023-51043
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g6yc-cmf7-kbhf
19
url VCID-ghef-adjn-rqcb
vulnerability_id VCID-ghef-adjn-rqcb
summary kernel: denial of service in tipc_conn_close
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1382.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1382.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1382
reference_id
reference_type
scores
0
value 0.0001
scoring_system epss
scoring_elements 0.01095
published_at 2026-04-09T12:55:00Z
1
value 0.0001
scoring_system epss
scoring_elements 0.01091
published_at 2026-04-07T12:55:00Z
2
value 0.0001
scoring_system epss
scoring_elements 0.01096
published_at 2026-04-08T12:55:00Z
3
value 0.0001
scoring_system epss
scoring_elements 0.01079
published_at 2026-04-11T12:55:00Z
4
value 0.0001
scoring_system epss
scoring_elements 0.01073
published_at 2026-04-12T12:55:00Z
5
value 0.0001
scoring_system epss
scoring_elements 0.01074
published_at 2026-04-13T12:55:00Z
6
value 0.0001
scoring_system epss
scoring_elements 0.01068
published_at 2026-04-16T12:55:00Z
7
value 0.0001
scoring_system epss
scoring_elements 0.01077
published_at 2026-04-18T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.03381
published_at 2026-04-26T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03379
published_at 2026-04-24T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.0339
published_at 2026-04-21T12:55:00Z
11
value 9e-05
scoring_system epss
scoring_elements 0.00895
published_at 2026-04-04T12:55:00Z
12
value 9e-05
scoring_system epss
scoring_elements 0.00893
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1382
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1382
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1382
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2177371
reference_id 2177371
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2177371
5
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
6
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
7
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
8
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
9
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
10
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
11
reference_url https://lore.kernel.org/netdev/bc7bd3183f1c275c820690fc65b708238fe9e38e.1668807842.git.lucien.xin%40gmail.com/T/#u
reference_id #u
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:20Z/
url https://lore.kernel.org/netdev/bc7bd3183f1c275c820690fc65b708238fe9e38e.1668807842.git.lucien.xin%40gmail.com/T/#u
12
reference_url https://usn.ubuntu.com/6000-1/
reference_id USN-6000-1
reference_type
scores
url https://usn.ubuntu.com/6000-1/
13
reference_url https://usn.ubuntu.com/6739-1/
reference_id USN-6739-1
reference_type
scores
url https://usn.ubuntu.com/6739-1/
14
reference_url https://usn.ubuntu.com/6740-1/
reference_id USN-6740-1
reference_type
scores
url https://usn.ubuntu.com/6740-1/
fixed_packages
aliases CVE-2023-1382
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ghef-adjn-rqcb
20
url VCID-gpdn-rup2-7fey
vulnerability_id VCID-gpdn-rup2-7fey
summary kernel: vmwgfx: use-after-free in vmw_execbuf_tie_context
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40133.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40133.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-40133
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.1298
published_at 2026-04-11T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12969
published_at 2026-04-08T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.1302
published_at 2026-04-09T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12944
published_at 2026-04-12T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.129
published_at 2026-04-13T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.128
published_at 2026-04-16T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.12803
published_at 2026-04-18T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.1289
published_at 2026-04-07T12:55:00Z
8
value 0.00044
scoring_system epss
scoring_elements 0.13448
published_at 2026-04-02T12:55:00Z
9
value 0.00044
scoring_system epss
scoring_elements 0.13513
published_at 2026-04-04T12:55:00Z
10
value 0.00044
scoring_system epss
scoring_elements 0.13295
published_at 2026-04-26T12:55:00Z
11
value 0.00044
scoring_system epss
scoring_elements 0.13315
published_at 2026-04-21T12:55:00Z
12
value 0.00044
scoring_system epss
scoring_elements 0.13322
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-40133
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40133
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2133453
reference_id 2133453
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2133453
5
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
6
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
7
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
8
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
9
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
10
reference_url https://access.redhat.com/errata/RHSA-2024:4823
reference_id RHSA-2024:4823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4823
11
reference_url https://access.redhat.com/errata/RHSA-2024:4831
reference_id RHSA-2024:4831
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4831
fixed_packages
aliases CVE-2022-40133
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gpdn-rup2-7fey
21
url VCID-jt33-xayh-5ke1
vulnerability_id VCID-jt33-xayh-5ke1
summary kernel: vmwgfx: double free within the handling of vmw_buffer_object objects
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-33952.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-33952.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-33952
reference_id
reference_type
scores
0
value 9e-05
scoring_system epss
scoring_elements 0.00991
published_at 2026-04-26T12:55:00Z
1
value 9e-05
scoring_system epss
scoring_elements 0.00927
published_at 2026-04-16T12:55:00Z
2
value 9e-05
scoring_system epss
scoring_elements 0.00935
published_at 2026-04-18T12:55:00Z
3
value 9e-05
scoring_system epss
scoring_elements 0.00985
published_at 2026-04-21T12:55:00Z
4
value 9e-05
scoring_system epss
scoring_elements 0.00987
published_at 2026-04-24T12:55:00Z
5
value 9e-05
scoring_system epss
scoring_elements 0.00941
published_at 2026-04-04T12:55:00Z
6
value 9e-05
scoring_system epss
scoring_elements 0.00946
published_at 2026-04-07T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.0095
published_at 2026-04-08T12:55:00Z
8
value 9e-05
scoring_system epss
scoring_elements 0.00945
published_at 2026-04-09T12:55:00Z
9
value 9e-05
scoring_system epss
scoring_elements 0.00934
published_at 2026-04-11T12:55:00Z
10
value 9e-05
scoring_system epss
scoring_elements 0.00929
published_at 2026-04-12T12:55:00Z
11
value 9e-05
scoring_system epss
scoring_elements 0.0093
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-33952
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2218212
reference_id 2218212
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2218212
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv
reference_id cpe:/a:redhat:enterprise_linux:8::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime
reference_id cpe:/a:redhat:enterprise_linux:8::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv
reference_id cpe:/a:redhat:enterprise_linux:9::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime
reference_id cpe:/a:redhat:enterprise_linux:9::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb
reference_id cpe:/a:redhat:rhel_eus:8.8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb
reference_id cpe:/a:redhat:rhel_eus:9.2::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv
reference_id cpe:/a:redhat:rhel_eus:9.2::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime
reference_id cpe:/a:redhat:rhel_eus:9.2::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
reference_id cpe:/o:redhat:rhel_eus:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
23
reference_url https://access.redhat.com/security/cve/CVE-2023-33952
reference_id CVE-2023-33952
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/
url https://access.redhat.com/security/cve/CVE-2023-33952
24
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/
url https://access.redhat.com/errata/RHSA-2023:6583
25
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/
url https://access.redhat.com/errata/RHSA-2023:6901
26
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/
url https://access.redhat.com/errata/RHSA-2023:7077
27
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/
url https://access.redhat.com/errata/RHSA-2024:1404
28
reference_url https://access.redhat.com/errata/RHSA-2024:4823
reference_id RHSA-2024:4823
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/
url https://access.redhat.com/errata/RHSA-2024:4823
29
reference_url https://access.redhat.com/errata/RHSA-2024:4831
reference_id RHSA-2024:4831
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/
url https://access.redhat.com/errata/RHSA-2024:4831
30
reference_url https://www.zerodayinitiative.com/advisories/ZDI-CAN-20292
reference_id ZDI-CAN-20292
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/
url https://www.zerodayinitiative.com/advisories/ZDI-CAN-20292
fixed_packages
aliases CVE-2023-33952
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jt33-xayh-5ke1
22
url VCID-ke38-q17b-13hz
vulnerability_id VCID-ke38-q17b-13hz
summary kernel: memory leak in ttusb_dec_exit_dvb() in media/usb/ttusb-dec/ttusb_dec.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45887.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45887.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-45887
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01844
published_at 2026-04-02T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.0162
published_at 2026-04-26T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01862
published_at 2026-04-08T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01876
published_at 2026-04-09T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01863
published_at 2026-04-11T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01847
published_at 2026-04-12T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01843
published_at 2026-04-13T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.01511
published_at 2026-04-16T12:55:00Z
8
value 0.00012
scoring_system epss
scoring_elements 0.01527
published_at 2026-04-18T12:55:00Z
9
value 0.00012
scoring_system epss
scoring_elements 0.01615
published_at 2026-04-21T12:55:00Z
10
value 0.00012
scoring_system epss
scoring_elements 0.01623
published_at 2026-04-24T12:55:00Z
11
value 0.00012
scoring_system epss
scoring_elements 0.01857
published_at 2026-04-04T12:55:00Z
12
value 0.00012
scoring_system epss
scoring_elements 0.01858
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-45887
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45887
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45887
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lore.kernel.org/linux-media/20221115131822.6640-1-imv4bel%40gmail.com/
reference_id 20221115131822.6640-1-imv4bel%40gmail.com
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-25T19:13:39Z/
url https://lore.kernel.org/linux-media/20221115131822.6640-1-imv4bel%40gmail.com/
5
reference_url https://lore.kernel.org/linux-media/20221115131822.6640-5-imv4bel%40gmail.com/
reference_id 20221115131822.6640-5-imv4bel%40gmail.com
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-25T19:13:39Z/
url https://lore.kernel.org/linux-media/20221115131822.6640-5-imv4bel%40gmail.com/
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2148520
reference_id 2148520
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2148520
7
reference_url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=517a281338322ff8293f988771c98aaa7205e457
reference_id ?id=517a281338322ff8293f988771c98aaa7205e457
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-25T19:13:39Z/
url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=517a281338322ff8293f988771c98aaa7205e457
8
reference_url https://security.netapp.com/advisory/ntap-20230113-0006/
reference_id ntap-20230113-0006
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-25T19:13:39Z/
url https://security.netapp.com/advisory/ntap-20230113-0006/
9
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
10
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
11
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
12
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
13
reference_url https://usn.ubuntu.com/6412-1/
reference_id USN-6412-1
reference_type
scores
url https://usn.ubuntu.com/6412-1/
14
reference_url https://usn.ubuntu.com/6466-1/
reference_id USN-6466-1
reference_type
scores
url https://usn.ubuntu.com/6466-1/
fixed_packages
aliases CVE-2022-45887
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ke38-q17b-13hz
23
url VCID-kkm1-jzbg-97d3
vulnerability_id VCID-kkm1-jzbg-97d3
summary kernel: vmwgfx: integer overflow in vmwgfx_execbuf.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36402.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36402.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-36402
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.15574
published_at 2026-04-02T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.15642
published_at 2026-04-04T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15442
