Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@5.14.0-70.85.1?arch=el9_0
Typerpm
Namespaceredhat
Namekernel
Version5.14.0-70.85.1
Qualifiers
arch el9_0
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-3nwm-cb6f-vkbv
vulnerability_id VCID-3nwm-cb6f-vkbv
summary kernel: null-ptr-deref vulnerabilities in sl_tx_timeout in drivers/net/slip
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41858.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41858.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-41858
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02761
published_at 2026-04-02T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02843
published_at 2026-04-26T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02754
published_at 2026-04-13T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02738
published_at 2026-04-16T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.0275
published_at 2026-04-18T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02861
published_at 2026-04-21T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02855
published_at 2026-04-24T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02776
published_at 2026-04-04T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02783
published_at 2026-04-07T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02787
published_at 2026-04-08T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02806
published_at 2026-04-09T12:55:00Z
11
value 0.00014
scoring_system epss
scoring_elements 0.02777
published_at 2026-04-11T12:55:00Z
12
value 0.00014
scoring_system epss
scoring_elements 0.02758
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-41858
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41858
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2144379
reference_id 2144379
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2144379
5
reference_url https://github.com/torvalds/linux/commit/ec4eb8a86ade4d22633e1da2a7d85a846b7d1798
reference_id ec4eb8a86ade4d22633e1da2a7d85a846b7d1798
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-07T16:46:04Z/
url https://github.com/torvalds/linux/commit/ec4eb8a86ade4d22633e1da2a7d85a846b7d1798
6
reference_url https://security.netapp.com/advisory/ntap-20230223-0006/
reference_id ntap-20230223-0006
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-07T16:46:04Z/
url https://security.netapp.com/advisory/ntap-20230223-0006/
7
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
8
reference_url https://access.redhat.com/errata/RHSA-2024:0431
reference_id RHSA-2024:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0431
9
reference_url https://access.redhat.com/errata/RHSA-2024:0432
reference_id RHSA-2024:0432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0432
10
reference_url https://access.redhat.com/errata/RHSA-2024:0439
reference_id RHSA-2024:0439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0439
11
reference_url https://access.redhat.com/errata/RHSA-2024:0448
reference_id RHSA-2024:0448
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0448
12
reference_url https://access.redhat.com/errata/RHSA-2024:0461
reference_id RHSA-2024:0461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0461
13
reference_url https://access.redhat.com/errata/RHSA-2024:0881
reference_id RHSA-2024:0881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0881
14
reference_url https://access.redhat.com/errata/RHSA-2024:0897
reference_id RHSA-2024:0897
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0897
15
reference_url https://access.redhat.com/errata/RHSA-2024:1268
reference_id RHSA-2024:1268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1268
16
reference_url https://access.redhat.com/errata/RHSA-2024:1269
reference_id RHSA-2024:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1269
17
reference_url https://access.redhat.com/errata/RHSA-2024:1367
reference_id RHSA-2024:1367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1367
18
reference_url https://access.redhat.com/errata/RHSA-2024:1382
reference_id RHSA-2024:1382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1382
19
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
20
reference_url https://usn.ubuntu.com/5884-1/
reference_id USN-5884-1
reference_type
scores
url https://usn.ubuntu.com/5884-1/
21
reference_url https://usn.ubuntu.com/5926-1/
reference_id USN-5926-1
reference_type
scores
url https://usn.ubuntu.com/5926-1/
fixed_packages
aliases CVE-2022-41858
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3nwm-cb6f-vkbv
1
url VCID-6jc4-7c8b-4bhv
vulnerability_id VCID-6jc4-7c8b-4bhv
summary kernel: use-after-free caused by invalid pointer hostname in fs/cifs/connect.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1195.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1195.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1195
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04075
published_at 2026-04-02T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04221
published_at 2026-04-26T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04069
published_at 2026-04-18T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.0419
published_at 2026-04-21T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.04202
published_at 2026-04-24T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.04093
published_at 2026-04-04T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.04108
published_at 2026-04-07T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.04113
published_at 2026-04-08T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.04132
published_at 2026-04-09T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.04116
published_at 2026-04-11T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.04102
published_at 2026-04-12T12:55:00Z
11
value 0.00017
scoring_system epss
scoring_elements 0.04076
published_at 2026-04-13T12:55:00Z
12
value 0.00017
scoring_system epss
scoring_elements 0.04058
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1195
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/torvalds/linux/commit/153695d36ead0ccc4d0256953c751cabf673e621
reference_id 153695d36ead0ccc4d0256953c751cabf673e621
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:57Z/
url https://github.com/torvalds/linux/commit/153695d36ead0ccc4d0256953c751cabf673e621
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2154171
reference_id 2154171
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2154171
5
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
6
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
7
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
8
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
9
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
10
reference_url https://access.redhat.com/errata/RHSA-2024:0431
reference_id RHSA-2024:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0431
11
reference_url https://access.redhat.com/errata/RHSA-2024:0432
reference_id RHSA-2024:0432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0432
12
reference_url https://usn.ubuntu.com/5970-1/
reference_id USN-5970-1
reference_type
scores
url https://usn.ubuntu.com/5970-1/
13
reference_url https://usn.ubuntu.com/5979-1/
reference_id USN-5979-1
reference_type
scores
url https://usn.ubuntu.com/5979-1/
fixed_packages
aliases CVE-2023-1195
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6jc4-7c8b-4bhv
2
url VCID-b7em-hmb3-4yhp
vulnerability_id VCID-b7em-hmb3-4yhp
summary kernel: IGB driver inadequate buffer size for frames larger than MTU
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45871.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45871.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-45871
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.06835
published_at 2026-04-02T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.06883
published_at 2026-04-04T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06868
published_at 2026-04-07T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.06922
published_at 2026-04-08T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.06953
