Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@4.18.0-372.80.1?arch=el8_6
Typerpm
Namespaceredhat
Namekernel
Version4.18.0-372.80.1
Qualifiers
arch el8_6
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-225u-cxd6-dqb5
vulnerability_id VCID-225u-cxd6-dqb5
summary kernel: media: dvbdev: adopts refcnt to avoid UAF
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50274.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50274.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50274
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02603
published_at 2026-04-02T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02617
published_at 2026-04-04T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02621
published_at 2026-04-07T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02625
published_at 2026-04-08T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02645
published_at 2026-04-09T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02495
published_at 2026-04-11T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02485
published_at 2026-04-12T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02483
published_at 2026-04-13T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02467
published_at 2026-04-16T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02473
published_at 2026-04-18T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.0258
published_at 2026-04-21T12:55:00Z
11
value 0.00014
scoring_system epss
scoring_elements 0.02568
published_at 2026-04-24T12:55:00Z
12
value 0.00014
scoring_system epss
scoring_elements 0.02557
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50274
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50274
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50274
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2395314
reference_id 2395314
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2395314
5
reference_url https://access.redhat.com/errata/RHSA-2023:7398
reference_id RHSA-2023:7398
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7398
6
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
fixed_packages
aliases CVE-2022-50274
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-225u-cxd6-dqb5
1
url VCID-ed7y-vzk5-53bs
vulnerability_id VCID-ed7y-vzk5-53bs
summary kernel: use-after-free due to race condition occurring in dvb_ca_en50221.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45919.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45919.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-45919
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05947
published_at 2026-04-26T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05736
published_at 2026-04-18T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.0588
published_at 2026-04-21T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05911
published_at 2026-04-24T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06044
published_at 2026-04-07T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06122
published_at 2026-04-09T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06113
published_at 2026-04-11T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06109
published_at 2026-04-12T12:55:00Z
8
value 0.00023
scoring_system epss
scoring_elements 0.06101
published_at 2026-04-13T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06064
published_at 2026-04-16T12:55:00Z
10
value 0.00023
scoring_system epss
scoring_elements 0.06084
published_at 2026-04-08T12:55:00Z
11
value 0.00023
scoring_system epss
scoring_elements 0.06024
published_at 2026-04-02T12:55:00Z
12
value 0.00023
scoring_system epss
scoring_elements 0.06059
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-45919
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45919
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2151956
reference_id 2151956
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2151956
5
reference_url https://access.redhat.com/errata/RHSA-2023:7398
reference_id RHSA-2023:7398
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7398
6
reference_url https://access.redhat.com/errata/RHSA-2023:7539
reference_id RHSA-2023:7539
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7539
7
reference_url https://access.redhat.com/errata/RHSA-2023:7548
reference_id RHSA-2023:7548
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7548
8
reference_url https://access.redhat.com/errata/RHSA-2023:7549
reference_id RHSA-2023:7549
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7549
9
reference_url https://usn.ubuntu.com/6412-1/
reference_id USN-6412-1
reference_type
scores
url https://usn.ubuntu.com/6412-1/
10
reference_url https://usn.ubuntu.com/6466-1/
reference_id USN-6466-1
reference_type
scores
url https://usn.ubuntu.com/6466-1/
fixed_packages
aliases CVE-2022-45919
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ed7y-vzk5-53bs
2
url VCID-fzyb-pezt-bkbt
vulnerability_id VCID-fzyb-pezt-bkbt
summary kernel: use-after-free due to race condition occurring in dvb_register_device()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45884.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45884.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-45884
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04141
published_at 2026-04-02T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.0416
published_at 2026-04-04T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.03966
published_at 2026-04-07T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.03971
published_at 2026-04-08T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.03996
published_at 2026-04-09T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.03965