published_at 2026-04-07T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15529
published_at 2026-04-08T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.15584
published_at 2026-04-09T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15548
published_at 2026-04-11T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15511
published_at 2026-04-12T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15445
published_at 2026-04-13T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15367
published_at 2026-04-16T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.1537
published_at 2026-04-18T12:55:00Z
10
value 0.0005
scoring_system epss
scoring_elements 0.15423
published_at 2026-04-21T12:55:00Z
11
value 0.0005
scoring_system epss
scoring_elements 0.15467
published_at 2026-04-24T12:55:00Z
12
value 0.0005
scoring_system epss
scoring_elements 0.15465
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-36402
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36402
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2133451
reference_id 2133451
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2133451
5
reference_url https://access.redhat.com/errata/RHSA-2024:0113
reference_id RHSA-2024:0113
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0113
6
reference_url https://access.redhat.com/errata/RHSA-2024:0134
reference_id RHSA-2024:0134
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0134
7
reference_url https://access.redhat.com/errata/RHSA-2024:0461
reference_id RHSA-2024:0461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0461
8
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
9
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
10
reference_url https://access.redhat.com/errata/RHSA-2024:4823
reference_id RHSA-2024:4823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4823
11
reference_url https://access.redhat.com/errata/RHSA-2024:4831
reference_id RHSA-2024:4831
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4831
12
reference_url https://usn.ubuntu.com/7088-1/
reference_id USN-7088-1
reference_type
scores
url https://usn.ubuntu.com/7088-1/
13
reference_url https://usn.ubuntu.com/7088-2/
reference_id USN-7088-2
reference_type
scores
url https://usn.ubuntu.com/7088-2/
14
reference_url https://usn.ubuntu.com/7088-3/
reference_id USN-7088-3
reference_type
scores
url https://usn.ubuntu.com/7088-3/
15
reference_url https://usn.ubuntu.com/7088-4/
reference_id USN-7088-4
reference_type
scores
url https://usn.ubuntu.com/7088-4/
16
reference_url https://usn.ubuntu.com/7088-5/
reference_id USN-7088-5
reference_type
scores
url https://usn.ubuntu.com/7088-5/
17
reference_url https://usn.ubuntu.com/7119-1/
reference_id USN-7119-1
reference_type
scores
url https://usn.ubuntu.com/7119-1/
18
reference_url https://usn.ubuntu.com/7183-1/
reference_id USN-7183-1
reference_type
scores
url https://usn.ubuntu.com/7183-1/
19
reference_url https://usn.ubuntu.com/7184-1/
reference_id USN-7184-1
reference_type
scores
url https://usn.ubuntu.com/7184-1/
20
reference_url https://usn.ubuntu.com/7185-1/
reference_id USN-7185-1
reference_type
scores
url https://usn.ubuntu.com/7185-1/
21
reference_url https://usn.ubuntu.com/7185-2/
reference_id USN-7185-2
reference_type
scores
url https://usn.ubuntu.com/7185-2/
fixed_packages
aliases CVE-2022-36402
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kkm1-jzbg-97d3
24
url VCID-ks9z-m9jz-tybr
vulnerability_id VCID-ks9z-m9jz-tybr
summary kernel: KVM: x86/mmu: race condition in direct_page_fault()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45869.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45869.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-45869
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.049
published_at 2026-04-26T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04826
published_at 2026-04-21T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04861
published_at 2026-04-24T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.05139
published_at 2026-04-02T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.05165
published_at 2026-04-04T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.05185
published_at 2026-04-07T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.05218
published_at 2026-04-08T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.05237
published_at 2026-04-09T12:55:00Z
8
value 0.00019
scoring_system epss
scoring_elements 0.05205
published_at 2026-04-11T12:55:00Z
9
value 0.00019
scoring_system epss
scoring_elements 0.05188
published_at 2026-04-12T12:55:00Z
10
value 0.00019
scoring_system epss
scoring_elements 0.05174
published_at 2026-04-13T12:55:00Z
11
value 0.00019
scoring_system epss
scoring_elements 0.05121
published_at 2026-04-16T12:55:00Z
12
value 0.00019
scoring_system epss
scoring_elements 0.05125
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-45869
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2151317
reference_id 2151317
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2151317
4
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=47b0c2e4c220f2251fd8dcfbb44479819c715e15
reference_id ?id=47b0c2e4c220f2251fd8dcfbb44479819c715e15
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T18:57:15Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=47b0c2e4c220f2251fd8dcfbb44479819c715e15
5
reference_url https://access.redhat.com/errata/RHSA-2023:4377
reference_id RHSA-2023:4377
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4377
6
reference_url https://access.redhat.com/errata/RHSA-2023:4378
reference_id RHSA-2023:4378
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4378
7
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
8
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
9
reference_url https://access.redhat.com/errata/RHSA-2024:1188
reference_id RHSA-2024:1188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1188
10
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
11
reference_url https://usn.ubuntu.com/5911-1/
reference_id USN-5911-1
reference_type
scores
url https://usn.ubuntu.com/5911-1/
12
reference_url https://usn.ubuntu.com/5912-1/
reference_id USN-5912-1
reference_type
scores
url https://usn.ubuntu.com/5912-1/
13
reference_url https://usn.ubuntu.com/5929-1/
reference_id USN-5929-1
reference_type
scores
url https://usn.ubuntu.com/5929-1/
14
reference_url https://usn.ubuntu.com/5935-1/
reference_id USN-5935-1
reference_type
scores
url https://usn.ubuntu.com/5935-1/
15
reference_url https://usn.ubuntu.com/5938-1/
reference_id USN-5938-1
reference_type
scores
url https://usn.ubuntu.com/5938-1/
16
reference_url https://usn.ubuntu.com/5941-1/
reference_id USN-5941-1
reference_type
scores
url https://usn.ubuntu.com/5941-1/
17
reference_url https://usn.ubuntu.com/5950-1/
reference_id USN-5950-1
reference_type
scores
url https://usn.ubuntu.com/5950-1/
18
reference_url https://usn.ubuntu.com/5962-1/
reference_id USN-5962-1
reference_type
scores
url https://usn.ubuntu.com/5962-1/
fixed_packages
aliases CVE-2022-45869
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ks9z-m9jz-tybr
25
url VCID-myf8-auba-aqe1
vulnerability_id VCID-myf8-auba-aqe1
summary kernel: use-after-free in IPv4 IGMP
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6932.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6932.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6932
reference_id
reference_type
scores
0
value 0.00056
scoring_system epss
scoring_elements 0.17843
published_at 2026-04-02T12:55:00Z
1
value 0.00056
scoring_system epss
scoring_elements 0.17896
published_at 2026-04-04T12:55:00Z
2
value 0.00056
scoring_system epss
scoring_elements 0.17599
published_at 2026-04-07T12:55:00Z
3
value 0.00056
scoring_system epss
scoring_elements 0.17687
published_at 2026-04-08T12:55:00Z
4
value 0.00056
scoring_system epss
scoring_elements 0.17749
published_at 2026-04-09T12:55:00Z
5
value 0.00056
scoring_system epss
scoring_elements 0.17767
published_at 2026-04-11T12:55:00Z
6
value 0.00056
scoring_system epss
scoring_elements 0.17721
published_at 2026-04-12T12:55:00Z
7
value 0.00056
scoring_system epss
scoring_elements 0.1767
published_at 2026-04-13T12:55:00Z
8
value 0.00056
scoring_system epss
scoring_elements 0.17615
published_at 2026-04-16T12:55:00Z
9
value 0.00056
scoring_system epss
scoring_elements 0.17623
published_at 2026-04-18T12:55:00Z
10
value 0.00056
scoring_system epss
scoring_elements 0.1766
published_at 2026-04-21T12:55:00Z
11
value 0.00056
scoring_system epss
scoring_elements 0.1757
published_at 2026-04-24T12:55:00Z
12
value 0.00056
scoring_system epss
scoring_elements 0.17546
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6932
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255283
reference_id 2255283
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255283
22
reference_url https://access.redhat.com/errata/RHSA-2024:0723
reference_id RHSA-2024:0723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0723
23
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
24
reference_url https://access.redhat.com/errata/RHSA-2024:0725
reference_id RHSA-2024:0725
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0725
25
reference_url https://access.redhat.com/errata/RHSA-2024:1250
reference_id RHSA-2024:1250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1250
26
reference_url https://access.redhat.com/errata/RHSA-2024:1306
reference_id RHSA-2024:1306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1306
27
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
28
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
29
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
30
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
31
reference_url https://usn.ubuntu.com/6601-1/
reference_id USN-6601-1
reference_type
scores
url https://usn.ubuntu.com/6601-1/
32
reference_url https://usn.ubuntu.com/6602-1/
reference_id USN-6602-1
reference_type
scores
url https://usn.ubuntu.com/6602-1/
33
reference_url https://usn.ubuntu.com/6603-1/
reference_id USN-6603-1
reference_type
scores
url https://usn.ubuntu.com/6603-1/
34
reference_url https://usn.ubuntu.com/6604-1/
reference_id USN-6604-1
reference_type
scores
url https://usn.ubuntu.com/6604-1/
35
reference_url https://usn.ubuntu.com/6604-2/
reference_id USN-6604-2
reference_type
scores
url https://usn.ubuntu.com/6604-2/
36
reference_url https://usn.ubuntu.com/6605-1/
reference_id USN-6605-1
reference_type
scores
url https://usn.ubuntu.com/6605-1/
37
reference_url https://usn.ubuntu.com/6605-2/
reference_id USN-6605-2
reference_type
scores
url https://usn.ubuntu.com/6605-2/
38
reference_url https://usn.ubuntu.com/6607-1/
reference_id USN-6607-1
reference_type
scores
url https://usn.ubuntu.com/6607-1/
39
reference_url https://usn.ubuntu.com/6608-1/
reference_id USN-6608-1
reference_type
scores
url https://usn.ubuntu.com/6608-1/
40
reference_url https://usn.ubuntu.com/6608-2/
reference_id USN-6608-2
reference_type
scores
url https://usn.ubuntu.com/6608-2/
41
reference_url https://usn.ubuntu.com/6609-1/
reference_id USN-6609-1
reference_type
scores
url https://usn.ubuntu.com/6609-1/
42
reference_url https://usn.ubuntu.com/6609-2/
reference_id USN-6609-2
reference_type
scores
url https://usn.ubuntu.com/6609-2/
43
reference_url https://usn.ubuntu.com/6609-3/
reference_id USN-6609-3
reference_type
scores
url https://usn.ubuntu.com/6609-3/
44
reference_url https://usn.ubuntu.com/6628-1/
reference_id USN-6628-1
reference_type
scores
url https://usn.ubuntu.com/6628-1/
45
reference_url https://usn.ubuntu.com/6628-2/
reference_id USN-6628-2
reference_type
scores
url https://usn.ubuntu.com/6628-2/
46
reference_url https://usn.ubuntu.com/6635-1/
reference_id USN-6635-1
reference_type
scores
url https://usn.ubuntu.com/6635-1/
47
reference_url https://usn.ubuntu.com/6639-1/
reference_id USN-6639-1
reference_type
scores
url https://usn.ubuntu.com/6639-1/
fixed_packages
aliases CVE-2023-6932
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-myf8-auba-aqe1
26
url VCID-ndpa-ukkb-qyg5
vulnerability_id VCID-ndpa-ukkb-qyg5
summary kernel: use-after-free in sch_qfq network scheduler
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4921.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4921.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4921
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.02218
published_at 2026-04-02T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02266
published_at 2026-04-26T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.02221
published_at 2026-04-08T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02243
published_at 2026-04-09T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02226
published_at 2026-04-11T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02216
published_at 2026-04-12T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02214
published_at 2026-04-13T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02197
published_at 2026-04-16T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.02207
published_at 2026-04-18T12:55:00Z
9
value 0.00013
scoring_system epss
scoring_elements 0.02297
published_at 2026-04-21T12:55:00Z
10
value 0.00013
scoring_system epss
scoring_elements 0.02275
published_at 2026-04-24T12:55:00Z
11
value 0.00013
scoring_system epss
scoring_elements 0.02224
published_at 2026-04-04T12:55:00Z
12
value 0.00013
scoring_system epss
scoring_elements 0.0222
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4921
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4921