published_at 2026-04-09T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.06951
published_at 2026-04-11T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.06944
published_at 2026-04-12T12:55:00Z
7
value 0.00025
scoring_system epss
scoring_elements 0.0694
published_at 2026-04-13T12:55:00Z
8
value 0.00025
scoring_system epss
scoring_elements 0.06875
published_at 2026-04-16T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.06858
published_at 2026-04-18T12:55:00Z
10
value 0.00025
scoring_system epss
scoring_elements 0.07001
published_at 2026-04-21T12:55:00Z
11
value 0.00025
scoring_system epss
scoring_elements 0.06989
published_at 2026-04-24T12:55:00Z
12
value 0.00025
scoring_system epss
scoring_elements 0.06992
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-45871
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45871
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45871
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2244723
reference_id 2244723
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2244723
5
reference_url https://access.redhat.com/errata/RHSA-2023:7734
reference_id RHSA-2023:7734
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7734
6
reference_url https://access.redhat.com/errata/RHSA-2023:7749
reference_id RHSA-2023:7749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7749
7
reference_url https://access.redhat.com/errata/RHSA-2024:0378
reference_id RHSA-2024:0378
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0378
8
reference_url https://access.redhat.com/errata/RHSA-2024:0381
reference_id RHSA-2024:0381
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0381
9
reference_url https://access.redhat.com/errata/RHSA-2024:0386
reference_id RHSA-2024:0386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0386
10
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
11
reference_url https://access.redhat.com/errata/RHSA-2024:0431
reference_id RHSA-2024:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0431
12
reference_url https://access.redhat.com/errata/RHSA-2024:0432
reference_id RHSA-2024:0432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0432
13
reference_url https://access.redhat.com/errata/RHSA-2024:0439
reference_id RHSA-2024:0439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0439
14
reference_url https://access.redhat.com/errata/RHSA-2024:0448
reference_id RHSA-2024:0448
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0448
15
reference_url https://access.redhat.com/errata/RHSA-2024:0554
reference_id RHSA-2024:0554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0554
16
reference_url https://access.redhat.com/errata/RHSA-2024:0562
reference_id RHSA-2024:0562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0562
17
reference_url https://access.redhat.com/errata/RHSA-2024:0563
reference_id RHSA-2024:0563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0563
18
reference_url https://access.redhat.com/errata/RHSA-2024:0575
reference_id RHSA-2024:0575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0575
19
reference_url https://access.redhat.com/errata/RHSA-2024:0593
reference_id RHSA-2024:0593
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0593
20
reference_url https://access.redhat.com/errata/RHSA-2024:0876
reference_id RHSA-2024:0876
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0876
21
reference_url https://access.redhat.com/errata/RHSA-2024:0881
reference_id RHSA-2024:0881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0881
22
reference_url https://access.redhat.com/errata/RHSA-2024:0897
reference_id RHSA-2024:0897
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0897
23
reference_url https://access.redhat.com/errata/RHSA-2024:0980
reference_id RHSA-2024:0980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0980
24
reference_url https://access.redhat.com/errata/RHSA-2024:0999
reference_id RHSA-2024:0999
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0999
25
reference_url https://access.redhat.com/errata/RHSA-2024:1249
reference_id RHSA-2024:1249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1249
26
reference_url https://access.redhat.com/errata/RHSA-2024:1268
reference_id RHSA-2024:1268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1268
27
reference_url https://access.redhat.com/errata/RHSA-2024:1269
reference_id RHSA-2024:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1269
28
reference_url https://access.redhat.com/errata/RHSA-2024:1278
reference_id RHSA-2024:1278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1278
29
reference_url https://access.redhat.com/errata/RHSA-2024:1323
reference_id RHSA-2024:1323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1323
30
reference_url https://access.redhat.com/errata/RHSA-2024:1332
reference_id RHSA-2024:1332
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1332
31
reference_url https://usn.ubuntu.com/6494-1/
reference_id USN-6494-1
reference_type
scores
url https://usn.ubuntu.com/6494-1/
32
reference_url https://usn.ubuntu.com/6494-2/
reference_id USN-6494-2
reference_type
scores
url https://usn.ubuntu.com/6494-2/
33
reference_url https://usn.ubuntu.com/6495-1/
reference_id USN-6495-1
reference_type
scores
url https://usn.ubuntu.com/6495-1/
34
reference_url https://usn.ubuntu.com/6495-2/
reference_id USN-6495-2
reference_type
scores
url https://usn.ubuntu.com/6495-2/
35
reference_url https://usn.ubuntu.com/6496-1/
reference_id USN-6496-1
reference_type
scores
url https://usn.ubuntu.com/6496-1/
36
reference_url https://usn.ubuntu.com/6496-2/
reference_id USN-6496-2
reference_type
scores
url https://usn.ubuntu.com/6496-2/
37
reference_url https://usn.ubuntu.com/6502-1/
reference_id USN-6502-1
reference_type
scores
url https://usn.ubuntu.com/6502-1/
38
reference_url https://usn.ubuntu.com/6502-2/
reference_id USN-6502-2
reference_type
scores
url https://usn.ubuntu.com/6502-2/
39
reference_url https://usn.ubuntu.com/6502-3/
reference_id USN-6502-3
reference_type
scores
url https://usn.ubuntu.com/6502-3/
40
reference_url https://usn.ubuntu.com/6502-4/
reference_id USN-6502-4
reference_type
scores
url https://usn.ubuntu.com/6502-4/
41
reference_url https://usn.ubuntu.com/6516-1/
reference_id USN-6516-1
reference_type
scores
url https://usn.ubuntu.com/6516-1/
42
reference_url https://usn.ubuntu.com/6520-1/
reference_id USN-6520-1
reference_type
scores
url https://usn.ubuntu.com/6520-1/
43
reference_url https://usn.ubuntu.com/6532-1/
reference_id USN-6532-1
reference_type
scores
url https://usn.ubuntu.com/6532-1/
fixed_packages
aliases CVE-2023-45871
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b7em-hmb3-4yhp
3
url VCID-j4xv-b39v-kfdn
vulnerability_id VCID-j4xv-b39v-kfdn
summary kernel: use-after-free in netfilter: nf_tables
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3777.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3777.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3777
reference_id
reference_type
scores
0
value 0.00041
scoring_system epss
scoring_elements 0.12417
published_at 2026-04-26T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.12332
published_at 2026-04-18T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12445
published_at 2026-04-21T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12451
published_at 2026-04-24T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.18518
published_at 2026-04-07T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.18651
published_at 2026-04-09T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.18655
published_at 2026-04-11T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.18608
published_at 2026-04-12T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.18557
published_at 2026-04-13T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.18501
published_at 2026-04-16T12:55:00Z
10
value 0.00059
scoring_system epss
scoring_elements 0.18598
published_at 2026-04-08T12:55:00Z
11
value 0.00059
scoring_system epss
scoring_elements 0.18747
published_at 2026-04-02T12:55:00Z
12
value 0.00059
scoring_system epss
scoring_elements 0.18801
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3777
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3777
