Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/buildah@2:1.33.7-2?arch=el9_4
Typerpm
Namespaceredhat
Namebuildah
Version2:1.33.7-2
Qualifiers
arch el9_4
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1rpd-33se-hkex
vulnerability_id VCID-1rpd-33se-hkex
summary
jose vulnerable to resource exhaustion via specifically crafted JWE with compressed plaintext
A vulnerability has been identified in the JSON Web Encryption (JWE) decryption interfaces, specifically related to the [support for decompressing plaintext after its decryption](https://www.rfc-editor.org/rfc/rfc7516.html#section-4.1.3). This allows an adversary to exploit specific scenarios where the compression ratio becomes exceptionally high. As a result, the length of the JWE token, which is determined by the compressed content's size, can land below application-defined limits. In such cases, other existing application level mechanisms for preventing resource exhaustion may be rendered ineffective.

Note that as per [RFC 8725](https://www.rfc-editor.org/rfc/rfc8725.html#name-avoid-compression-of-encryp) compression of data SHOULD NOT be done before encryption, because such compressed data often reveals information about the plaintext. For this reason the v5.x major version of `jose` removed support for compressed payloads entirely and is therefore NOT affected by this advisory.

### Impact

Under certain conditions it is possible to have the user's environment consume unreasonable amount of CPU time or memory during JWE Decryption operations.

### Affected users

The impact is limited only to Node.js users utilizing the JWE decryption APIs to decrypt JWEs from untrusted sources.

You are NOT affected if any of the following applies to you

- Your code uses jose version v5.x where JWE Compression is not supported anymore
- Your code runs in an environment other than Node.js (e.g. Deno, CF Workers), which is the only runtime where JWE Compression is implemented out of the box
- Your code does not use the JWE decryption APIs
- Your code only accepts JWEs produced by trusted sources

### Patches

`v2.0.7` and `v4.15.5` releases limit the decompression routine to only allow decompressing up to 250 kB of plaintext. In v4.x it is possible to further adjust this limit via the `inflateRaw` decryption option implementation. In v2.x it is possible to further adjust this limit via the `inflateRawSyncLimit` decryption option.

### Workarounds

If you cannot upgrade and do not want to support compressed JWEs you may detect and reject these tokens early by checking the token's protected header

```js
const { zip } = jose.decodeProtectedHeader(token)
if (zip !== undefined) {
  throw new Error('JWE Compression is not supported')
}
```

If you wish to continue supporting JWEs with compressed payloads in these legacy release lines you must upgrade (v1.x and v2.x to version v2.0.7, v3.x and v4.x to version v4.15.5) and review the limits put forth by the patched releases.