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245514
reference_id 2245514
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2245514
5
reference_url https://kernel.dance/8fc134fee27f2263988ae38920bc03da416b03d8
reference_id 8fc134fee27f2263988ae38920bc03da416b03d8
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:09Z/
url https://kernel.dance/8fc134fee27f2263988ae38920bc03da416b03d8
6
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8fc134fee27f2263988ae38920bc03da416b03d8
reference_id ?id=8fc134fee27f2263988ae38920bc03da416b03d8
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:09Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8fc134fee27f2263988ae38920bc03da416b03d8
7
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
reference_id msg00004.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:09Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
8
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:09Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
9
reference_url https://access.redhat.com/errata/RHSA-2024:0562
reference_id RHSA-2024:0562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0562
10
reference_url https://access.redhat.com/errata/RHSA-2024:0563
reference_id RHSA-2024:0563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0563
11
reference_url https://access.redhat.com/errata/RHSA-2024:0593
reference_id RHSA-2024:0593
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0593
12
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
13
reference_url https://access.redhat.com/errata/RHSA-2024:0851
reference_id RHSA-2024:0851
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0851
14
reference_url https://access.redhat.com/errata/RHSA-2024:0876
reference_id RHSA-2024:0876
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0876
15
reference_url https://access.redhat.com/errata/RHSA-2024:0881
reference_id RHSA-2024:0881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0881
16
reference_url https://access.redhat.com/errata/RHSA-2024:0897
reference_id RHSA-2024:0897
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0897
17
reference_url https://access.redhat.com/errata/RHSA-2024:0980
reference_id RHSA-2024:0980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0980
18
reference_url https://access.redhat.com/errata/RHSA-2024:0999
reference_id RHSA-2024:0999
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0999
19
reference_url https://access.redhat.com/errata/RHSA-2024:1249
reference_id RHSA-2024:1249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1249
20
reference_url https://access.redhat.com/errata/RHSA-2024:1268
reference_id RHSA-2024:1268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1268
21
reference_url https://access.redhat.com/errata/RHSA-2024:1269
reference_id RHSA-2024:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1269
22
reference_url https://access.redhat.com/errata/RHSA-2024:1278
reference_id RHSA-2024:1278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1278
23
reference_url https://access.redhat.com/errata/RHSA-2024:1323
reference_id RHSA-2024:1323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1323
24
reference_url https://access.redhat.com/errata/RHSA-2024:1332
reference_id RHSA-2024:1332
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1332
25
reference_url https://access.redhat.com/errata/RHSA-2024:1368
reference_id RHSA-2024:1368
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1368
26
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
27
reference_url https://access.redhat.com/errata/RHSA-2024:1831
reference_id RHSA-2024:1831
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1831
28
reference_url https://usn.ubuntu.com/6439-1/
reference_id USN-6439-1
reference_type
scores
url https://usn.ubuntu.com/6439-1/
29
reference_url https://usn.ubuntu.com/6439-2/
reference_id USN-6439-2
reference_type
scores
url https://usn.ubuntu.com/6439-2/
30
reference_url https://usn.ubuntu.com/6440-1/
reference_id USN-6440-1
reference_type
scores
url https://usn.ubuntu.com/6440-1/
31
reference_url https://usn.ubuntu.com/6440-2/
reference_id USN-6440-2
reference_type
scores
url https://usn.ubuntu.com/6440-2/
32
reference_url https://usn.ubuntu.com/6440-3/
reference_id USN-6440-3
reference_type
scores
url https://usn.ubuntu.com/6440-3/
33
reference_url https://usn.ubuntu.com/6441-1/
reference_id USN-6441-1
reference_type
scores
url https://usn.ubuntu.com/6441-1/
34
reference_url https://usn.ubuntu.com/6441-2/
reference_id USN-6441-2
reference_type
scores
url https://usn.ubuntu.com/6441-2/
35
reference_url https://usn.ubuntu.com/6441-3/
reference_id USN-6441-3
reference_type
scores
url https://usn.ubuntu.com/6441-3/
36
reference_url https://usn.ubuntu.com/6442-1/
reference_id USN-6442-1
reference_type
scores
url https://usn.ubuntu.com/6442-1/
37
reference_url https://usn.ubuntu.com/6444-1/
reference_id USN-6444-1
reference_type
scores
url https://usn.ubuntu.com/6444-1/
38
reference_url https://usn.ubuntu.com/6444-2/
reference_id USN-6444-2
reference_type
scores
url https://usn.ubuntu.com/6444-2/
39
reference_url https://usn.ubuntu.com/6445-1/
reference_id USN-6445-1
reference_type
scores
url https://usn.ubuntu.com/6445-1/
40
reference_url https://usn.ubuntu.com/6445-2/
reference_id USN-6445-2
reference_type
scores
url https://usn.ubuntu.com/6445-2/
41
reference_url https://usn.ubuntu.com/6446-1/
reference_id USN-6446-1
reference_type
scores
url https://usn.ubuntu.com/6446-1/
42
reference_url https://usn.ubuntu.com/6446-2/
reference_id USN-6446-2
reference_type
scores
url https://usn.ubuntu.com/6446-2/
43
reference_url https://usn.ubuntu.com/6446-3/
reference_id USN-6446-3
reference_type
scores
url https://usn.ubuntu.com/6446-3/
44
reference_url https://usn.ubuntu.com/6454-1/
reference_id USN-6454-1
reference_type
scores
url https://usn.ubuntu.com/6454-1/
45
reference_url https://usn.ubuntu.com/6454-2/
reference_id USN-6454-2
reference_type
scores
url https://usn.ubuntu.com/6454-2/
46
reference_url https://usn.ubuntu.com/6454-3/
reference_id USN-6454-3
reference_type
scores
url https://usn.ubuntu.com/6454-3/
47
reference_url https://usn.ubuntu.com/6454-4/
reference_id USN-6454-4
reference_type
scores
url https://usn.ubuntu.com/6454-4/
48
reference_url https://usn.ubuntu.com/6461-1/
reference_id USN-6461-1
reference_type
scores
url https://usn.ubuntu.com/6461-1/
49
reference_url https://usn.ubuntu.com/6466-1/
reference_id USN-6466-1
reference_type
scores
url https://usn.ubuntu.com/6466-1/
50
reference_url https://usn.ubuntu.com/6479-1/
reference_id USN-6479-1
reference_type
scores
url https://usn.ubuntu.com/6479-1/
51
reference_url https://usn.ubuntu.com/6699-1/
reference_id USN-6699-1
reference_type
scores
url https://usn.ubuntu.com/6699-1/
fixed_packages
aliases CVE-2023-4921
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ndpa-ukkb-qyg5
27
url VCID-qkq7-ws9x-43f7
vulnerability_id VCID-qkq7-ws9x-43f7
summary kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1086.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1086.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-1086
reference_id
reference_type
scores
0
value 0.85405
scoring_system epss
scoring_elements 0.99369
published_at 2026-04-18T12:55:00Z
1
value 0.85405
scoring_system epss
scoring_elements 0.99367
published_at 2026-04-13T12:55:00Z
2
value 0.85405
scoring_system epss
scoring_elements 0.99364
published_at 2026-04-07T12:55:00Z
3
value 0.85405
scoring_system epss
scoring_elements 0.99366
published_at 2026-04-11T12:55:00Z
4
value 0.85405
scoring_system epss
scoring_elements 0.99365
published_at 2026-04-09T12:55:00Z
5
value 0.85911
scoring_system epss
scoring_elements 0.99383
published_at 2026-04-04T12:55:00Z
6
value 0.86034
scoring_system epss
scoring_elements 0.99397
published_at 2026-04-26T12:55:00Z
7
value 0.86056
scoring_system epss
scoring_elements 0.99389
published_at 2026-04-02T12:55:00Z
8
value 0.86753
scoring_system epss
scoring_elements 0.99429
published_at 2026-04-24T12:55:00Z
9
value 0.86753
scoring_system epss
scoring_elements 0.99427
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-1086
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1086
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1086
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://www.openwall.com/lists/oss-security/2024/04/14/1
reference_id 1
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url http://www.openwall.com/lists/oss-security/2024/04/14/1
5
reference_url http://www.openwall.com/lists/oss-security/2024/04/15/2
reference_id 2
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url http://www.openwall.com/lists/oss-security/2024/04/15/2
6
reference_url http://www.openwall.com/lists/oss-security/2024/04/10/22
reference_id 22
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url http://www.openwall.com/lists/oss-security/2024/04/10/22
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2262126
reference_id 2262126
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2262126
8
reference_url http://www.openwall.com/lists/oss-security/2024/04/10/23
reference_id 23
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url http://www.openwall.com/lists/oss-security/2024/04/10/23
9
reference_url http://www.openwall.com/lists/oss-security/2024/04/17/5
reference_id 5
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url http://www.openwall.com/lists/oss-security/2024/04/17/5
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/
reference_id 7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/
11
reference_url https://github.com/Notselwyn/CVE-2024-1086
reference_id CVE-2024-1086
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url https://github.com/Notselwyn/CVE-2024-1086
12
reference_url https://kernel.dance/f342de4e2f33e0e39165d8639387aa6c19dff660
reference_id f342de4e2f33e0e39165d8639387aa6c19dff660
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url https://kernel.dance/f342de4e2f33e0e39165d8639387aa6c19dff660
13
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660
reference_id ?id=f342de4e2f33e0e39165d8639387aa6c19dff660
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660
14
reference_url https://news.ycombinator.com/item?id=39828424
reference_id item?id=39828424
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url https://news.ycombinator.com/item?id=39828424
15
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
reference_id msg00016.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
16
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
reference_id msg00020.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
17
reference_url https://pwning.tech/nftables/
reference_id nftables
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url https://pwning.tech/nftables/
18
reference_url https://security.netapp.com/advisory/ntap-20240614-0009/
reference_id ntap-20240614-0009
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-13T14:20:47Z/
url https://security.netapp.com/advisory/ntap-20240614-0009/
19
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
20
reference_url https://access.redhat.com/errata/RHSA-2024:1018
reference_id RHSA-2024:1018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1018
21
reference_url https://access.redhat.com/errata/RHSA-2024:1019
reference_id RHSA-2024:1019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1019
22
reference_url https://access.redhat.com/errata/RHSA-2024:1249
reference_id RHSA-2024:1249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1249
23
reference_url https://access.redhat.com/errata/RHSA-2024:1332
reference_id RHSA-2024:1332
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1332
24
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
25
reference_url https://access.redhat.com/errata/RHSA-2024:1607
reference_id RHSA-2024:1607
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1607
26
reference_url https://access.redhat.com/errata/RHSA-2024:1614
reference_id RHSA-2024:1614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1614
27
reference_url https://access.redhat.com/errata/RHSA-2024:2093
reference_id RHSA-2024:2093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2093
28
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
29
reference_url https://access.redhat.com/errata/RHSA-2024:2697
reference_id RHSA-2024:2697
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2697
30
reference_url https://access.redhat.com/errata/RHSA-2024:3318
reference_id RHSA-2024:3318
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3318
31
reference_url https://access.redhat.com/errata/RHSA-2024:3319
reference_id RHSA-2024:3319
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3319
32
reference_url https://access.redhat.com/errata/RHSA-2024:3414
reference_id RHSA-2024:3414
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3414
33
reference_url https://access.redhat.com/errata/RHSA-2024:3421
reference_id RHSA-2024:3421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3421
34
reference_url https://access.redhat.com/errata/RHSA-2024:3427
reference_id RHSA-2024:3427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3427
35
reference_url https://access.redhat.com/errata/RHSA-2024:3528
reference_id RHSA-2024:3528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3528
36
reference_url https://access.redhat.com/errata/RHSA-2024:3529
reference_id RHSA-2024:3529
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3529
37