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2237750
reference_id 2237750
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2237750
5
reference_url https://access.redhat.com/errata/RHSA-2024:0431
reference_id RHSA-2024:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0431
6
reference_url https://access.redhat.com/errata/RHSA-2024:0432
reference_id RHSA-2024:0432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0432
7
reference_url https://access.redhat.com/errata/RHSA-2024:0439
reference_id RHSA-2024:0439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0439
8
reference_url https://access.redhat.com/errata/RHSA-2024:0448
reference_id RHSA-2024:0448
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0448
9
reference_url https://access.redhat.com/errata/RHSA-2024:0461
reference_id RHSA-2024:0461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0461
10
reference_url https://usn.ubuntu.com/6315-1/
reference_id USN-6315-1
reference_type
scores
url https://usn.ubuntu.com/6315-1/
11
reference_url https://usn.ubuntu.com/6316-1/
reference_id USN-6316-1
reference_type
scores
url https://usn.ubuntu.com/6316-1/
12
reference_url https://usn.ubuntu.com/6318-1/
reference_id USN-6318-1
reference_type
scores
url https://usn.ubuntu.com/6318-1/
13
reference_url https://usn.ubuntu.com/6321-1/
reference_id USN-6321-1
reference_type
scores
url https://usn.ubuntu.com/6321-1/
14
reference_url https://usn.ubuntu.com/6325-1/
reference_id USN-6325-1
reference_type
scores
url https://usn.ubuntu.com/6325-1/
15
reference_url https://usn.ubuntu.com/6328-1/
reference_id USN-6328-1
reference_type
scores
url https://usn.ubuntu.com/6328-1/
16
reference_url https://usn.ubuntu.com/6330-1/
reference_id USN-6330-1
reference_type
scores
url https://usn.ubuntu.com/6330-1/
17
reference_url https://usn.ubuntu.com/6332-1/
reference_id USN-6332-1
reference_type
scores
url https://usn.ubuntu.com/6332-1/
18
reference_url https://usn.ubuntu.com/6348-1/
reference_id USN-6348-1
reference_type
scores
url https://usn.ubuntu.com/6348-1/
19
reference_url https://usn.ubuntu.com/6385-1/
reference_id USN-6385-1
reference_type
scores
url https://usn.ubuntu.com/6385-1/
fixed_packages
aliases CVE-2023-3777
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j4xv-b39v-kfdn
4
url VCID-mxda-6yrb-ukgb
vulnerability_id VCID-mxda-6yrb-ukgb
summary kernel: net/sched: sch_hfsc UAF
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4623.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4623.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4623
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04407
published_at 2026-04-26T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04229
published_at 2026-04-02T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04293
published_at 2026-04-08T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.04309
published_at 2026-04-09T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.043
published_at 2026-04-11T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.04286
published_at 2026-04-12T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.04264
published_at 2026-04-13T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.04235
published_at 2026-04-16T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.04244
published_at 2026-04-18T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.0437
published_at 2026-04-21T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.04387
published_at 2026-04-24T12:55:00Z
11
value 0.00017
scoring_system epss
scoring_elements 0.04249
published_at 2026-04-04T12:55:00Z
12
value 0.00017
scoring_system epss
scoring_elements 0.04262
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4623
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4623
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2237757
reference_id 2237757
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2237757
5
reference_url https://kernel.dance/b3d26c5702c7d6c45456326e56d2ccf3f103e60f
reference_id b3d26c5702c7d6c45456326e56d2ccf3f103e60f
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-26T21:52:35Z/
url https://kernel.dance/b3d26c5702c7d6c45456326e56d2ccf3f103e60f
6
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b3d26c5702c7d6c45456326e56d2ccf3f103e60f
reference_id ?id=b3d26c5702c7d6c45456326e56d2ccf3f103e60f
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-26T21:52:35Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b3d26c5702c7d6c45456326e56d2ccf3f103e60f
7
reference_url http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
reference_id Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-26T21:52:35Z/
url http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
8
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
reference_id msg00004.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-26T21:52:35Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
9
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-26T21:52:35Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
10
reference_url https://access.redhat.com/errata/RHSA-2024:0340
reference_id RHSA-2024:0340
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0340
11
reference_url https://access.redhat.com/errata/RHSA-2024:0378
reference_id RHSA-2024:0378
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0378
12
reference_url https://access.redhat.com/errata/RHSA-2024:0381
reference_id RHSA-2024:0381
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0381
13
reference_url https://access.redhat.com/errata/RHSA-2024:0386
reference_id RHSA-2024:0386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0386
14
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
15
reference_url https://access.redhat.com/errata/RHSA-2024:0431
reference_id RHSA-2024:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0431
16
reference_url https://access.redhat.com/errata/RHSA-2024:0432
reference_id RHSA-2024:0432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0432
17
reference_url https://access.redhat.com/errata/RHSA-2024:0439
reference_id RHSA-2024:0439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0439
18
reference_url https://access.redhat.com/errata/RHSA-2024:0448
reference_id RHSA-2024:0448
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0448
19
reference_url https://access.redhat.com/errata/RHSA-2024:0461
reference_id RHSA-2024:0461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0461
20
reference_url https://access.redhat.com/errata/RHSA-2024:0554
reference_id RHSA-2024:0554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0554
21
reference_url https://access.redhat.com/errata/RHSA-2024:0562
reference_id RHSA-2024:0562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0562
22
reference_url https://access.redhat.com/errata/RHSA-2024:0563
reference_id RHSA-2024:0563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0563
23
reference_url https://access.redhat.com/errata/RHSA-2024:0575
reference_id RHSA-2024:0575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0575
24
reference_url https://access.redhat.com/errata/RHSA-2024:0593
reference_id RHSA-2024:0593
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0593
25
reference_url https://access.redhat.com/errata/RHSA-2024:0876
reference_id RHSA-2024:0876
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0876
26
reference_url https://access.redhat.com/errata/RHSA-2024:0881
reference_id RHSA-2024:0881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0881
27
reference_url https://access.redhat.com/errata/RHSA-2024:0897
reference_id RHSA-2024:0897
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0897
28
reference_url https://access.redhat.com/errata/RHSA-2024:1268
reference_id RHSA-2024:1268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1268
29
reference_url https://access.redhat.com/errata/RHSA-2024:1269
reference_id RHSA-2024:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1269
30
reference_url https://access.redhat.com/errata/RHSA-2024:1278
reference_id RHSA-2024:1278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1278
31
reference_url https://access.redhat.com/errata/RHSA-2024:1746