### For more information
If you have any questions or comments about this advisory please open a discussion in the project's [repository](https://github.com/panva/jose/discussions/new?category=q-a&title=GHSA-hhhv-q57g-882q%20advisory%20question)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28176.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28176.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-28176
reference_id
reference_type
scores
0
value 0.00572
scoring_system epss
scoring_elements 0.68681
published_at 2026-04-21T12:55:00Z
1
value 0.00572
scoring_system epss
scoring_elements 0.68702
published_at 2026-04-18T12:55:00Z
2
value 0.00572
scoring_system epss
scoring_elements 0.68691
published_at 2026-04-16T12:55:00Z
3
value 0.00572
scoring_system epss
scoring_elements 0.68602
published_at 2026-04-02T12:55:00Z
4
value 0.00572
scoring_system epss
scoring_elements 0.6862
published_at 2026-04-04T12:55:00Z
5
value 0.00572
scoring_system epss
scoring_elements 0.68597
published_at 2026-04-07T12:55:00Z
6
value 0.00572
scoring_system epss
scoring_elements 0.68648
published_at 2026-04-13T12:55:00Z
7
value 0.00572
scoring_system epss
scoring_elements 0.68666
published_at 2026-04-09T12:55:00Z
8
value 0.00572
scoring_system epss
scoring_elements 0.6869
published_at 2026-04-11T12:55:00Z
9
value 0.00572
scoring_system epss
scoring_elements 0.68677
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-28176
2
reference_url https://github.com/panva/jose
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/panva/jose
3
reference_url https://github.com/panva/jose/commit/02a65794f7873cdaf12e81e80ad076fcdc4a9314
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-11T14:26:36Z/
url https://github.com/panva/jose/commit/02a65794f7873cdaf12e81e80ad076fcdc4a9314
4
reference_url https://github.com/panva/jose/commit/1b91d88d2f8233f3477a5f4579aa5f8057b2ee8b
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-11T14:26:36Z/
url https://github.com/panva/jose/commit/1b91d88d2f8233f3477a5f4579aa5f8057b2ee8b
5
reference_url https://github.com/panva/jose/security/advisories/GHSA-hhhv-q57g-882q
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
2
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-11T14:26:36Z/
url https://github.com/panva/jose/security/advisories/GHSA-hhhv-q57g-882q
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I6MMWFBOXJA6ZCXNVPDFJ4XMK5PVG5RG
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I6MMWFBOXJA6ZCXNVPDFJ4XMK5PVG5RG
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXKGNCRU7OTM5AHC7YIYBNOWI742PRMY
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXKGNCRU7OTM5AHC7YIYBNOWI742PRMY
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UG5FSEYJ3GP27FZXC5YAAMMEC5XWKJHG
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UG5FSEYJ3GP27FZXC5YAAMMEC5XWKJHG
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJO2U5ACZVACNQXJ5EBRFLFW6DP5BROY
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJO2U5ACZVACNQXJ5EBRFLFW6DP5BROY
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJDO5VSIAOGT2WP63AXAAWNRSVJCNCRH
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJDO5VSIAOGT2WP63AXAAWNRSVJCNCRH
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-28176
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-28176
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2268820
reference_id 2268820
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2268820
13
reference_url https://github.com/advisories/GHSA-hhhv-q57g-882q
reference_id GHSA-hhhv-q57g-882q
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-hhhv-q57g-882q
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I6MMWFBOXJA6ZCXNVPDFJ4XMK5PVG5RG/
reference_id I6MMWFBOXJA6ZCXNVPDFJ4XMK5PVG5RG
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-11T14:26:36Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I6MMWFBOXJA6ZCXNVPDFJ4XMK5PVG5RG/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXKGNCRU7OTM5AHC7YIYBNOWI742PRMY/
reference_id KXKGNCRU7OTM5AHC7YIYBNOWI742PRMY
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-11T14:26:36Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXKGNCRU7OTM5AHC7YIYBNOWI742PRMY/
16
reference_url https://access.redhat.com/errata/RHSA-2024:3826
reference_id RHSA-2024:3826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3826
17
reference_url https://access.redhat.com/errata/RHSA-2024:3827
reference_id RHSA-2024:3827
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3827
18
reference_url https://access.redhat.com/errata/RHSA-2024:3968
reference_id RHSA-2024:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3968
19
reference_url https://access.redhat.com/errata/RHSA-2024:5094
reference_id RHSA-2024:5094
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5094
20
reference_url https://access.redhat.com/errata/RHSA-2024:5294
reference_id RHSA-2024:5294
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5294
21
reference_url https://access.redhat.com/errata/RHSA-2024:6755
reference_id RHSA-2024:6755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6755
22
reference_url https://access.redhat.com/errata/RHSA-2024:8676
reference_id RHSA-2024:8676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8676
23
reference_url https://access.redhat.com/errata/RHSA-2024:9181
reference_id RHSA-2024:9181
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9181
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UG5FSEYJ3GP27FZXC5YAAMMEC5XWKJHG/
reference_id UG5FSEYJ3GP27FZXC5YAAMMEC5XWKJHG
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-11T14:26:36Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UG5FSEYJ3GP27FZXC5YAAMMEC5XWKJHG/
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJO2U5ACZVACNQXJ5EBRFLFW6DP5BROY/
reference_id UJO2U5ACZVACNQXJ5EBRFLFW6DP5BROY
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-11T14:26:36Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJO2U5ACZVACNQXJ5EBRFLFW6DP5BROY/
26
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJDO5VSIAOGT2WP63AXAAWNRSVJCNCRH/
reference_id XJDO5VSIAOGT2WP63AXAAWNRSVJCNCRH
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-11T14:26:36Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJDO5VSIAOGT2WP63AXAAWNRSVJCNCRH/
fixed_packages
aliases CVE-2024-28176, GHSA-hhhv-q57g-882q
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1rpd-33se-hkex
1
url VCID-bq1t-9nnj-mkes
vulnerability_id VCID-bq1t-9nnj-mkes
summary
Go JOSE vulnerable to Improper Handling of Highly Compressed Data (Data Amplification)
### Impact
An attacker could send a JWE containing compressed data that used large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti. Those functions now return an error if the decompressed data would exceed 250kB or 10x the compressed size (whichever is larger). Thanks to Enze Wang@Alioth and Jianjun Chen@Zhongguancun Lab (@zer0yu and @chenjj) for reporting.