reference_url https://access.redhat.com/errata/RHSA-2024:3530
reference_id RHSA-2024:3530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3530
38
reference_url https://access.redhat.com/errata/RHSA-2024:3805
reference_id RHSA-2024:3805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3805
39
reference_url https://access.redhat.com/errata/RHSA-2024:4073
reference_id RHSA-2024:4073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4073
40
reference_url https://access.redhat.com/errata/RHSA-2024:4074
reference_id RHSA-2024:4074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4074
41
reference_url https://access.redhat.com/errata/RHSA-2024:4075
reference_id RHSA-2024:4075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4075
42
reference_url https://usn.ubuntu.com/6688-1/
reference_id USN-6688-1
reference_type
scores
url https://usn.ubuntu.com/6688-1/
43
reference_url https://usn.ubuntu.com/6700-1/
reference_id USN-6700-1
reference_type
scores
url https://usn.ubuntu.com/6700-1/
44
reference_url https://usn.ubuntu.com/6700-2/
reference_id USN-6700-2
reference_type
scores
url https://usn.ubuntu.com/6700-2/
45
reference_url https://usn.ubuntu.com/6701-1/
reference_id USN-6701-1
reference_type
scores
url https://usn.ubuntu.com/6701-1/
46
reference_url https://usn.ubuntu.com/6701-2/
reference_id USN-6701-2
reference_type
scores
url https://usn.ubuntu.com/6701-2/
47
reference_url https://usn.ubuntu.com/6701-3/
reference_id USN-6701-3
reference_type
scores
url https://usn.ubuntu.com/6701-3/
48
reference_url https://usn.ubuntu.com/6701-4/
reference_id USN-6701-4
reference_type
scores
url https://usn.ubuntu.com/6701-4/
49
reference_url https://usn.ubuntu.com/6702-1/
reference_id USN-6702-1
reference_type
scores
url https://usn.ubuntu.com/6702-1/
50
reference_url https://usn.ubuntu.com/6702-2/
reference_id USN-6702-2
reference_type
scores
url https://usn.ubuntu.com/6702-2/
51
reference_url https://usn.ubuntu.com/6704-1/
reference_id USN-6704-1
reference_type
scores
url https://usn.ubuntu.com/6704-1/
52
reference_url https://usn.ubuntu.com/6704-2/
reference_id USN-6704-2
reference_type
scores
url https://usn.ubuntu.com/6704-2/
53
reference_url https://usn.ubuntu.com/6704-3/
reference_id USN-6704-3
reference_type
scores
url https://usn.ubuntu.com/6704-3/
54
reference_url https://usn.ubuntu.com/6704-4/
reference_id USN-6704-4
reference_type
scores
url https://usn.ubuntu.com/6704-4/
55
reference_url https://usn.ubuntu.com/6705-1/
reference_id USN-6705-1
reference_type
scores
url https://usn.ubuntu.com/6705-1/
56
reference_url https://usn.ubuntu.com/6707-1/
reference_id USN-6707-1
reference_type
scores
url https://usn.ubuntu.com/6707-1/
57
reference_url https://usn.ubuntu.com/6707-2/
reference_id USN-6707-2
reference_type
scores
url https://usn.ubuntu.com/6707-2/
58
reference_url https://usn.ubuntu.com/6707-3/
reference_id USN-6707-3
reference_type
scores
url https://usn.ubuntu.com/6707-3/
59
reference_url https://usn.ubuntu.com/6707-4/
reference_id USN-6707-4
reference_type
scores
url https://usn.ubuntu.com/6707-4/
60
reference_url https://usn.ubuntu.com/6716-1/
reference_id USN-6716-1
reference_type
scores
url https://usn.ubuntu.com/6716-1/
fixed_packages
aliases CVE-2024-1086
risk_score 10.0
exploitability 2.0
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qkq7-ws9x-43f7
28
url VCID-rbrm-7x37-3ugv
vulnerability_id VCID-rbrm-7x37-3ugv
summary kernel: inactive elements in nft_pipapo_walk
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6817.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6817.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6817
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.0549
published_at 2026-04-02T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05524
published_at 2026-04-07T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05561
published_at 2026-04-08T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05585
published_at 2026-04-09T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05558
published_at 2026-04-11T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05545
published_at 2026-04-12T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05537
published_at 2026-04-13T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05488
published_at 2026-04-16T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05498
published_at 2026-04-18T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.0566
published_at 2026-04-21T12:55:00Z
10
value 0.00021
scoring_system epss
scoring_elements 0.05695
published_at 2026-04-24T12:55:00Z
11
value 0.00021
scoring_system epss
scoring_elements 0.05732
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6817
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255139
reference_id 2255139
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255139
22
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
23
reference_url https://access.redhat.com/errata/RHSA-2024:0881
reference_id RHSA-2024:0881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0881
24
reference_url https://access.redhat.com/errata/RHSA-2024:0897
reference_id RHSA-2024:0897
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0897
25
reference_url https://access.redhat.com/errata/RHSA-2024:1018
reference_id RHSA-2024:1018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1018
26
reference_url https://access.redhat.com/errata/RHSA-2024:1019
reference_id RHSA-2024:1019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1019
27
reference_url https://access.redhat.com/errata/RHSA-2024:1248
reference_id RHSA-2024:1248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1248
28
reference_url https://access.redhat.com/errata/RHSA-2024:1268
reference_id RHSA-2024:1268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1268
29
reference_url https://access.redhat.com/errata/RHSA-2024:1269
reference_id RHSA-2024:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1269
30
reference_url https://access.redhat.com/errata/RHSA-2024:1367
reference_id RHSA-2024:1367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1367
31
reference_url https://access.redhat.com/errata/RHSA-2024:1382
reference_id RHSA-2024:1382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1382
32
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
33
reference_url https://access.redhat.com/errata/RHSA-2024:2094
reference_id RHSA-2024:2094
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2094
34
reference_url https://access.redhat.com/errata/RHSA-2024:3414
reference_id RHSA-2024:3414
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3414
35
reference_url https://access.redhat.com/errata/RHSA-2024:3421
reference_id RHSA-2024:3421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3421
36
reference_url https://usn.ubuntu.com/6606-1/
reference_id USN-6606-1
reference_type
scores
url https://usn.ubuntu.com/6606-1/
37
reference_url https://usn.ubuntu.com/6607-1/
reference_id USN-6607-1
reference_type
scores
url https://usn.ubuntu.com/6607-1/
38
reference_url https://usn.ubuntu.com/6608-1/
reference_id USN-6608-1
reference_type
scores
url https://usn.ubuntu.com/6608-1/
39
reference_url https://usn.ubuntu.com/6608-2/
reference_id USN-6608-2
reference_type
scores
url https://usn.ubuntu.com/6608-2/
40
reference_url https://usn.ubuntu.com/6609-1/
reference_id USN-6609-1
reference_type
scores
url https://usn.ubuntu.com/6609-1/
41
reference_url https://usn.ubuntu.com/6609-2/
reference_id USN-6609-2
reference_type
scores
url https://usn.ubuntu.com/6609-2/
42
reference_url https://usn.ubuntu.com/6609-3/
reference_id USN-6609-3
reference_type
scores
url https://usn.ubuntu.com/6609-3/
43
reference_url https://usn.ubuntu.com/6628-1/
reference_id USN-6628-1
reference_type
scores
url https://usn.ubuntu.com/6628-1/
44
reference_url https://usn.ubuntu.com/6628-2/
reference_id USN-6628-2
reference_type
scores
url https://usn.ubuntu.com/6628-2/
45
reference_url https://usn.ubuntu.com/6635-1/
reference_id USN-6635-1
reference_type
scores
url https://usn.ubuntu.com/6635-1/
fixed_packages
aliases CVE-2023-6817
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rbrm-7x37-3ugv
29
url VCID-sdkh-c3yd-g3ak
vulnerability_id VCID-sdkh-c3yd-g3ak
summary kernel: Slab-out-of-bound read in compare_netdev_and_ip
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2176.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2176.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2176
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.02897
published_at 2026-04-12T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.02923
published_at 2026-04-08T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.02913
published_at 2026-04-04T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.02921
published_at 2026-04-07T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.02948
published_at 2026-04-09T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.02917
published_at 2026-04-11T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.0289
published_at 2026-04-13T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.0287
published_at 2026-04-16T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.0288
published_at 2026-04-18T12:55:00Z
9
value 0.00016
scoring_system epss
scoring_elements 0.03549
published_at 2026-04-26T12:55:00Z
10
value 0.00016
scoring_system epss
scoring_elements 0.03542
published_at 2026-04-24T12:55:00Z
11
value 0.00016
scoring_system epss
scoring_elements 0.03535
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2176
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2187931
reference_id 2187931
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2187931
4
reference_url https://www.spinics.net/lists/linux-rdma/msg114749.html
reference_id msg114749.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:34Z/
url https://www.spinics.net/lists/linux-rdma/msg114749.html
5
reference_url https://security.netapp.com/advisory/ntap-20230609-0005/
reference_id ntap-20230609-0005
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:34Z/
url https://security.netapp.com/advisory/ntap-20230609-0005/
6
reference_url https://access.redhat.com/errata/RHSA-2024:0439
reference_id RHSA-2024:0439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0439
7
reference_url https://access.redhat.com/errata/RHSA-2024:0448
reference_id RHSA-2024:0448
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0448
8
reference_url https://access.redhat.com/errata/RHSA-2024:0461
reference_id RHSA-2024:0461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0461
9
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
10
reference_url https://access.redhat.com/errata/RHSA-2024:0881
reference_id RHSA-2024:0881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0881
11
reference_url https://access.redhat.com/errata/RHSA-2024:0897
reference_id RHSA-2024:0897
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0897
12
reference_url https://access.redhat.com/errata/RHSA-2024:1250
reference_id RHSA-2024:1250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1250
13
reference_url https://access.redhat.com/errata/RHSA-2024:1306
reference_id RHSA-2024:1306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1306
14
reference_url https://access.redhat.com/errata/RHSA-2024:1367
reference_id RHSA-2024:1367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1367
15
reference_url https://access.redhat.com/errata/RHSA-2024:1382
reference_id RHSA-2024:1382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1382
16
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
17
reference_url https://access.redhat.com/errata/RHSA-2024:3528
reference_id RHSA-2024:3528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3528
18
reference_url https://usn.ubuntu.com/6194-1/
reference_id USN-6194-1
reference_type
scores
url https://usn.ubuntu.com/6194-1/
19
reference_url https://usn.ubuntu.com/6224-1/
reference_id USN-6224-1
reference_type
scores
url https://usn.ubuntu.com/6224-1/
20
reference_url https://usn.ubuntu.com/6228-1/
reference_id USN-6228-1
reference_type
scores
url https://usn.ubuntu.com/6228-1/
21
reference_url https://usn.ubuntu.com/6235-1/
reference_id USN-6235-1
reference_type
scores
url https://usn.ubuntu.com/6235-1/
fixed_packages
aliases CVE-2023-2176
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sdkh-c3yd-g3ak
30
url VCID-shtf-mwha-z7cd
vulnerability_id VCID-shtf-mwha-z7cd
summary kernel: NULL pointer dereference in can_rcv_filter
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2166.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2166.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2166
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03283
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03381
published_at 2026-04-26T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03223
published_at 2026-04-18T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.0339
published_at 2026-04-21T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03379
published_at 2026-04-24T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03294
published_at 2026-04-04T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.03303
published_at 2026-04-07T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03309
published_at 2026-04-08T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.0333
published_at 2026-04-09T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03287
published_at 2026-04-11T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03259