reference_id RHSA-2024:1746
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1746
32
reference_url https://access.redhat.com/errata/RHSA-2024:1747
reference_id RHSA-2024:1747
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1747
33
reference_url https://access.redhat.com/errata/RHSA-2024:1960
reference_id RHSA-2024:1960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1960
34
reference_url https://access.redhat.com/errata/RHSA-2024:2003
reference_id RHSA-2024:2003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2003
35
reference_url https://access.redhat.com/errata/RHSA-2024:2004
reference_id RHSA-2024:2004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2004
36
reference_url https://usn.ubuntu.com/6415-1/
reference_id USN-6415-1
reference_type
scores
url https://usn.ubuntu.com/6415-1/
37
reference_url https://usn.ubuntu.com/6439-1/
reference_id USN-6439-1
reference_type
scores
url https://usn.ubuntu.com/6439-1/
38
reference_url https://usn.ubuntu.com/6439-2/
reference_id USN-6439-2
reference_type
scores
url https://usn.ubuntu.com/6439-2/
39
reference_url https://usn.ubuntu.com/6440-1/
reference_id USN-6440-1
reference_type
scores
url https://usn.ubuntu.com/6440-1/
40
reference_url https://usn.ubuntu.com/6440-2/
reference_id USN-6440-2
reference_type
scores
url https://usn.ubuntu.com/6440-2/
41
reference_url https://usn.ubuntu.com/6440-3/
reference_id USN-6440-3
reference_type
scores
url https://usn.ubuntu.com/6440-3/
42
reference_url https://usn.ubuntu.com/6441-1/
reference_id USN-6441-1
reference_type
scores
url https://usn.ubuntu.com/6441-1/
43
reference_url https://usn.ubuntu.com/6441-2/
reference_id USN-6441-2
reference_type
scores
url https://usn.ubuntu.com/6441-2/
44
reference_url https://usn.ubuntu.com/6441-3/
reference_id USN-6441-3
reference_type
scores
url https://usn.ubuntu.com/6441-3/
45
reference_url https://usn.ubuntu.com/6442-1/
reference_id USN-6442-1
reference_type
scores
url https://usn.ubuntu.com/6442-1/
46
reference_url https://usn.ubuntu.com/6444-1/
reference_id USN-6444-1
reference_type
scores
url https://usn.ubuntu.com/6444-1/
47
reference_url https://usn.ubuntu.com/6444-2/
reference_id USN-6444-2
reference_type
scores
url https://usn.ubuntu.com/6444-2/
48
reference_url https://usn.ubuntu.com/6445-1/
reference_id USN-6445-1
reference_type
scores
url https://usn.ubuntu.com/6445-1/
49
reference_url https://usn.ubuntu.com/6445-2/
reference_id USN-6445-2
reference_type
scores
url https://usn.ubuntu.com/6445-2/
50
reference_url https://usn.ubuntu.com/6446-1/
reference_id USN-6446-1
reference_type
scores
url https://usn.ubuntu.com/6446-1/
51
reference_url https://usn.ubuntu.com/6446-2/
reference_id USN-6446-2
reference_type
scores
url https://usn.ubuntu.com/6446-2/
52
reference_url https://usn.ubuntu.com/6446-3/
reference_id USN-6446-3
reference_type
scores
url https://usn.ubuntu.com/6446-3/
53
reference_url https://usn.ubuntu.com/6460-1/
reference_id USN-6460-1
reference_type
scores
url https://usn.ubuntu.com/6460-1/
54
reference_url https://usn.ubuntu.com/6466-1/
reference_id USN-6466-1
reference_type
scores
url https://usn.ubuntu.com/6466-1/
fixed_packages
aliases CVE-2023-4623
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mxda-6yrb-ukgb
5
url VCID-nuaz-vadj-uyg8
vulnerability_id VCID-nuaz-vadj-uyg8
summary kernel: scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52974.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52974.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-52974
reference_id
reference_type
scores
0
value 0.00028
scoring_system epss
scoring_elements 0.07967
published_at 2026-04-02T12:55:00Z
1
value 0.00028
scoring_system epss
scoring_elements 0.07977
published_at 2026-04-26T12:55:00Z
2
value 0.00028
scoring_system epss
scoring_elements 0.08013
published_at 2026-04-04T12:55:00Z
3
value 0.00028
scoring_system epss
scoring_elements 0.07972
published_at 2026-04-07T12:55:00Z
4
value 0.00028
scoring_system epss
scoring_elements 0.08032
published_at 2026-04-08T12:55:00Z
5
value 0.00028
scoring_system epss
scoring_elements 0.08051
published_at 2026-04-09T12:55:00Z
6
value 0.00028
scoring_system epss
scoring_elements 0.08034
published_at 2026-04-11T12:55:00Z
7
value 0.00028
scoring_system epss
scoring_elements 0.08015
published_at 2026-04-12T12:55:00Z
8
value 0.00028
scoring_system epss
scoring_elements 0.07999
published_at 2026-04-13T12:55:00Z
9
value 0.00028
scoring_system epss
scoring_elements 0.07912
published_at 2026-04-16T12:55:00Z
10
value 0.00028
scoring_system epss
scoring_elements 0.07894
published_at 2026-04-18T12:55:00Z
11
value 0.00028
scoring_system epss
scoring_elements 0.08056
published_at 2026-04-21T12:55:00Z
12
value 0.00028
scoring_system epss
scoring_elements 0.0801
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-52974
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52974
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/0aaabdb900c7415caa2006ef580322f7eac5f6b6
reference_id 0aaabdb900c7415caa2006ef580322f7eac5f6b6
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-27T16:59:50Z/
url https://git.kernel.org/stable/c/0aaabdb900c7415caa2006ef580322f7eac5f6b6
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2355469
reference_id 2355469
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2355469
6
reference_url https://git.kernel.org/stable/c/496af9d3682ed4c28fb734342a09e6cc0c056ea4
reference_id 496af9d3682ed4c28fb734342a09e6cc0c056ea4
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-27T16:59:50Z/
url https://git.kernel.org/stable/c/496af9d3682ed4c28fb734342a09e6cc0c056ea4
7
reference_url https://git.kernel.org/stable/c/61e43ebfd243bcbad11be26bd921723027b77441
reference_id 61e43ebfd243bcbad11be26bd921723027b77441
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-27T16:59:50Z/
url https://git.kernel.org/stable/c/61e43ebfd243bcbad11be26bd921723027b77441
8
reference_url https://git.kernel.org/stable/c/6abd4698f4c8a78e7bbfc421205c060c199554a0
reference_id 6abd4698f4c8a78e7bbfc421205c060c199554a0
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-27T16:59:50Z/
url https://git.kernel.org/stable/c/6abd4698f4c8a78e7bbfc421205c060c199554a0
9
reference_url https://git.kernel.org/stable/c/9758ffe1c07b86aefd7ca8e40d9a461293427ca0
reference_id 9758ffe1c07b86aefd7ca8e40d9a461293427ca0
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-27T16:59:50Z/
url https://git.kernel.org/stable/c/9758ffe1c07b86aefd7ca8e40d9a461293427ca0
10
reference_url https://git.kernel.org/stable/c/d4d765f4761f9e3a2d62992f825aeee593bcb6b9
reference_id d4d765f4761f9e3a2d62992f825aeee593bcb6b9
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-27T16:59:50Z/
url https://git.kernel.org/stable/c/d4d765f4761f9e3a2d62992f825aeee593bcb6b9
11
reference_url https://git.kernel.org/stable/c/f484a794e4ee2a9ce61f52a78e810ac45f3fe3b3
reference_id f484a794e4ee2a9ce61f52a78e810ac45f3fe3b3
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-27T16:59:50Z/
url https://git.kernel.org/stable/c/f484a794e4ee2a9ce61f52a78e810ac45f3fe3b3
12
reference_url https://access.redhat.com/errata/RHSA-2024:0431
reference_id RHSA-2024:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0431
13
reference_url https://access.redhat.com/errata/RHSA-2024:0432
reference_id RHSA-2024:0432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0432
14
reference_url https://access.redhat.com/errata/RHSA-2024:0575
reference_id RHSA-2024:0575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0575
fixed_packages
aliases CVE-2023-52974
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nuaz-vadj-uyg8
6
url VCID-ppf4-65p3-f7gq
vulnerability_id VCID-ppf4-65p3-f7gq
summary kernel: scsi: iscsi_tcp: Fix UAF during logout when accessing the shost ipaddress
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52975.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52975.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-52975
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.1914
published_at 2026-04-02T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.18798
published_at 2026-04-26T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.18988