### Patches
The problem is fixed in the following packages and versions:
- github.com/go-jose/go-jose/v4 version 4.0.1
- github.com/go-jose/go-jose/v3 version 3.0.3
- gopkg.in/go-jose/go-jose.v2 version 2.6.3

The problem will not be fixed in the following package because the package is archived:
- gopkg.in/square/go-jose.v2
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28180.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28180.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-28180
reference_id
reference_type
scores
0
value 0.04859
scoring_system epss
scoring_elements 0.89559
published_at 2026-04-21T12:55:00Z
1
value 0.04859
scoring_system epss
scoring_elements 0.89563
published_at 2026-04-18T12:55:00Z
2
value 0.04859
scoring_system epss
scoring_elements 0.89561
published_at 2026-04-16T12:55:00Z
3
value 0.04859
scoring_system epss
scoring_elements 0.89547
published_at 2026-04-13T12:55:00Z
4
value 0.04859
scoring_system epss
scoring_elements 0.89545
published_at 2026-04-09T12:55:00Z
5
value 0.04859
scoring_system epss
scoring_elements 0.89542
published_at 2026-04-08T12:55:00Z
6
value 0.04859
scoring_system epss
scoring_elements 0.89552
published_at 2026-04-12T12:55:00Z
7
value 0.04859
scoring_system epss
scoring_elements 0.89553
published_at 2026-04-11T12:55:00Z
8
value 0.04859
scoring_system epss
scoring_elements 0.89513
published_at 2026-04-02T12:55:00Z
9
value 0.04859
scoring_system epss
scoring_elements 0.89526
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-28180
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28180
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/go-jose/go-jose
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/go-jose/go-jose
5
reference_url https://github.com/go-jose/go-jose/commit/0dd4dd541c665fb292d664f77604ba694726f298
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-11T15:08:38Z/
url https://github.com/go-jose/go-jose/commit/0dd4dd541c665fb292d664f77604ba694726f298
6
reference_url https://github.com/go-jose/go-jose/commit/add6a284ea0f844fd6628cba637be5451fe4b28a
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-11T15:08:38Z/
url https://github.com/go-jose/go-jose/commit/add6a284ea0f844fd6628cba637be5451fe4b28a
7
reference_url https://github.com/go-jose/go-jose/commit/f4c051a0653d78199a053892f7619ebf96339502
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-11T15:08:38Z/
url https://github.com/go-jose/go-jose/commit/f4c051a0653d78199a053892f7619ebf96339502
8
reference_url https://github.com/go-jose/go-jose/security/advisories/GHSA-c5q2-7r4c-mv6g
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-11T15:08:38Z/
url https://github.com/go-jose/go-jose/security/advisories/GHSA-c5q2-7r4c-mv6g
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GD2GSBQTBLYADASUBHHZV2CZPTSLIPQJ
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GD2GSBQTBLYADASUBHHZV2CZPTSLIPQJ
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I6MMWFBOXJA6ZCXNVPDFJ4XMK5PVG5RG
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I6MMWFBOXJA6ZCXNVPDFJ4XMK5PVG5RG
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IJ6LAJJ2FTA2JVVOACCV5RZTOIZLXUNJ
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IJ6LAJJ2FTA2JVVOACCV5RZTOIZLXUNJ
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JNPMXL36YGS3GQEVI3Q5HKHJ7YAAQXL5
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JNPMXL36YGS3GQEVI3Q5HKHJ7YAAQXL5
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXKGNCRU7OTM5AHC7YIYBNOWI742PRMY
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXKGNCRU7OTM5AHC7YIYBNOWI742PRMY
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MSOMHDKRPU3A2JEMRODT2IREDFBLVPGS