published_at 2026-04-12T12:55:00Z
11
value 0.00015
scoring_system epss
scoring_elements 0.03238
published_at 2026-04-13T12:55:00Z
12
value 0.00015
scoring_system epss
scoring_elements 0.03213
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2166
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2166
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2187813
reference_id 2187813
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2187813
5
reference_url https://lore.kernel.org/lkml/CAO4mrfcV_07hbj8NUuZrA8FH-kaRsrFy-2metecpTuE5kKHn5w%40mail.gmail.com/
reference_id CAO4mrfcV_07hbj8NUuZrA8FH-kaRsrFy-2metecpTuE5kKHn5w%40mail.gmail.com
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-05T15:12:07Z/
url https://lore.kernel.org/lkml/CAO4mrfcV_07hbj8NUuZrA8FH-kaRsrFy-2metecpTuE5kKHn5w%40mail.gmail.com/
6
reference_url https://access.redhat.com/errata/RHSA-2024:0439
reference_id RHSA-2024:0439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0439
7
reference_url https://access.redhat.com/errata/RHSA-2024:0448
reference_id RHSA-2024:0448
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0448
8
reference_url https://access.redhat.com/errata/RHSA-2024:0461
reference_id RHSA-2024:0461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0461
9
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
10
reference_url https://access.redhat.com/errata/RHSA-2024:0881
reference_id RHSA-2024:0881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0881
11
reference_url https://access.redhat.com/errata/RHSA-2024:0897
reference_id RHSA-2024:0897
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0897
12
reference_url https://access.redhat.com/errata/RHSA-2024:1250
reference_id RHSA-2024:1250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1250
13
reference_url https://access.redhat.com/errata/RHSA-2024:1306
reference_id RHSA-2024:1306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1306
14
reference_url https://access.redhat.com/errata/RHSA-2024:1367
reference_id RHSA-2024:1367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1367
15
reference_url https://access.redhat.com/errata/RHSA-2024:1382
reference_id RHSA-2024:1382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1382
16
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
17
reference_url https://access.redhat.com/errata/RHSA-2024:3528
reference_id RHSA-2024:3528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3528
fixed_packages
aliases CVE-2023-2166
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-shtf-mwha-z7cd
31
url VCID-ss41-s8fw-xub6
vulnerability_id VCID-ss41-s8fw-xub6
summary kernel: lib/seq_buf.c has a seq_buf_putmem_hex buffer overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28772.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28772.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-28772
reference_id
reference_type
scores
0
value 0.00177
scoring_system epss
scoring_elements 0.39348
published_at 2026-04-09T12:55:00Z
1
value 0.00177
scoring_system epss
scoring_elements 0.39337
published_at 2026-04-02T12:55:00Z
2
value 0.00177
scoring_system epss
scoring_elements 0.39361
published_at 2026-04-04T12:55:00Z
3
value 0.00177
scoring_system epss
scoring_elements 0.39275
published_at 2026-04-07T12:55:00Z
4
value 0.00177
scoring_system epss
scoring_elements 0.39331
published_at 2026-04-08T12:55:00Z
5
value 0.00215
scoring_system epss
scoring_elements 0.44053
published_at 2026-04-11T12:55:00Z
6
value 0.00215
scoring_system epss
scoring_elements 0.44021
published_at 2026-04-12T12:55:00Z
7
value 0.00215
scoring_system epss
scoring_elements 0.44005
published_at 2026-04-13T12:55:00Z
8
value 0.00236
scoring_system epss
scoring_elements 0.46554
published_at 2026-04-26T12:55:00Z
9
value 0.00236
scoring_system epss
scoring_elements 0.46617
published_at 2026-04-16T12:55:00Z
10
value 0.00236
scoring_system epss
scoring_elements 0.46615
published_at 2026-04-18T12:55:00Z
11
value 0.00236
scoring_system epss
scoring_elements 0.46561
published_at 2026-04-21T12:55:00Z
12
value 0.00236
scoring_system epss
scoring_elements 0.46543
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-28772
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28772
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2181330
reference_id 2181330
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2181330
5
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
6
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
7
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
8
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
fixed_packages
aliases CVE-2023-28772
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ss41-s8fw-xub6
32
url VCID-t81u-wyws-r7c3
vulnerability_id VCID-t81u-wyws-r7c3
summary kernel: Rate limit overflow messages in r8152 in intr_callback
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3594.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3594.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3594
reference_id
reference_type
scores
0
value 0.002
scoring_system epss
scoring_elements 0.41952
published_at 2026-04-26T12:55:00Z
1
value 0.002
scoring_system epss
scoring_elements 0.42075
published_at 2026-04-02T12:55:00Z
2
value 0.002
scoring_system epss
scoring_elements 0.42103
published_at 2026-04-04T12:55:00Z
3
value 0.002
scoring_system epss
scoring_elements 0.4204
published_at 2026-04-07T12:55:00Z
4
value 0.002
scoring_system epss
scoring_elements 0.42092
published_at 2026-04-08T12:55:00Z
5
value 0.002
scoring_system epss
scoring_elements 0.42104
published_at 2026-04-09T12:55:00Z
6
value 0.002
scoring_system epss
scoring_elements 0.42127
published_at 2026-04-11T12:55:00Z
7
value 0.002
scoring_system epss
scoring_elements 0.42089
published_at 2026-04-18T12:55:00Z
8
value 0.002
scoring_system epss
scoring_elements 0.42064
published_at 2026-04-13T12:55:00Z
9
value 0.002
scoring_system epss
scoring_elements 0.42115
published_at 2026-04-16T12:55:00Z
10
value 0.002
scoring_system epss
scoring_elements 0.42018
published_at 2026-04-21T12:55:00Z
11
value 0.002
scoring_system epss
scoring_elements 0.41958
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3594
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3594
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2149024
reference_id 2149024
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2149024
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://vuldb.com/?id.211363
reference_id ?id.211363
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-11T20:53:55Z/
url https://vuldb.com/?id.211363
10
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93e2be344a7db169b7119de21ac1bf253b8c6907
reference_id ?id=93e2be344a7db169b7119de21ac1bf253b8c6907
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-11T20:53:55Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93e2be344a7db169b7119de21ac1bf253b8c6907
11
reference_url https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html
reference_id msg00031.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-11T20:53:55Z/
url https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html
12
reference_url https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html
reference_id msg00034.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-11T20:53:55Z/
url https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html
13
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
14
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
15
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
16
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
17
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
18
reference_url https://usn.ubuntu.com/5754-1/
reference_id USN-5754-1
reference_type
scores
url https://usn.ubuntu.com/5754-1/
19
reference_url https://usn.ubuntu.com/5754-2/
reference_id USN-5754-2
reference_type
scores
url https://usn.ubuntu.com/5754-2/
20
reference_url https://usn.ubuntu.com/5755-1/
reference_id USN-5755-1
reference_type
scores
url https://usn.ubuntu.com/5755-1/
21
reference_url https://usn.ubuntu.com/5755-2/
reference_id USN-5755-2
reference_type
scores
url https://usn.ubuntu.com/5755-2/
22
reference_url https://usn.ubuntu.com/5756-1/
reference_id USN-5756-1
reference_type
scores
url https://usn.ubuntu.com/5756-1/
23
reference_url https://usn.ubuntu.com/5756-2/
reference_id USN-5756-2
reference_type
scores
url https://usn.ubuntu.com/5756-2/
24
reference_url https://usn.ubuntu.com/5756-3/
reference_id USN-5756-3
reference_type
scores
url https://usn.ubuntu.com/5756-3/
25
reference_url https://usn.ubuntu.com/5757-1/
reference_id USN-5757-1
reference_type
scores
url https://usn.ubuntu.com/5757-1/
26
reference_url https://usn.ubuntu.com/5757-2/
reference_id USN-5757-2
reference_type
scores
url https://usn.ubuntu.com/5757-2/
27
reference_url https://usn.ubuntu.com/5758-1/
reference_id USN-5758-1
reference_type
scores
url https://usn.ubuntu.com/5758-1/
28
reference_url https://usn.ubuntu.com/5773-1/
reference_id USN-5773-1
reference_type
scores
url https://usn.ubuntu.com/5773-1/
29
reference_url https://usn.ubuntu.com/5774-1/
reference_id USN-5774-1
reference_type
scores
url https://usn.ubuntu.com/5774-1/
30
reference_url https://usn.ubuntu.com/5779-1/
reference_id USN-5779-1
reference_type
scores
url https://usn.ubuntu.com/5779-1/
31
reference_url https://usn.ubuntu.com/5789-1/
reference_id USN-5789-1
reference_type
scores
url https://usn.ubuntu.com/5789-1/
fixed_packages
aliases CVE-2022-3594
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t81u-wyws-r7c3
33
url VCID-v17r-42dr-qybs
vulnerability_id VCID-v17r-42dr-qybs
summary kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0565.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0565.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0565
reference_id
reference_type
scores
0
value 0.00073
scoring_system epss
scoring_elements 0.21863
published_at 2026-04-26T12:55:00Z
1
value 0.00073
scoring_system epss
scoring_elements 0.22073
published_at 2026-04-13T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.22071
published_at 2026-04-16T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.22064
published_at 2026-04-18T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.22017
published_at 2026-04-21T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.21875
published_at 2026-04-24T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.22187
published_at 2026-04-02T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.22236
published_at 2026-04-04T12:55:00Z
8
value 0.00073
scoring_system epss
scoring_elements 0.22019
published_at 2026-04-07T12:55:00Z
9
value 0.00073
scoring_system epss
scoring_elements 0.22099
published_at 2026-04-08T12:55:00Z
10
value 0.00073
scoring_system epss
scoring_elements 0.22154
published_at 2026-04-09T12:55:00Z
11
value 0.00073
scoring_system epss
scoring_elements 0.22173
published_at 2026-04-11T12:55:00Z
12
value 0.00073
scoring_system epss
scoring_elements 0.22133
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0565
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47233
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47233
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52429
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52429
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52434
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52435
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52458
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52458
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52482
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52486
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52489
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52491
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52492
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52493
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52498
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52587
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52587
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52594
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52595
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52597
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52598
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52599
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52600
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52601
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52602
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52603
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52604
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52606
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52615
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52616
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52617
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52618
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52619
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52622
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52623
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52627
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52627
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52635
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52637
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52642
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0340
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0607