published_at 2026-04-08T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.19041
published_at 2026-04-09T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.19049
published_at 2026-04-11T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.19002
published_at 2026-04-12T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.1895
published_at 2026-04-13T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.18904
published_at 2026-04-16T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.18917
published_at 2026-04-18T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.18928
published_at 2026-04-21T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.18819
published_at 2026-04-24T12:55:00Z
11
value 0.00061
scoring_system epss
scoring_elements 0.19192
published_at 2026-04-04T12:55:00Z
12
value 0.00061
scoring_system epss
scoring_elements 0.18908
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-52975
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52975
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/0af745fddefbd56198f4f35eb309215ee5f9e21e
reference_id 0af745fddefbd56198f4f35eb309215ee5f9e21e
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-27T16:59:46Z/
url https://git.kernel.org/stable/c/0af745fddefbd56198f4f35eb309215ee5f9e21e
5
reference_url https://git.kernel.org/stable/c/17b738590b97fb3fc287289971d1519ff9b875a1
reference_id 17b738590b97fb3fc287289971d1519ff9b875a1
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-27T16:59:46Z/
url https://git.kernel.org/stable/c/17b738590b97fb3fc287289971d1519ff9b875a1
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2355519
reference_id 2355519
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2355519
7
reference_url https://git.kernel.org/stable/c/6f1d64b13097e85abda0f91b5638000afc5f9a06
reference_id 6f1d64b13097e85abda0f91b5638000afc5f9a06
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-27T16:59:46Z/
url https://git.kernel.org/stable/c/6f1d64b13097e85abda0f91b5638000afc5f9a06
8
reference_url https://git.kernel.org/stable/c/8859687f5b242c0b057461df0a9ff51d5500783b
reference_id 8859687f5b242c0b057461df0a9ff51d5500783b
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-27T16:59:46Z/
url https://git.kernel.org/stable/c/8859687f5b242c0b057461df0a9ff51d5500783b
9
reference_url https://access.redhat.com/errata/RHSA-2024:0431
reference_id RHSA-2024:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0431
10
reference_url https://access.redhat.com/errata/RHSA-2024:0432
reference_id RHSA-2024:0432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0432
11
reference_url https://access.redhat.com/errata/RHSA-2024:0575
reference_id RHSA-2024:0575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0575
12
reference_url https://usn.ubuntu.com/7684-1/
reference_id USN-7684-1
reference_type
scores
url https://usn.ubuntu.com/7684-1/
13
reference_url https://usn.ubuntu.com/7684-2/
reference_id USN-7684-2
reference_type
scores
url https://usn.ubuntu.com/7684-2/
14
reference_url https://usn.ubuntu.com/7684-3/
reference_id USN-7684-3
reference_type
scores
url https://usn.ubuntu.com/7684-3/
15
reference_url https://usn.ubuntu.com/7685-1/
reference_id USN-7685-1
reference_type
scores
url https://usn.ubuntu.com/7685-1/
16
reference_url https://usn.ubuntu.com/7685-2/
reference_id USN-7685-2
reference_type
scores
url https://usn.ubuntu.com/7685-2/
17
reference_url https://usn.ubuntu.com/7685-3/
reference_id USN-7685-3
reference_type
scores
url https://usn.ubuntu.com/7685-3/
18
reference_url https://usn.ubuntu.com/7685-4/
reference_id USN-7685-4
reference_type
scores
url https://usn.ubuntu.com/7685-4/
19
reference_url https://usn.ubuntu.com/7685-5/
reference_id USN-7685-5
reference_type
scores
url https://usn.ubuntu.com/7685-5/
20
reference_url https://usn.ubuntu.com/7701-1/
reference_id USN-7701-1
reference_type
scores
url https://usn.ubuntu.com/7701-1/
21
reference_url https://usn.ubuntu.com/7701-2/
reference_id USN-7701-2
reference_type
scores
url https://usn.ubuntu.com/7701-2/
22
reference_url https://usn.ubuntu.com/7701-3/
reference_id USN-7701-3
reference_type
scores
url https://usn.ubuntu.com/7701-3/
23
reference_url https://usn.ubuntu.com/7819-1/
reference_id USN-7819-1
reference_type
scores
url https://usn.ubuntu.com/7819-1/
24
reference_url https://usn.ubuntu.com/7819-2/
reference_id USN-7819-2
reference_type
scores
url https://usn.ubuntu.com/7819-2/
25
reference_url https://usn.ubuntu.com/7832-1/
reference_id USN-7832-1
reference_type
scores
url https://usn.ubuntu.com/7832-1/
26
reference_url https://usn.ubuntu.com/7911-1/
reference_id USN-7911-1
reference_type
scores
url https://usn.ubuntu.com/7911-1/
fixed_packages
aliases CVE-2023-52975
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ppf4-65p3-f7gq
7
url VCID-s15g-xfaf-pqck
vulnerability_id VCID-s15g-xfaf-pqck
summary kernel: use after free in nvmet_tcp_free_crypto in NVMe
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5178.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5178.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5178
reference_id
reference_type
scores
0
value 0.08634
scoring_system epss
scoring_elements 0.9246
published_at 2026-04-26T12:55:00Z
1
value 0.08634
scoring_system epss
scoring_elements 0.92456
published_at 2026-04-21T12:55:00Z
2
value 0.08634
scoring_system epss
scoring_elements 0.92459
published_at 2026-04-24T12:55:00Z
3
value 0.08634
scoring_system epss
scoring_elements 0.92417
published_at 2026-04-04T12:55:00Z
4
value 0.08634
scoring_system epss
scoring_elements 0.9242
published_at 2026-04-07T12:55:00Z
5
value 0.08634
scoring_system epss
scoring_elements 0.92432
published_at 2026-04-08T12:55:00Z
6
value 0.08634
scoring_system epss
scoring_elements 0.92437
published_at 2026-04-09T12:55:00Z
7
value 0.08634
scoring_system epss
scoring_elements 0.92443
published_at 2026-04-13T12:55:00Z
8
value 0.08634
scoring_system epss
scoring_elements 0.92445
published_at 2026-04-12T12:55:00Z
9
value 0.08634
scoring_system epss
scoring_elements 0.92454
published_at 2026-04-16T12:55:00Z
10
value 0.08634
scoring_system epss
scoring_elements 0.92453
published_at 2026-04-18T12:55:00Z
11
value 0.09291
scoring_system epss
scoring_elements 0.92718
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5178
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241924
reference_id 2241924
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2241924
22
reference_url https://access.redhat.com/errata/RHSA-2023:7370
reference_id RHSA-2023:7370
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7370
23
reference_url https://access.redhat.com/errata/RHSA-2023:7379
reference_id RHSA-2023:7379
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7379
24
reference_url https://access.redhat.com/errata/RHSA-2023:7418
reference_id RHSA-2023:7418
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7418
25
reference_url https://access.redhat.com/errata/RHSA-2023:7548
reference_id RHSA-2023:7548
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7548
26
reference_url https://access.redhat.com/errata/RHSA-2023:7549
reference_id RHSA-2023:7549
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7549
27
reference_url https://access.redhat.com/errata/RHSA-2023:7551
reference_id RHSA-2023:7551
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7551
28
reference_url https://access.redhat.com/errata/RHSA-2023:7554
reference_id RHSA-2023:7554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7554
29
reference_url https://access.redhat.com/errata/RHSA-2023:7557
reference_id RHSA-2023:7557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7557
30
reference_url https://access.redhat.com/errata/RHSA-2023:7559
reference_id RHSA-2023:7559
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7559
31
reference_url https://access.redhat.com/errata/RHSA-2024:0340
reference_id RHSA-2024:0340
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0340
32
reference_url https://access.redhat.com/errata/RHSA-2024:0378
reference_id RHSA-2024:0378
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0378
33
reference_url https://access.redhat.com/errata/RHSA-2024:0386