published_at 2026-04-11T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.03948
published_at 2026-04-12T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.03918
published_at 2026-04-13T12:55:00Z
8
value 0.00019
scoring_system epss
scoring_elements 0.05248
published_at 2026-04-26T12:55:00Z
9
value 0.00019
scoring_system epss
scoring_elements 0.04834
published_at 2026-04-16T12:55:00Z
10
value 0.00019
scoring_system epss
scoring_elements 0.04842
published_at 2026-04-18T12:55:00Z
11
value 0.00019
scoring_system epss
scoring_elements 0.0518
published_at 2026-04-21T12:55:00Z
12
value 0.00019
scoring_system epss
scoring_elements 0.05205
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-45884
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45884
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2148510
reference_id 2148510
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2148510
5
reference_url https://access.redhat.com/errata/RHSA-2023:7398
reference_id RHSA-2023:7398
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7398
6
reference_url https://access.redhat.com/errata/RHSA-2023:7539
reference_id RHSA-2023:7539
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7539
7
reference_url https://access.redhat.com/errata/RHSA-2023:7548
reference_id RHSA-2023:7548
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7548
8
reference_url https://access.redhat.com/errata/RHSA-2023:7549
reference_id RHSA-2023:7549
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7549
fixed_packages
aliases CVE-2022-45884
risk_score 2.9
exploitability 0.5
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fzyb-pezt-bkbt
3
url VCID-j6td-3edb-rugg
vulnerability_id VCID-j6td-3edb-rugg
summary kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3776.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3776.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3776
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.11971
published_at 2026-04-26T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.12111
published_at 2026-04-02T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.12157
published_at 2026-04-04T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.11961
published_at 2026-04-07T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.12044
published_at 2026-04-08T12:55:00Z
5
value 0.0004
scoring_system epss
scoring_elements 0.12096
published_at 2026-04-09T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.12103
published_at 2026-04-11T12:55:00Z
7
value 0.0004
scoring_system epss
scoring_elements 0.12067
published_at 2026-04-12T12:55:00Z
8
value 0.0004
scoring_system epss
scoring_elements 0.12037
published_at 2026-04-13T12:55:00Z
9
value 0.0004
scoring_system epss
scoring_elements 0.11909
published_at 2026-04-16T12:55:00Z
10
value 0.0004
scoring_system epss
scoring_elements 0.11905
published_at 2026-04-18T12:55:00Z
11
value 0.0004
scoring_system epss
scoring_elements 0.12025
published_at 2026-04-21T12:55:00Z
12
value 0.0004
scoring_system epss
scoring_elements 0.12002
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3776
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
33
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
34
reference_url https://kernel.dance/0323bce598eea038714f941ce2b22541c46d488f
reference_id 0323bce598eea038714f941ce2b22541c46d488f
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:21Z/
url https://kernel.dance/0323bce598eea038714f941ce2b22541c46d488f
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2225097
reference_id 2225097
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2225097
36
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=0323bce598eea038714f941ce2b22541c46d488f
reference_id commit?id=0323bce598eea038714f941ce2b22541c46d488f
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:21Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=0323bce598eea038714f941ce2b22541c46d488f
37
reference_url https://www.debian.org/security/2023/dsa-5480
reference_id dsa-5480
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:21Z/
url https://www.debian.org/security/2023/dsa-5480
38
reference_url https://www.debian.org/security/2023/dsa-5492
reference_id dsa-5492
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:21Z/
url https://www.debian.org/security/2023/dsa-5492
39
reference_url http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
reference_id Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:21Z/
url http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
40
reference_url http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
reference_id Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:21Z/
url http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
41
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
reference_id msg00004.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:21Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
42
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:21Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
43
reference_url https://security.netapp.com/advisory/ntap-20240202-0003/
reference_id ntap-20240202-0003
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:21Z/
url https://security.netapp.com/advisory/ntap-20240202-0003/
44
reference_url https://access.redhat.com/errata/RHSA-2023:5069
reference_id RHSA-2023:5069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5069
45
reference_url https://access.redhat.com/errata/RHSA-2023:5091
reference_id RHSA-2023:5091
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5091
46
reference_url https://access.redhat.com/errata/RHSA-2023:5093