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1151
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23849
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851
58
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24857
59
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24858
60
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24861
61
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26581
62
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26593
63
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26600
64
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601
65
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602
66
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26606
67
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26610
68
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614
69
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615
70
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26622
71
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26625
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26625
72
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26627
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26627
73
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26635
74
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26636
75
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26640
76
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641
77
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642
78
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643
79
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26644
80
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26645
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26645
81
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651
82
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26654
83
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26659
84
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663
85
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26664
86
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26665
87
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26671
88
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26673
89
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675
90
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26679
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26679
91
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26684
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26684
92
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26685
93
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26687
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26687
94
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688
95
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689
96
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26695
97
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26696
98
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26697
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26697
99
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26698
100
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26702
101
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704
102
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26707
103
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26712
104
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26722
105
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26727
106
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733
107
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735
108
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26736
109
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743
110
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744
111
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747
112
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26748
113
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26749
114
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26751
115
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26752
116
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26753
117
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754
118
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763
119
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764
120
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766
121
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771
122
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772
123
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773
124
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26776
125
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777
126
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778
127
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779
128
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26781
129
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782
130
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26787
131
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26788
132
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26790
133
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791
134
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793
135
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26795
136
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801
137
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804
138
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805
139
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26808
140
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26809
141
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26810
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26810
142
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26812
143
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26813
144
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26814
145
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816
146
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817
147
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26820
148
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26825
149
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26833
150
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26835
151
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839
152
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840
153
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26843
154
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26845
155
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26846
156
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26851
157
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852
158
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855
159
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857
160
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859
161
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26861
162
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26862
163
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863
164
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26870
165
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26872
166
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26874
167
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26875
168
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26877
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26877
169
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878
170
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26880
171
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26882
172
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883
173
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884
174
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885
175
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889
176
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891
177
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26894
178
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26895
179
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26897
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26897
180
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898
181
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901
182
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903
183
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906
184
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907
185
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26910
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26910
186
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26917
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26917
187
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922
188
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923
189
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26924
190
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925
191
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26926
192
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931
193
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26934
194
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935
195
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26937
196
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26950
197
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26951
198
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26955
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26955
199
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26956
200
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26957
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26957
201
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26958
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26958
202
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960
203
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961
204
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26965
205
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26966
206
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26969
207
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26970
208
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26973
209
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974
210
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976
211
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26978
212
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26981
213
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26984
214
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26988
215
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993
216
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26994
217
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26997
218
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26999
219
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27000
220
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27001
221
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27004
222
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008
223
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013
224
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020
225
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27024
226
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27025
227
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27028
228
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27030
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27030
229
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27038
230
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043
231
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27044
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27044
232
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27045
233
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046
234
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27047
235
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051
236
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27052
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27052
237
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27053
238
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27059
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27059
239
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065
240
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073
241
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074
242
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075
243
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27076
244
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27077
245
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078
246
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388
247
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437
248
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
249
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2258518
reference_id 2258518
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T15:47:13Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2258518
250
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
251
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv
reference_id cpe:/a:redhat:enterprise_linux:8::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv
252
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime
reference_id cpe:/a:redhat:enterprise_linux:8::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime
253
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
254
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
255
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv
reference_id cpe:/a:redhat:enterprise_linux:9::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv
256
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime
reference_id cpe:/a:redhat:enterprise_linux:9::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime
257
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:logging:5.7::el8
reference_id cpe:/a:redhat:logging:5.7::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:logging:5.7::el8
258
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb
reference_id cpe:/a:redhat:rhel_eus:8.6::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb
259
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb
reference_id cpe:/a:redhat:rhel_eus:8.8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb
260
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
261
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb
reference_id cpe:/a:redhat:rhel_eus:9.2::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb
262
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv
reference_id cpe:/a:redhat:rhel_eus:9.2::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv
263
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime
reference_id cpe:/a:redhat:rhel_eus:9.2::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime
264
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
265
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
266
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
267
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
268
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
269
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
reference_id cpe:/o:redhat:rhel_eus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
270
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
271
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
reference_id cpe:/o:redhat:rhel_eus:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
272
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8
reference_id cpe:/o:redhat:rhev_hypervisor:4.4::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8
273
reference_url https://access.redhat.com/security/cve/CVE-2024-0565
reference_id CVE-2024-0565
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T15:47:13Z/
url https://access.redhat.com/security/cve/CVE-2024-0565
274
reference_url https://www.spinics.net/lists/stable-commits/msg328851.html
reference_id msg328851.html
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T15:47:13Z/
url https://www.spinics.net/lists/stable-commits/msg328851.html
275
reference_url https://access.redhat.com/errata/RHSA-2024:1188
reference_id RHSA-2024:1188
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T15:47:13Z/
url https://access.redhat.com/errata/RHSA-2024:1188
276
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T15:47:13Z/
url https://access.redhat.com/errata/RHSA-2024:1404
277
reference_url https://access.redhat.com/errata/RHSA-2024:1532
reference_id RHSA-2024:1532
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T15:47:13Z/
url https://access.redhat.com/errata/RHSA-2024:1532
278
reference_url https://access.redhat.com/errata/RHSA-2024:1533
reference_id RHSA-2024:1533
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T15:47:13Z/
url https://access.redhat.com/errata/RHSA-2024:1533
279
reference_url https://access.redhat.com/errata/RHSA-2024:1607
reference_id RHSA-2024:1607
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T15:47:13Z/
url https://access.redhat.com/errata/RHSA-2024:1607
280
reference_url https://access.redhat.com/errata/RHSA-2024:1614
reference_id RHSA-2024:1614
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T15:47:13Z/
url https://access.redhat.com/errata/RHSA-2024:1614
281
reference_url https://access.redhat.com/errata/RHSA-2024:2093
reference_id RHSA-2024:2093
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T15:47:13Z/
url https://access.redhat.com/errata/RHSA-2024:2093
282
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T15:47:13Z/
url https://access.redhat.com/errata/RHSA-2024:2394
283
reference_url https://usn.ubuntu.com/6639-1/
reference_id USN-6639-1
reference_type
scores
url https://usn.ubuntu.com/6639-1/
284
reference_url https://usn.ubuntu.com/6648-1/
reference_id USN-6648-1
reference_type
scores
url https://usn.ubuntu.com/6648-1/
285
reference_url https://usn.ubuntu.com/6648-2/
reference_id USN-6648-2
reference_type
scores
url https://usn.ubuntu.com/6648-2/
286
reference_url https://usn.ubuntu.com/6651-1/
reference_id USN-6651-1
reference_type
scores
url https://usn.ubuntu.com/6651-1/
287
reference_url https://usn.ubuntu.com/6651-2/
reference_id USN-6651-2
reference_type
scores
url https://usn.ubuntu.com/6651-2/
288
reference_url https://usn.ubuntu.com/6651-3/
reference_id USN-6651-3
reference_type
scores
url https://usn.ubuntu.com/6651-3/
289
reference_url https://usn.ubuntu.com/6652-1/
reference_id USN-6652-1
reference_type
scores
url https://usn.ubuntu.com/6652-1/
290
reference_url https://usn.ubuntu.com/6653-1/
reference_id USN-6653-1
reference_type
scores
url https://usn.ubuntu.com/6653-1/
291
reference_url https://usn.ubuntu.com/6653-2/
reference_id USN-6653-2
reference_type
scores
url https://usn.ubuntu.com/6653-2/
292
reference_url https://usn.ubuntu.com/6653-3/
reference_id USN-6653-3
reference_type
scores
url https://usn.ubuntu.com/6653-3/
293
reference_url https://usn.ubuntu.com/6653-4/
reference_id USN-6653-4
reference_type
scores
url https://usn.ubuntu.com/6653-4/
fixed_packages
aliases CVE-2024-0565
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v17r-42dr-qybs
34
url VCID-wc2m-dsfh-qkaq
vulnerability_id VCID-wc2m-dsfh-qkaq
summary kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0646.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0646.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0646
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04133
published_at 2026-04-09T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04071
published_at 2026-04-18T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.0406
published_at 2026-04-16T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.04079
published_at 2026-04-13T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.04105
published_at 2026-04-12T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.04075
published_at 2026-04-02T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.04094
published_at 2026-04-04T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.04109
published_at 2026-04-07T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.04114
published_at 2026-04-08T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.04119
published_at 2026-04-11T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04852
published_at 2026-04-26T12:55:00Z
11
value 0.00018
scoring_system epss
scoring_elements 0.0478
published_at 2026-04-21T12:55:00Z
12
value 0.00018
scoring_system epss
scoring_elements 0.04814
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0646
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0646
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2253908
reference_id 2253908
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:15Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2253908
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv
reference_id cpe:/a:redhat:enterprise_linux:8::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime
reference_id cpe:/a:redhat:enterprise_linux:8::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv
reference_id cpe:/a:redhat:enterprise_linux:9::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime
reference_id cpe:/a:redhat:enterprise_linux:9::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:logging:5.8::el9
reference_id cpe:/a:redhat:logging:5.8::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:logging:5.8::el9
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb
reference_id cpe:/a:redhat:rhel_eus:8.6::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb
reference_id cpe:/a:redhat:rhel_eus:8.8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb
reference_id cpe:/a:redhat:rhel_eus:9.0::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::nfv
reference_id cpe:/a:redhat:rhel_eus:9.0::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::nfv
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::realtime
reference_id cpe:/a:redhat:rhel_eus:9.0::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::realtime
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb
reference_id cpe:/a:redhat:rhel_eus:9.2::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv
reference_id cpe:/a:redhat:rhel_eus:9.2::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime
reference_id cpe:/a:redhat:rhel_eus:9.2::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::nfv
reference_id cpe:/a:redhat:rhel_tus:8.2::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::nfv
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::realtime
reference_id cpe:/a:redhat:rhel_tus:8.2::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::realtime
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::nfv
reference_id cpe:/a:redhat:rhel_tus:8.4::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::nfv
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::realtime
reference_id cpe:/a:redhat:rhel_tus:8.4::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::realtime
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.2::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.2::baseos
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.4::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.4::baseos
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
reference_id cpe:/o:redhat:rhel_eus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos
reference_id cpe:/o:redhat:rhel_eus:9.0::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
reference_id cpe:/o:redhat:rhel_eus:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.2::baseos
reference_id cpe:/o:redhat:rhel_tus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.2::baseos
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.4::baseos
reference_id cpe:/o:redhat:rhel_tus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.4::baseos
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8
reference_id cpe:/o:redhat:rhev_hypervisor:4.4::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8
43
reference_url https://access.redhat.com/security/cve/CVE-2024-0646
reference_id CVE-2024-0646
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:15Z/
url https://access.redhat.com/security/cve/CVE-2024-0646
44
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c5a595000e267
reference_id ?id=c5a595000e267
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:15Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c5a595000e267
45
reference_url https://access.redhat.com/errata/RHSA-2024:0723
reference_id RHSA-2024:0723
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:15Z/
url https://access.redhat.com/errata/RHSA-2024:0723
46
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:15Z/
url https://access.redhat.com/errata/RHSA-2024:0724
47
reference_url https://access.redhat.com/errata/RHSA-2024:0725
reference_id RHSA-2024:0725
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:15Z/
url https://access.redhat.com/errata/RHSA-2024:0725
48
reference_url https://access.redhat.com/errata/RHSA-2024:0850
reference_id RHSA-2024:0850
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:15Z/
url https://access.redhat.com/errata/RHSA-2024:0850
49
reference_url https://access.redhat.com/errata/RHSA-2024:0851
reference_id RHSA-2024:0851
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:15Z/
url https://access.redhat.com/errata/RHSA-2024:0851
50
reference_url https://access.redhat.com/errata/RHSA-2024:0876
reference_id RHSA-2024:0876
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:15Z/
url https://access.redhat.com/errata/RHSA-2024:0876
51
reference_url https://access.redhat.com/errata/RHSA-2024:0881
reference_id RHSA-2024:0881
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:15Z/
url https://access.redhat.com/errata/RHSA-2024:0881
52
reference_url https://access.redhat.com/errata/RHSA-2024:0897
reference_id RHSA-2024:0897
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:15Z/
url https://access.redhat.com/errata/RHSA-2024:0897
53
reference_url https://access.redhat.com/errata/RHSA-2024:1248
reference_id RHSA-2024:1248
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:15Z/
url https://access.redhat.com/errata/RHSA-2024:1248
54
reference_url https://access.redhat.com/errata/RHSA-2024:1250
reference_id RHSA-2024:1250
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:15Z/
url https://access.redhat.com/errata/RHSA-2024:1250
55
reference_url https://access.redhat.com/errata/RHSA-2024:1251
reference_id RHSA-2024:1251
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:15Z/
url https://access.redhat.com/errata/RHSA-2024:1251
56
reference_url https://access.redhat.com/errata/RHSA-2024:1253