reference_id RHSA-2024:0386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0386
34
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
35
reference_url https://access.redhat.com/errata/RHSA-2024:0431
reference_id RHSA-2024:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0431
36
reference_url https://access.redhat.com/errata/RHSA-2024:0432
reference_id RHSA-2024:0432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0432
37
reference_url https://access.redhat.com/errata/RHSA-2024:0461
reference_id RHSA-2024:0461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0461
38
reference_url https://access.redhat.com/errata/RHSA-2024:0554
reference_id RHSA-2024:0554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0554
39
reference_url https://access.redhat.com/errata/RHSA-2024:0575
reference_id RHSA-2024:0575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0575
40
reference_url https://access.redhat.com/errata/RHSA-2024:1268
reference_id RHSA-2024:1268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1268
41
reference_url https://access.redhat.com/errata/RHSA-2024:1269
reference_id RHSA-2024:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1269
42
reference_url https://access.redhat.com/errata/RHSA-2024:1278
reference_id RHSA-2024:1278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1278
43
reference_url https://usn.ubuntu.com/6497-1/
reference_id USN-6497-1
reference_type
scores
url https://usn.ubuntu.com/6497-1/
44
reference_url https://usn.ubuntu.com/6534-1/
reference_id USN-6534-1
reference_type
scores
url https://usn.ubuntu.com/6534-1/
45
reference_url https://usn.ubuntu.com/6534-2/
reference_id USN-6534-2
reference_type
scores
url https://usn.ubuntu.com/6534-2/
46
reference_url https://usn.ubuntu.com/6534-3/
reference_id USN-6534-3
reference_type
scores
url https://usn.ubuntu.com/6534-3/
47
reference_url https://usn.ubuntu.com/6536-1/
reference_id USN-6536-1
reference_type
scores
url https://usn.ubuntu.com/6536-1/
48
reference_url https://usn.ubuntu.com/6537-1/
reference_id USN-6537-1
reference_type
scores
url https://usn.ubuntu.com/6537-1/
49
reference_url https://usn.ubuntu.com/6548-1/
reference_id USN-6548-1
reference_type
scores
url https://usn.ubuntu.com/6548-1/
50
reference_url https://usn.ubuntu.com/6548-2/
reference_id USN-6548-2
reference_type
scores
url https://usn.ubuntu.com/6548-2/
51
reference_url https://usn.ubuntu.com/6548-3/
reference_id USN-6548-3
reference_type
scores
url https://usn.ubuntu.com/6548-3/
52
reference_url https://usn.ubuntu.com/6548-4/
reference_id USN-6548-4
reference_type
scores
url https://usn.ubuntu.com/6548-4/
53
reference_url https://usn.ubuntu.com/6548-5/
reference_id USN-6548-5
reference_type
scores
url https://usn.ubuntu.com/6548-5/
54
reference_url https://usn.ubuntu.com/6549-1/
reference_id USN-6549-1
reference_type
scores
url https://usn.ubuntu.com/6549-1/
55
reference_url https://usn.ubuntu.com/6549-2/
reference_id USN-6549-2
reference_type
scores
url https://usn.ubuntu.com/6549-2/
56
reference_url https://usn.ubuntu.com/6549-3/
reference_id USN-6549-3
reference_type
scores
url https://usn.ubuntu.com/6549-3/
57
reference_url https://usn.ubuntu.com/6549-4/
reference_id USN-6549-4
reference_type
scores
url https://usn.ubuntu.com/6549-4/
58
reference_url https://usn.ubuntu.com/6549-5/
reference_id USN-6549-5
reference_type
scores
url https://usn.ubuntu.com/6549-5/
59
reference_url https://usn.ubuntu.com/6573-1/
reference_id USN-6573-1
reference_type
scores
url https://usn.ubuntu.com/6573-1/
60
reference_url https://usn.ubuntu.com/6635-1/
reference_id USN-6635-1
reference_type
scores
url https://usn.ubuntu.com/6635-1/
fixed_packages
aliases CVE-2023-5178
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s15g-xfaf-pqck
8
url VCID-vqy7-37ym-eufr
vulnerability_id VCID-vqy7-37ym-eufr
summary kernel: xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36879.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36879.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-36879
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.06975
published_at 2026-04-26T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.0682
published_at 2026-04-02T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06863
published_at 2026-04-04T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.06849
published_at 2026-04-07T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.06904
published_at 2026-04-08T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.06935
published_at 2026-04-09T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.06932
published_at 2026-04-11T12:55:00Z
7
value 0.00025
scoring_system epss
scoring_elements 0.06925
published_at 2026-04-12T12:55:00Z
8
value 0.00025
scoring_system epss
scoring_elements 0.06921
published_at 2026-04-13T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.0686
published_at 2026-04-16T12:55:00Z
10
value 0.00025
scoring_system epss
scoring_elements 0.06842
published_at 2026-04-18T12:55:00Z
11
value 0.00025
scoring_system epss
scoring_elements 0.06984
published_at 2026-04-21T12:55:00Z
12
value 0.00025
scoring_system epss
scoring_elements 0.06971
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-36879
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2119855
reference_id 2119855
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2119855
12
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
13
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
14
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
15
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=f85daf0e725358be78dfd208dea5fd665d8cb901
reference_id commit?id=f85daf0e725358be78dfd208dea5fd665d8cb901
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=f85daf0e725358be78dfd208dea5fd665d8cb901
16
reference_url https://www.debian.org/security/2022/dsa-5207
reference_id dsa-5207
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/
url https://www.debian.org/security/2022/dsa-5207
17
reference_url https://github.com/torvalds/linux/commit/f85daf0e725358be78dfd208dea5fd665d8cb901
reference_id f85daf0e725358be78dfd208dea5fd665d8cb901
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/
url https://github.com/torvalds/linux/commit/f85daf0e725358be78dfd208dea5fd665d8cb901
18
reference_url https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html
reference_id msg00000.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/
url https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html
19
reference_url https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html
reference_id msg00011.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/
url https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html
20
reference_url https://security.netapp.com/advisory/ntap-20220901-0007/
reference_id ntap-20220901-0007
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/
url https://security.netapp.com/advisory/ntap-20220901-0007/
21
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
22
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
23
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
24
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
25
reference_url https://access.redhat.com/errata/RHSA-2023:5627
reference_id RHSA-2023:5627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5627
26
reference_url https://access.redhat.com/errata/RHSA-2024:0431
reference_id RHSA-2024:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0431
27
reference_url https://access.redhat.com/errata/RHSA-2024:0432
reference_id RHSA-2024:0432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0432
28
reference_url https://usn.ubuntu.com/5667-1/
reference_id USN-5667-1
reference_type
scores
url https://usn.ubuntu.com/5667-1/
29
reference_url https://usn.ubuntu.com/5668-1/
reference_id USN-5668-1
reference_type
scores
url https://usn.ubuntu.com/5668-1/
30
reference_url https://usn.ubuntu.com/5677-1/
reference_id USN-5677-1
reference_type
scores
url https://usn.ubuntu.com/5677-1/
31
reference_url https://usn.ubuntu.com/5682-1/
reference_id USN-5682-1
reference_type
scores
url https://usn.ubuntu.com/5682-1/
32
reference_url https://usn.ubuntu.com/5683-1/