reference_id RHSA-2023:5093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5093
47
reference_url https://access.redhat.com/errata/RHSA-2023:5221
reference_id RHSA-2023:5221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5221
48
reference_url https://access.redhat.com/errata/RHSA-2023:5244
reference_id RHSA-2023:5244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5244
49
reference_url https://access.redhat.com/errata/RHSA-2023:5255
reference_id RHSA-2023:5255
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5255
50
reference_url https://access.redhat.com/errata/RHSA-2023:5628
reference_id RHSA-2023:5628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5628
51
reference_url https://access.redhat.com/errata/RHSA-2023:5775
reference_id RHSA-2023:5775
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5775
52
reference_url https://access.redhat.com/errata/RHSA-2023:5794
reference_id RHSA-2023:5794
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5794
53
reference_url https://access.redhat.com/errata/RHSA-2023:6799
reference_id RHSA-2023:6799
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6799
54
reference_url https://access.redhat.com/errata/RHSA-2023:6813
reference_id RHSA-2023:6813
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6813
55
reference_url https://access.redhat.com/errata/RHSA-2023:7294
reference_id RHSA-2023:7294
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7294
56
reference_url https://access.redhat.com/errata/RHSA-2023:7382
reference_id RHSA-2023:7382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7382
57
reference_url https://access.redhat.com/errata/RHSA-2023:7389
reference_id RHSA-2023:7389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7389
58
reference_url https://access.redhat.com/errata/RHSA-2023:7398
reference_id RHSA-2023:7398
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7398
59
reference_url https://access.redhat.com/errata/RHSA-2023:7410
reference_id RHSA-2023:7410
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7410
60
reference_url https://access.redhat.com/errata/RHSA-2023:7411
reference_id RHSA-2023:7411
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7411
61
reference_url https://access.redhat.com/errata/RHSA-2023:7417
reference_id RHSA-2023:7417
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7417
62
reference_url https://access.redhat.com/errata/RHSA-2023:7419
reference_id RHSA-2023:7419
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7419
63
reference_url https://access.redhat.com/errata/RHSA-2023:7423
reference_id RHSA-2023:7423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7423
64
reference_url https://access.redhat.com/errata/RHSA-2023:7424
reference_id RHSA-2023:7424
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7424
65
reference_url https://access.redhat.com/errata/RHSA-2023:7431
reference_id RHSA-2023:7431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7431
66
reference_url https://access.redhat.com/errata/RHSA-2023:7434
reference_id RHSA-2023:7434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7434
67
reference_url https://access.redhat.com/errata/RHSA-2024:0262
reference_id RHSA-2024:0262
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0262
68
reference_url https://access.redhat.com/errata/RHSA-2024:1831
reference_id RHSA-2024:1831
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1831
69
reference_url https://usn.ubuntu.com/6285-1/
reference_id USN-6285-1
reference_type
scores
url https://usn.ubuntu.com/6285-1/
70
reference_url https://usn.ubuntu.com/6309-1/
reference_id USN-6309-1
reference_type
scores
url https://usn.ubuntu.com/6309-1/
71
reference_url https://usn.ubuntu.com/6315-1/
reference_id USN-6315-1
reference_type
scores
url https://usn.ubuntu.com/6315-1/
72
reference_url https://usn.ubuntu.com/6317-1/
reference_id USN-6317-1
reference_type
scores
url https://usn.ubuntu.com/6317-1/
73
reference_url https://usn.ubuntu.com/6318-1/
reference_id USN-6318-1
reference_type
scores
url https://usn.ubuntu.com/6318-1/
74
reference_url https://usn.ubuntu.com/6321-1/
reference_id USN-6321-1
reference_type
scores
url https://usn.ubuntu.com/6321-1/
75
reference_url https://usn.ubuntu.com/6324-1/
reference_id USN-6324-1
reference_type
scores
url https://usn.ubuntu.com/6324-1/
76
reference_url https://usn.ubuntu.com/6325-1/
reference_id USN-6325-1
reference_type
scores
url https://usn.ubuntu.com/6325-1/
77
reference_url https://usn.ubuntu.com/6327-1/
reference_id USN-6327-1
reference_type
scores
url https://usn.ubuntu.com/6327-1/
78
reference_url https://usn.ubuntu.com/6328-1/
reference_id USN-6328-1
reference_type
scores
url https://usn.ubuntu.com/6328-1/
79
reference_url https://usn.ubuntu.com/6329-1/
reference_id USN-6329-1
reference_type
scores
url https://usn.ubuntu.com/6329-1/
80
reference_url https://usn.ubuntu.com/6330-1/
reference_id USN-6330-1
reference_type
scores
url https://usn.ubuntu.com/6330-1/
81
reference_url https://usn.ubuntu.com/6331-1/
reference_id USN-6331-1
reference_type
scores
url https://usn.ubuntu.com/6331-1/
82
reference_url https://usn.ubuntu.com/6332-1/
reference_id USN-6332-1
reference_type
scores
url https://usn.ubuntu.com/6332-1/
83
reference_url https://usn.ubuntu.com/6341-1/
reference_id USN-6341-1
reference_type
scores
url https://usn.ubuntu.com/6341-1/
84
reference_url https://usn.ubuntu.com/6342-1/
reference_id USN-6342-1
reference_type
scores
url https://usn.ubuntu.com/6342-1/
85
reference_url https://usn.ubuntu.com/6342-2/
reference_id USN-6342-2
reference_type
scores
url https://usn.ubuntu.com/6342-2/
86
reference_url https://usn.ubuntu.com/6346-1/