reference_id RHSA-2024:1253
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:15Z/
url https://access.redhat.com/errata/RHSA-2024:1253
57
reference_url https://access.redhat.com/errata/RHSA-2024:1268
reference_id RHSA-2024:1268
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:15Z/
url https://access.redhat.com/errata/RHSA-2024:1268
58
reference_url https://access.redhat.com/errata/RHSA-2024:1269
reference_id RHSA-2024:1269
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:15Z/
url https://access.redhat.com/errata/RHSA-2024:1269
59
reference_url https://access.redhat.com/errata/RHSA-2024:1278
reference_id RHSA-2024:1278
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:15Z/
url https://access.redhat.com/errata/RHSA-2024:1278
60
reference_url https://access.redhat.com/errata/RHSA-2024:1306
reference_id RHSA-2024:1306
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:15Z/
url https://access.redhat.com/errata/RHSA-2024:1306
61
reference_url https://access.redhat.com/errata/RHSA-2024:1367
reference_id RHSA-2024:1367
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:15Z/
url https://access.redhat.com/errata/RHSA-2024:1367
62
reference_url https://access.redhat.com/errata/RHSA-2024:1368
reference_id RHSA-2024:1368
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:15Z/
url https://access.redhat.com/errata/RHSA-2024:1368
63
reference_url https://access.redhat.com/errata/RHSA-2024:1377
reference_id RHSA-2024:1377
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:15Z/
url https://access.redhat.com/errata/RHSA-2024:1377
64
reference_url https://access.redhat.com/errata/RHSA-2024:1382
reference_id RHSA-2024:1382
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:15Z/
url https://access.redhat.com/errata/RHSA-2024:1382
65
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:15Z/
url https://access.redhat.com/errata/RHSA-2024:1404
66
reference_url https://access.redhat.com/errata/RHSA-2024:2094
reference_id RHSA-2024:2094
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:15Z/
url https://access.redhat.com/errata/RHSA-2024:2094
67
reference_url https://usn.ubuntu.com/6639-1/
reference_id USN-6639-1
reference_type
scores
url https://usn.ubuntu.com/6639-1/
68
reference_url https://usn.ubuntu.com/6648-1/
reference_id USN-6648-1
reference_type
scores
url https://usn.ubuntu.com/6648-1/
69
reference_url https://usn.ubuntu.com/6648-2/
reference_id USN-6648-2
reference_type
scores
url https://usn.ubuntu.com/6648-2/
70
reference_url https://usn.ubuntu.com/6651-1/
reference_id USN-6651-1
reference_type
scores
url https://usn.ubuntu.com/6651-1/
71
reference_url https://usn.ubuntu.com/6651-2/
reference_id USN-6651-2
reference_type
scores
url https://usn.ubuntu.com/6651-2/
72
reference_url https://usn.ubuntu.com/6651-3/
reference_id USN-6651-3
reference_type
scores
url https://usn.ubuntu.com/6651-3/
73
reference_url https://usn.ubuntu.com/6652-1/
reference_id USN-6652-1
reference_type
scores
url https://usn.ubuntu.com/6652-1/
74
reference_url https://usn.ubuntu.com/6653-1/
reference_id USN-6653-1
reference_type
scores
url https://usn.ubuntu.com/6653-1/
75
reference_url https://usn.ubuntu.com/6653-2/
reference_id USN-6653-2
reference_type
scores
url https://usn.ubuntu.com/6653-2/
76
reference_url https://usn.ubuntu.com/6653-3/
reference_id USN-6653-3
reference_type
scores
url https://usn.ubuntu.com/6653-3/
77
reference_url https://usn.ubuntu.com/6653-4/
reference_id USN-6653-4
reference_type
scores
url https://usn.ubuntu.com/6653-4/
fixed_packages
aliases CVE-2024-0646
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wc2m-dsfh-qkaq
35
url VCID-wmdx-p5fr-yqe4
vulnerability_id VCID-wmdx-p5fr-yqe4
summary kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6931.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6931.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6931
reference_id
reference_type
scores
0
value 0.00437
scoring_system epss
scoring_elements 0.62987
published_at 2026-04-02T12:55:00Z
1
value 0.00437
scoring_system epss
scoring_elements 0.63016
published_at 2026-04-04T12:55:00Z
2
value 0.00437
scoring_system epss
scoring_elements 0.6298
published_at 2026-04-07T12:55:00Z
3
value 0.00437
scoring_system epss
scoring_elements 0.63031
published_at 2026-04-08T12:55:00Z
4
value 0.00437
scoring_system epss
scoring_elements 0.63047
published_at 2026-04-09T12:55:00Z
5
value 0.00437
scoring_system epss
scoring_elements 0.63064
published_at 2026-04-16T12:55:00Z
6
value 0.00437
scoring_system epss
scoring_elements 0.6305
published_at 2026-04-21T12:55:00Z
7
value 0.00437
scoring_system epss
scoring_elements 0.63028
published_at 2026-04-13T12:55:00Z
8
value 0.00437
scoring_system epss
scoring_elements 0.63072
published_at 2026-04-18T12:55:00Z
9
value 0.00437
scoring_system epss
scoring_elements 0.63071
published_at 2026-04-24T12:55:00Z
10
value 0.00437
scoring_system epss
scoring_elements 0.63085
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6931
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2252731
reference_id 2252731
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2252731
22
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
23
reference_url https://access.redhat.com/errata/RHSA-2024:1018
reference_id RHSA-2024:1018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1018
24
reference_url https://access.redhat.com/errata/RHSA-2024:1019
reference_id RHSA-2024:1019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1019
25
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
26
reference_url https://access.redhat.com/errata/RHSA-2024:1607
reference_id RHSA-2024:1607
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1607
27
reference_url https://access.redhat.com/errata/RHSA-2024:1614
reference_id RHSA-2024:1614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1614
28
reference_url https://access.redhat.com/errata/RHSA-2024:1836
reference_id RHSA-2024:1836
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1836
29
reference_url https://access.redhat.com/errata/RHSA-2024:1840
reference_id RHSA-2024:1840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1840
30
reference_url https://access.redhat.com/errata/RHSA-2024:2093
reference_id RHSA-2024:2093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2093
31
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
32
reference_url https://usn.ubuntu.com/6602-1/
reference_id USN-6602-1
reference_type
scores
url https://usn.ubuntu.com/6602-1/
33
reference_url https://usn.ubuntu.com/6603-1/
reference_id USN-6603-1
reference_type
scores
url https://usn.ubuntu.com/6603-1/
34
reference_url https://usn.ubuntu.com/6604-1/
reference_id USN-6604-1
reference_type
scores
url https://usn.ubuntu.com/6604-1/
35
reference_url https://usn.ubuntu.com/6604-2/
reference_id USN-6604-2
reference_type
scores
url https://usn.ubuntu.com/6604-2/
36
reference_url https://usn.ubuntu.com/6605-1/
reference_id USN-6605-1
reference_type
scores
url https://usn.ubuntu.com/6605-1/
37
reference_url https://usn.ubuntu.com/6605-2/
reference_id USN-6605-2
reference_type
scores
url https://usn.ubuntu.com/6605-2/
38
reference_url https://usn.ubuntu.com/6606-1/
reference_id USN-6606-1
reference_type
scores
url https://usn.ubuntu.com/6606-1/
39
reference_url https://usn.ubuntu.com/6607-1/
reference_id USN-6607-1
reference_type
scores
url https://usn.ubuntu.com/6607-1/
40
reference_url https://usn.ubuntu.com/6608-1/
reference_id USN-6608-1
reference_type
scores
url https://usn.ubuntu.com/6608-1/
41
reference_url https://usn.ubuntu.com/6608-2/
reference_id USN-6608-2
reference_type
scores
url https://usn.ubuntu.com/6608-2/
42
reference_url https://usn.ubuntu.com/6609-1/
reference_id USN-6609-1
reference_type
scores
url https://usn.ubuntu.com/6609-1/
43
reference_url https://usn.ubuntu.com/6609-2/
reference_id USN-6609-2
reference_type
scores
url https://usn.ubuntu.com/6609-2/
44
reference_url https://usn.ubuntu.com/6609-3/
reference_id USN-6609-3
reference_type
scores
url https://usn.ubuntu.com/6609-3/
45
reference_url https://usn.ubuntu.com/6628-1/
reference_id USN-6628-1
reference_type
scores
url https://usn.ubuntu.com/6628-1/
46
reference_url https://usn.ubuntu.com/6628-2/
reference_id USN-6628-2
reference_type
scores
url https://usn.ubuntu.com/6628-2/
47
reference_url https://usn.ubuntu.com/6635-1/
reference_id USN-6635-1
reference_type
scores
url https://usn.ubuntu.com/6635-1/
fixed_packages
aliases CVE-2023-6931
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wmdx-p5fr-yqe4
36
url VCID-wxfm-2u2z-euad
vulnerability_id VCID-wxfm-2u2z-euad
summary kernel: double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28388.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28388.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-28388
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01846
published_at 2026-04-26T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01781
published_at 2026-04-02T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01794
published_at 2026-04-07T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01797
published_at 2026-04-08T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.0181
published_at 2026-04-09T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01803
published_at 2026-04-11T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01793
published_at 2026-04-12T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.0179
published_at 2026-04-13T12:55:00Z
8
value 0.00012
scoring_system epss
scoring_elements 0.01779
published_at 2026-04-16T12:55:00Z
9
value 0.00012
scoring_system epss
scoring_elements 0.01777
published_at 2026-04-18T12:55:00Z
10
value 0.00012
scoring_system epss
scoring_elements 0.0186
published_at 2026-04-21T12:55:00Z
11
value 0.00012
scoring_system epss
scoring_elements 0.0185
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-28388
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
42
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
43
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2073091
reference_id 2073091
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2073091
44
reference_url https://github.com/torvalds/linux/commit/3d3925ff6433f98992685a9679613a2cc97f3ce2
reference_id 3d3925ff6433f98992685a9679613a2cc97f3ce2
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/
url https://github.com/torvalds/linux/commit/3d3925ff6433f98992685a9679613a2cc97f3ce2
45
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW/
reference_id 6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW/
46
reference_url https://security.archlinux.org/AVG-2698
reference_id AVG-2698
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2698
47
reference_url https://security.archlinux.org/AVG-2699
reference_id AVG-2699
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2699
48
reference_url https://security.archlinux.org/AVG-2700
reference_id AVG-2700
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2700
49
reference_url https://security.archlinux.org/AVG-2701
reference_id AVG-2701
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2701
50
reference_url https://www.debian.org/security/2022/dsa-5127
reference_id dsa-5127
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/
url https://www.debian.org/security/2022/dsa-5127
51
reference_url https://www.debian.org/security/2022/dsa-5173
reference_id dsa-5173
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/
url https://www.debian.org/security/2022/dsa-5173
52
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6/
reference_id LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6/
53
reference_url https://security.netapp.com/advisory/ntap-20220513-0001/
reference_id ntap-20220513-0001
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/
url https://security.netapp.com/advisory/ntap-20220513-0001/
54
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
55
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
56
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
57
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
58
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
59
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
60
reference_url https://usn.ubuntu.com/5416-1/
reference_id USN-5416-1
reference_type
scores
url https://usn.ubuntu.com/5416-1/
61
reference_url https://usn.ubuntu.com/5469-1/
reference_id USN-5469-1
reference_type
scores
url https://usn.ubuntu.com/5469-1/
62
reference_url https://usn.ubuntu.com/5493-1/
reference_id USN-5493-1
reference_type
scores
url https://usn.ubuntu.com/5493-1/
63
reference_url https://usn.ubuntu.com/5493-2/
reference_id USN-5493-2
reference_type
scores
url https://usn.ubuntu.com/5493-2/
64
reference_url https://usn.ubuntu.com/5505-1/
reference_id USN-5505-1
reference_type
scores
url https://usn.ubuntu.com/5505-1/
65
reference_url https://usn.ubuntu.com/5513-1/
reference_id USN-5513-1
reference_type
scores
url https://usn.ubuntu.com/5513-1/
66
reference_url https://usn.ubuntu.com/5539-1/
reference_id USN-5539-1
reference_type
scores
url https://usn.ubuntu.com/5539-1/
67
reference_url https://usn.ubuntu.com/5541-1/
reference_id USN-5541-1
reference_type
scores
url https://usn.ubuntu.com/5541-1/
68
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT/
reference_id XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT/
fixed_packages
aliases CVE-2022-28388
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wxfm-2u2z-euad
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-477.51.1%3Farch=el8_8