reference_id USN-5683-1
reference_type
scores
url https://usn.ubuntu.com/5683-1/
33
reference_url https://usn.ubuntu.com/5703-1/
reference_id USN-5703-1
reference_type
scores
url https://usn.ubuntu.com/5703-1/
34
reference_url https://usn.ubuntu.com/5706-1/
reference_id USN-5706-1
reference_type
scores
url https://usn.ubuntu.com/5706-1/
35
reference_url https://usn.ubuntu.com/5727-1/
reference_id USN-5727-1
reference_type
scores
url https://usn.ubuntu.com/5727-1/
36
reference_url https://usn.ubuntu.com/5727-2/
reference_id USN-5727-2
reference_type
scores
url https://usn.ubuntu.com/5727-2/
37
reference_url https://usn.ubuntu.com/5774-1/
reference_id USN-5774-1
reference_type
scores
url https://usn.ubuntu.com/5774-1/
38
reference_url https://usn.ubuntu.com/5913-1/
reference_id USN-5913-1
reference_type
scores
url https://usn.ubuntu.com/5913-1/
39
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
40
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
41
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
fixed_packages
aliases CVE-2022-36879
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vqy7-37ym-eufr
9
url VCID-ww12-xnsy-gyfm
vulnerability_id VCID-ww12-xnsy-gyfm
summary kernel: UAF during login when accessing the shost ipaddress
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2162.json
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2162.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2162
reference_id
reference_type
scores
0
value 9e-05
scoring_system epss
scoring_elements 0.00828
published_at 2026-04-04T12:55:00Z
1
value 9e-05
scoring_system epss
scoring_elements 0.00869
published_at 2026-04-26T12:55:00Z
2
value 9e-05
scoring_system epss
scoring_elements 0.00831
published_at 2026-04-09T12:55:00Z
3
value 9e-05
scoring_system epss
scoring_elements 0.0082
published_at 2026-04-11T12:55:00Z
4
value 9e-05
scoring_system epss
scoring_elements 0.00814
published_at 2026-04-12T12:55:00Z
5
value 9e-05
scoring_system epss
scoring_elements 0.00815
published_at 2026-04-16T12:55:00Z
6
value 9e-05
scoring_system epss
scoring_elements 0.00819
published_at 2026-04-18T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.00864
published_at 2026-04-21T12:55:00Z
8
value 9e-05
scoring_system epss
scoring_elements 0.00866
published_at 2026-04-24T12:55:00Z
9
value 9e-05
scoring_system epss
scoring_elements 0.00829
published_at 2026-04-07T12:55:00Z
10
value 9e-05
scoring_system epss
scoring_elements 0.00834
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2162
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2162
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2162
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2187773
reference_id 2187773
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2187773
5
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:12Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
6
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:12Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
7
reference_url https://www.spinics.net/lists/linux-scsi/msg181542.html
reference_id msg181542.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:12Z/
url https://www.spinics.net/lists/linux-scsi/msg181542.html
8
reference_url https://access.redhat.com/errata/RHSA-2024:0113
reference_id RHSA-2024:0113
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0113
9
reference_url https://access.redhat.com/errata/RHSA-2024:0134
reference_id RHSA-2024:0134
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0134
10
reference_url https://access.redhat.com/errata/RHSA-2024:0402
reference_id RHSA-2024:0402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0402
11
reference_url https://access.redhat.com/errata/RHSA-2024:0403
reference_id RHSA-2024:0403
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0403
12
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
13
reference_url https://access.redhat.com/errata/RHSA-2024:0431
reference_id RHSA-2024:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0431
14
reference_url https://access.redhat.com/errata/RHSA-2024:0432
reference_id RHSA-2024:0432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0432
15
reference_url https://access.redhat.com/errata/RHSA-2024:0439
reference_id RHSA-2024:0439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0439
16
reference_url https://access.redhat.com/errata/RHSA-2024:0448
reference_id RHSA-2024:0448
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0448
17
reference_url https://access.redhat.com/errata/RHSA-2024:0562
reference_id RHSA-2024:0562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0562
18
reference_url https://access.redhat.com/errata/RHSA-2024:0563
reference_id RHSA-2024:0563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0563
19
reference_url https://access.redhat.com/errata/RHSA-2024:0575
reference_id RHSA-2024:0575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0575
20
reference_url https://usn.ubuntu.com/6079-1/
reference_id USN-6079-1
reference_type
scores
url https://usn.ubuntu.com/6079-1/
21
reference_url https://usn.ubuntu.com/6080-1/
reference_id USN-6080-1
reference_type
scores
url https://usn.ubuntu.com/6080-1/
22
reference_url https://usn.ubuntu.com/6081-1/
reference_id USN-6081-1
reference_type
scores
url https://usn.ubuntu.com/6081-1/
23
reference_url https://usn.ubuntu.com/6084-1/
reference_id USN-6084-1
reference_type
scores
url https://usn.ubuntu.com/6084-1/
24
reference_url https://usn.ubuntu.com/6085-1/
reference_id USN-6085-1
reference_type
scores
url https://usn.ubuntu.com/6085-1/
25
reference_url https://usn.ubuntu.com/6090-1/
reference_id USN-6090-1
reference_type
scores
url https://usn.ubuntu.com/6090-1/
26
reference_url https://usn.ubuntu.com/6091-1/
reference_id USN-6091-1
reference_type
scores
url https://usn.ubuntu.com/6091-1/
27
reference_url https://usn.ubuntu.com/6092-1/
reference_id USN-6092-1
reference_type
scores
url https://usn.ubuntu.com/6092-1/
28
reference_url https://usn.ubuntu.com/6094-1/
reference_id USN-6094-1
reference_type
scores
url https://usn.ubuntu.com/6094-1/
29
reference_url https://usn.ubuntu.com/6095-1/
reference_id USN-6095-1
reference_type
scores
url https://usn.ubuntu.com/6095-1/
30
reference_url https://usn.ubuntu.com/6096-1/
reference_id USN-6096-1
reference_type
scores
url https://usn.ubuntu.com/6096-1/
31
reference_url https://usn.ubuntu.com/6109-1/
reference_id USN-6109-1
reference_type
scores
url https://usn.ubuntu.com/6109-1/
32
reference_url https://usn.ubuntu.com/6118-1/
reference_id USN-6118-1
reference_type
scores
url https://usn.ubuntu.com/6118-1/
33
reference_url https://usn.ubuntu.com/6132-1/
reference_id USN-6132-1
reference_type
scores
url https://usn.ubuntu.com/6132-1/
34
reference_url https://usn.ubuntu.com/6133-1/
reference_id USN-6133-1
reference_type
scores
url https://usn.ubuntu.com/6133-1/
35
reference_url https://usn.ubuntu.com/6134-1/
reference_id USN-6134-1
reference_type
scores
url https://usn.ubuntu.com/6134-1/
36
reference_url https://usn.ubuntu.com/6222-1/
reference_id USN-6222-1
reference_type
scores
url https://usn.ubuntu.com/6222-1/
37
reference_url https://usn.ubuntu.com/6254-1/
reference_id USN-6254-1
reference_type
scores
url https://usn.ubuntu.com/6254-1/
38
reference_url https://usn.ubuntu.com/6256-1/
reference_id USN-6256-1
reference_type
scores
url https://usn.ubuntu.com/6256-1/
39
reference_url https://usn.ubuntu.com/6385-1/
reference_id USN-6385-1
reference_type
scores
url https://usn.ubuntu.com/6385-1/
fixed_packages
aliases CVE-2023-2162
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ww12-xnsy-gyfm
10
url VCID-zcxw-xq7k-tkhx
vulnerability_id VCID-zcxw-xq7k-tkhx
summary kernel: SEV-ES local priv escalation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46813.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46813.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-46813
reference_id
reference_type
scores
0
value 0.00295
scoring_system epss
scoring_elements 0.5277
published_at 2026-04-04T12:55:00Z
1
value 0.00295
scoring_system epss
scoring_elements 0.52743
published_at 2026-04-02T12:55:00Z
2
value 0.00331