reference_id USN-6346-1
reference_type
scores
url https://usn.ubuntu.com/6346-1/
87
reference_url https://usn.ubuntu.com/6348-1/
reference_id USN-6348-1
reference_type
scores
url https://usn.ubuntu.com/6348-1/
88
reference_url https://usn.ubuntu.com/6357-1/
reference_id USN-6357-1
reference_type
scores
url https://usn.ubuntu.com/6357-1/
89
reference_url https://usn.ubuntu.com/6385-1/
reference_id USN-6385-1
reference_type
scores
url https://usn.ubuntu.com/6385-1/
90
reference_url https://usn.ubuntu.com/6397-1/
reference_id USN-6397-1
reference_type
scores
url https://usn.ubuntu.com/6397-1/
fixed_packages
aliases CVE-2023-3776
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j6td-3edb-rugg
4
url VCID-kz9r-zumw-5ydf
vulnerability_id VCID-kz9r-zumw-5ydf
summary kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3609.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3609.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3609
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.0215
published_at 2026-04-09T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02144
published_at 2026-04-26T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.02153
published_at 2026-04-24T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02112
published_at 2026-04-12T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02137
published_at 2026-04-04T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02133
published_at 2026-04-07T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02132
published_at 2026-04-08T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02127
published_at 2026-04-11T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.02185
published_at 2026-04-21T12:55:00Z
9
value 0.00013
scoring_system epss
scoring_elements 0.02097
published_at 2026-04-18T12:55:00Z
10
value 0.00013
scoring_system epss
scoring_elements 0.02084
published_at 2026-04-16T12:55:00Z
11
value 0.00013
scoring_system epss
scoring_elements 0.02131
published_at 2026-04-02T12:55:00Z
12
value 0.00013
scoring_system epss
scoring_elements 0.02108
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3609
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
33
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
34
reference_url https://kernel.dance/04c55383fa5689357bcdd2c8036725a55ed632bc
reference_id 04c55383fa5689357bcdd2c8036725a55ed632bc
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:26Z/
url https://kernel.dance/04c55383fa5689357bcdd2c8036725a55ed632bc
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2225201
reference_id 2225201
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2225201
36
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=04c55383fa5689357bcdd2c8036725a55ed632bc
reference_id commit?id=04c55383fa5689357bcdd2c8036725a55ed632bc
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:26Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=04c55383fa5689357bcdd2c8036725a55ed632bc
37
reference_url https://www.debian.org/security/2023/dsa-5480
reference_id dsa-5480
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:26Z/
url https://www.debian.org/security/2023/dsa-5480
38
reference_url http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
reference_id Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:26Z/
url http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
39
reference_url http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
reference_id Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:26Z/
url http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
40
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
reference_id msg00004.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:26Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
41
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:26Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
42
reference_url https://security.netapp.com/advisory/ntap-20230818-0005/
reference_id ntap-20230818-0005
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:26Z/
url https://security.netapp.com/advisory/ntap-20230818-0005/
43
reference_url https://access.redhat.com/errata/RHSA-2023:5574
reference_id RHSA-2023:5574
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5574
44
reference_url https://access.redhat.com/errata/RHSA-2023:5621
reference_id RHSA-2023:5621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5621
45
reference_url https://access.redhat.com/errata/RHSA-2023:5622
reference_id RHSA-2023:5622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5622
46
reference_url https://access.redhat.com/errata/RHSA-2023:5628
reference_id RHSA-2023:5628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5628
47
reference_url https://access.redhat.com/errata/RHSA-2023:5775
reference_id RHSA-2023:5775
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5775
48
reference_url https://access.redhat.com/errata/RHSA-2023:5794
reference_id RHSA-2023:5794
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5794
49
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
50
reference_url https://access.redhat.com/errata/RHSA-2023:6799
reference_id RHSA-2023:6799
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6799
51
reference_url https://access.redhat.com/errata/RHSA-2023:6813
reference_id RHSA-2023:6813
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6813
52
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
53
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
54
reference_url https://access.redhat.com/errata/RHSA-2023:7294
reference_id RHSA-2023:7294
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7294
55
reference_url https://access.redhat.com/errata/RHSA-2023:7370
reference_id RHSA-2023:7370
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7370
56
reference_url https://access.redhat.com/errata/RHSA-2023:7379
reference_id RHSA-2023:7379
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7379
57
reference_url https://access.redhat.com/errata/RHSA-2023:7398
reference_id RHSA-2023:7398
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7398
58
reference_url https://access.redhat.com/errata/RHSA-2023:7410
reference_id RHSA-2023:7410
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7410
59
reference_url https://access.redhat.com/errata/RHSA-2023:7417
reference_id RHSA-2023:7417
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7417
60
reference_url https://access.redhat.com/errata/RHSA-2023:7418
reference_id RHSA-2023:7418
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7418
61
reference_url https://access.redhat.com/errata/RHSA-2023:7431
reference_id RHSA-2023:7431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7431
62
reference_url https://access.redhat.com/errata/RHSA-2023:7434
reference_id RHSA-2023:7434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7434
63
reference_url https://access.redhat.com/errata/RHSA-2023:7539
reference_id RHSA-2023:7539
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7539
64
reference_url https://access.redhat.com/errata/RHSA-2023:7558
reference_id RHSA-2023:7558
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7558
65
reference_url https://access.redhat.com/errata/RHSA-2024:0999
reference_id RHSA-2024:0999
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0999
66
reference_url https://access.redhat.com/errata/RHSA-2024:1250
reference_id RHSA-2024:1250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1250
67
reference_url https://access.redhat.com/errata/RHSA-2024:1253
reference_id RHSA-2024:1253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1253
68
reference_url https://access.redhat.com/errata/RHSA-2024:1306
reference_id RHSA-2024:1306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1306
69
reference_url https://usn.ubuntu.com/6285-1/
reference_id USN-6285-1
reference_type
scores
url https://usn.ubuntu.com/6285-1/
70
reference_url https://usn.ubuntu.com/6315-1/
reference_id USN-6315-1
reference_type
scores
url https://usn.ubuntu.com/6315-1/
71
reference_url https://usn.ubuntu.com/6317-1/
reference_id USN-6317-1
reference_type
scores
url https://usn.ubuntu.com/6317-1/
72
reference_url https://usn.ubuntu.com/6318-1/
reference_id USN-6318-1
reference_type
scores
url https://usn.ubuntu.com/6318-1/
73
reference_url https://usn.ubuntu.com/6321-1/
reference_id USN-6321-1
reference_type
scores
url https://usn.ubuntu.com/6321-1/
74
reference_url https://usn.ubuntu.com/6324-1/
reference_id USN-6324-1
reference_type
scores
url https://usn.ubuntu.com/6324-1/
75
reference_url https://usn.ubuntu.com/6325-1/
reference_id USN-6325-1
reference_type
scores
url https://usn.ubuntu.com/6325-1/
76
reference_url https://usn.ubuntu.com/6328-1/
reference_id USN-6328-1
reference_type
scores
url https://usn.ubuntu.com/6328-1/
77
reference_url https://usn.ubuntu.com/6329-1/
reference_id USN-6329-1
reference_type
scores
url https://usn.ubuntu.com/6329-1/
78
reference_url https://usn.ubuntu.com/6330-1/
reference_id USN-6330-1
reference_type
scores
url https://usn.ubuntu.com/6330-1/
79
reference_url https://usn.ubuntu.com/6331-1/
reference_id USN-6331-1
reference_type
scores
url https://usn.ubuntu.com/6331-1/
80
reference_url https://usn.ubuntu.com/6332-1/
reference_id USN-6332-1
reference_type
scores
url https://usn.ubuntu.com/6332-1/
81
reference_url https://usn.ubuntu.com/6346-1/
reference_id USN-6346-1
reference_type
scores
url https://usn.ubuntu.com/6346-1/
82
reference_url https://usn.ubuntu.com/6348-1/
reference_id USN-6348-1
reference_type
scores
url https://usn.ubuntu.com/6348-1/
83
reference_url https://usn.ubuntu.com/6357-1/
reference_id USN-6357-1
reference_type
scores
url https://usn.ubuntu.com/6357-1/
84
reference_url https://usn.ubuntu.com/6385-1/
reference_id USN-6385-1
reference_type
scores
url https://usn.ubuntu.com/6385-1/
85
reference_url https://usn.ubuntu.com/6397-1/
reference_id USN-6397-1
reference_type
scores
url https://usn.ubuntu.com/6397-1/
fixed_packages
aliases CVE-2023-3609
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kz9r-zumw-5ydf
5
url VCID-nsv2-4qub-93dd
vulnerability_id VCID-nsv2-4qub-93dd
summary kernel: sctp: handle the error returned from sctp_auth_asoc_init_active_key
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50243.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50243.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50243
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.0312
published_at 2026-04-07T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03125
published_at 2026-04-08T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.0315
published_at 2026-04-09T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03107
published_at 2026-04-02T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.04164
published_at 2026-04-18T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.0429
published_at 2026-04-21T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.04303
published_at 2026-04-24T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.04323
published_at 2026-04-26T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.04225
published_at 2026-04-11T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.0421
published_at 2026-04-12T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.04186
published_at 2026-04-13T12:55:00Z
11
value 0.00017