scoring_system epss
scoring_elements 0.55991
published_at 2026-04-26T12:55:00Z
3
value 0.00331
scoring_system epss
scoring_elements 0.56004
published_at 2026-04-07T12:55:00Z
4
value 0.00331
scoring_system epss
scoring_elements 0.56056
published_at 2026-04-08T12:55:00Z
5
value 0.00331
scoring_system epss
scoring_elements 0.56059
published_at 2026-04-09T12:55:00Z
6
value 0.00331
scoring_system epss
scoring_elements 0.5607
published_at 2026-04-11T12:55:00Z
7
value 0.00331
scoring_system epss
scoring_elements 0.56051
published_at 2026-04-12T12:55:00Z
8
value 0.00331
scoring_system epss
scoring_elements 0.56033
published_at 2026-04-13T12:55:00Z
9
value 0.00331
scoring_system epss
scoring_elements 0.56069
published_at 2026-04-16T12:55:00Z
10
value 0.00331
scoring_system epss
scoring_elements 0.56072
published_at 2026-04-18T12:55:00Z
11
value 0.00331
scoring_system epss
scoring_elements 0.56044
published_at 2026-04-21T12:55:00Z
12
value 0.00331
scoring_system epss
scoring_elements 0.55971
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-46813
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2246944
reference_id 2246944
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2246944
22
reference_url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.9
reference_id ChangeLog-6.5.9
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:17Z/
url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.9
23
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=63e44bc52047f182601e7817da969a105aa1f721
reference_id ?id=63e44bc52047f182601e7817da969a105aa1f721
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:17Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=63e44bc52047f182601e7817da969a105aa1f721
24
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a37cd2a59d0cb270b1bba568fd3a3b8668b9d3ba
reference_id ?id=a37cd2a59d0cb270b1bba568fd3a3b8668b9d3ba
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:17Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a37cd2a59d0cb270b1bba568fd3a3b8668b9d3ba
25
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b9cb9c45583b911e0db71d09caa6b56469eb2bdf
reference_id ?id=b9cb9c45583b911e0db71d09caa6b56469eb2bdf
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:17Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b9cb9c45583b911e0db71d09caa6b56469eb2bdf
26
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:17Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html
27
reference_url https://access.redhat.com/errata/RHSA-2024:0431
reference_id RHSA-2024:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0431
28
reference_url https://access.redhat.com/errata/RHSA-2024:0432
reference_id RHSA-2024:0432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0432
29
reference_url https://access.redhat.com/errata/RHSA-2024:0439
reference_id RHSA-2024:0439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0439
30
reference_url https://access.redhat.com/errata/RHSA-2024:0448
reference_id RHSA-2024:0448
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0448
31
reference_url https://access.redhat.com/errata/RHSA-2024:0461
reference_id RHSA-2024:0461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0461
32
reference_url https://access.redhat.com/errata/RHSA-2024:0575
reference_id RHSA-2024:0575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0575
33
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
34
reference_url https://access.redhat.com/errata/RHSA-2024:0881
reference_id RHSA-2024:0881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0881
35
reference_url https://access.redhat.com/errata/RHSA-2024:0897
reference_id RHSA-2024:0897
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0897
36
reference_url https://bugzilla.suse.com/show_bug.cgi?id=1212649
reference_id show_bug.cgi?id=1212649
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:17Z/
url https://bugzilla.suse.com/show_bug.cgi?id=1212649
37
reference_url https://usn.ubuntu.com/6533-1/
reference_id USN-6533-1
reference_type
scores
url https://usn.ubuntu.com/6533-1/
38
reference_url https://usn.ubuntu.com/6624-1/
reference_id USN-6624-1
reference_type
scores
url https://usn.ubuntu.com/6624-1/
39
reference_url https://usn.ubuntu.com/6626-1/
reference_id USN-6626-1
reference_type
scores
url https://usn.ubuntu.com/6626-1/
40
reference_url https://usn.ubuntu.com/6626-2/
reference_id USN-6626-2
reference_type
scores
url https://usn.ubuntu.com/6626-2/
41
reference_url https://usn.ubuntu.com/6626-3/
reference_id USN-6626-3
reference_type
scores
url https://usn.ubuntu.com/6626-3/
42
reference_url https://usn.ubuntu.com/6628-1/
reference_id USN-6628-1
reference_type
scores
url https://usn.ubuntu.com/6628-1/
43
reference_url https://usn.ubuntu.com/6628-2/
reference_id USN-6628-2
reference_type
scores
url https://usn.ubuntu.com/6628-2/
44
reference_url https://usn.ubuntu.com/6652-1/
reference_id USN-6652-1
reference_type
scores
url https://usn.ubuntu.com/6652-1/
fixed_packages
aliases CVE-2023-46813
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zcxw-xq7k-tkhx
11
url VCID-zph7-5zjb-quae
vulnerability_id VCID-zph7-5zjb-quae
summary kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3567.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3567.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3567
reference_id
reference_type
scores
0
value 8e-05
scoring_system epss
scoring_elements 0.00709
published_at 2026-04-07T12:55:00Z
1
value 8e-05
scoring_system epss
scoring_elements 0.00705
published_at 2026-04-04T12:55:00Z
2
value 8e-05
scoring_system epss
scoring_elements 0.00708
published_at 2026-04-08T12:55:00Z
3
value 8e-05
scoring_system epss
scoring_elements 0.00699
published_at 2026-04-09T12:55:00Z
4
value 8e-05
scoring_system epss
scoring_elements 0.00698
published_at 2026-04-11T12:55:00Z
5
value 8e-05
scoring_system epss
scoring_elements 0.00693
published_at 2026-04-12T12:55:00Z
6
value 8e-05
scoring_system epss
scoring_elements 0.00692
published_at 2026-04-18T12:55:00Z
7
value 8e-05
scoring_system epss
scoring_elements 0.00686
published_at 2026-04-16T12:55:00Z
8
value 8e-05
scoring_system epss
scoring_elements 0.00734
published_at 2026-04-21T12:55:00Z
9
value 8e-05
scoring_system epss
scoring_elements 0.00736
published_at 2026-04-24T12:55:00Z
10
value 8e-05
scoring_system epss
scoring_elements 0.00737
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3567
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3567
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2221463
reference_id 2221463
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2221463
5
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
6
reference_url https://access.redhat.com/errata/RHSA-2024:0431
reference_id RHSA-2024:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0431
7
reference_url https://access.redhat.com/errata/RHSA-2024:0432
reference_id RHSA-2024:0432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0432
8
reference_url https://access.redhat.com/errata/RHSA-2024:0439
reference_id RHSA-2024:0439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0439
9
reference_url https://access.redhat.com/errata/RHSA-2024:0448
reference_id RHSA-2024:0448
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0448
10
reference_url https://access.redhat.com/errata/RHSA-2024:0575
reference_id RHSA-2024:0575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0575
11
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
12
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
13
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
14
reference_url https://usn.ubuntu.com/6309-1/
reference_id USN-6309-1
reference_type
scores
url https://usn.ubuntu.com/6309-1/
15
reference_url https://usn.ubuntu.com/6327-1/
reference_id USN-6327-1
reference_type
scores
url https://usn.ubuntu.com/6327-1/
16
reference_url https://usn.ubuntu.com/6341-1/
reference_id USN-6341-1
reference_type
scores
url https://usn.ubuntu.com/6341-1/
fixed_packages
aliases CVE-2023-3567
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zph7-5zjb-quae
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@5.14.0-70.85.1%3Farch=el9_0