scoring_system epss
scoring_elements 0.04156
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50243
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50243
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2395428
reference_id 2395428
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2395428
5
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
6
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
7
reference_url https://access.redhat.com/errata/RHSA-2023:7398
reference_id RHSA-2023:7398
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7398
fixed_packages
aliases CVE-2022-50243
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nsv2-4qub-93dd
6
url VCID-pq7v-b14b-tuhv
vulnerability_id VCID-pq7v-b14b-tuhv
summary Kernel: NULL pointer dereference problem in sctp_sched_dequeue_common
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2177.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2177.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2177
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01455
published_at 2026-04-26T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01443
published_at 2026-04-21T12:55:00Z
2
value 0.00011
scoring_system epss
scoring_elements 0.01451
published_at 2026-04-24T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01463
published_at 2026-04-02T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01466
published_at 2026-04-12T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01472
published_at 2026-04-11T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01477
published_at 2026-04-08T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.01479
published_at 2026-04-09T12:55:00Z
8
value 0.00012
scoring_system epss
scoring_elements 0.01468
published_at 2026-04-13T12:55:00Z
9
value 0.00012
scoring_system epss
scoring_elements 0.01456
published_at 2026-04-16T12:55:00Z
10
value 0.00012
scoring_system epss
scoring_elements 0.01471
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2177
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2177
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2187953
reference_id 2187953
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2187953
5
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=181d8d2066c0
reference_id ?id=181d8d2066c0
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:09Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=181d8d2066c0
6
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
7
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
8
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
9
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
10
reference_url https://access.redhat.com/errata/RHSA-2023:7398
reference_id RHSA-2023:7398
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7398
fixed_packages
aliases CVE-2023-2177
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pq7v-b14b-tuhv
7
url VCID-srrf-b9jk-5uge
vulnerability_id VCID-srrf-b9jk-5uge
summary kernel: use-after-free due to race condition occurring in dvb_net.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45886.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45886.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-45886
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05382
published_at 2026-04-26T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05148
published_at 2026-04-16T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05151
published_at 2026-04-18T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05303
published_at 2026-04-21T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05341
published_at 2026-04-24T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05617
published_at 2026-04-09T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05588
published_at 2026-04-11T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05578
published_at 2026-04-12T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.0557
published_at 2026-04-13T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.05592
published_at 2026-04-08T12:55:00Z
10
value 0.00021
scoring_system epss
scoring_elements 0.0552
published_at 2026-04-02T12:55:00Z
11
value 0.00021
scoring_system epss
scoring_elements 0.05555
published_at 2026-04-04T12:55:00Z
12
value 0.00021
scoring_system epss
scoring_elements 0.05554
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-45886
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45886
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2148517
reference_id 2148517
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2148517
5
reference_url https://access.redhat.com/errata/RHSA-2023:7398
reference_id RHSA-2023:7398
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7398
6
reference_url https://access.redhat.com/errata/RHSA-2023:7539
reference_id RHSA-2023:7539
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7539
7
reference_url https://access.redhat.com/errata/RHSA-2023:7548
reference_id RHSA-2023:7548
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7548
8
reference_url https://access.redhat.com/errata/RHSA-2023:7549
reference_id RHSA-2023:7549
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7549
9
reference_url https://usn.ubuntu.com/6412-1/
reference_id USN-6412-1
reference_type
scores
url https://usn.ubuntu.com/6412-1/
10
reference_url https://usn.ubuntu.com/6466-1/
reference_id USN-6466-1
reference_type
scores
url https://usn.ubuntu.com/6466-1/
fixed_packages
aliases CVE-2022-45886
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-srrf-b9jk-5uge
Fixing_vulnerabilities
Risk_score3.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-372.80.1%3Farch=el8_6