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MSOMHDKRPU3A2JEMRODT2IREDFBLVPGS
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UG5FSEYJ3GP27FZXC5YAAMMEC5XWKJHG
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UG5FSEYJ3GP27FZXC5YAAMMEC5XWKJHG
16
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJO2U5ACZVACNQXJ5EBRFLFW6DP5BROY
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJO2U5ACZVACNQXJ5EBRFLFW6DP5BROY
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJDO5VSIAOGT2WP63AXAAWNRSVJCNCRH
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJDO5VSIAOGT2WP63AXAAWNRSVJCNCRH
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-28180
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-28180
19
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1065814
reference_id 1065814
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1065814
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2268854
reference_id 2268854
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2268854
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GD2GSBQTBLYADASUBHHZV2CZPTSLIPQJ/
reference_id GD2GSBQTBLYADASUBHHZV2CZPTSLIPQJ
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-11T15:08:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GD2GSBQTBLYADASUBHHZV2CZPTSLIPQJ/
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I6MMWFBOXJA6ZCXNVPDFJ4XMK5PVG5RG/
reference_id I6MMWFBOXJA6ZCXNVPDFJ4XMK5PVG5RG
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-11T15:08:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I6MMWFBOXJA6ZCXNVPDFJ4XMK5PVG5RG/
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IJ6LAJJ2FTA2JVVOACCV5RZTOIZLXUNJ/
reference_id IJ6LAJJ2FTA2JVVOACCV5RZTOIZLXUNJ
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-11T15:08:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IJ6LAJJ2FTA2JVVOACCV5RZTOIZLXUNJ/
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JNPMXL36YGS3GQEVI3Q5HKHJ7YAAQXL5/
reference_id JNPMXL36YGS3GQEVI3Q5HKHJ7YAAQXL5
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-11T15:08:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JNPMXL36YGS3GQEVI3Q5HKHJ7YAAQXL5/
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXKGNCRU7OTM5AHC7YIYBNOWI742PRMY/
reference_id KXKGNCRU7OTM5AHC7YIYBNOWI742PRMY
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-11T15:08:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXKGNCRU7OTM5AHC7YIYBNOWI742PRMY/
26
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MSOMHDKRPU3A2JEMRODT2IREDFBLVPGS/
reference_id MSOMHDKRPU3A2JEMRODT2IREDFBLVPGS
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-11T15:08:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MSOMHDKRPU3A2JEMRODT2IREDFBLVPGS/
27
reference_url https://access.redhat.com/errata/RHSA-2024:1456
reference_id RHSA-2024:1456
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1456
28
reference_url https://access.redhat.com/errata/RHSA-2024:1570
reference_id RHSA-2024:1570
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1570
29
reference_url https://access.redhat.com/errata/RHSA-2024:1812
reference_id RHSA-2024:1812
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1812
30
reference_url https://access.redhat.com/errata/RHSA-2024:1859
reference_id RHSA-2024:1859
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1859
31
reference_url https://access.redhat.com/errata/RHSA-2024:1946
reference_id RHSA-2024:1946
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1946
32
reference_url https://access.redhat.com/errata/RHSA-2024:2054
reference_id RHSA-2024:2054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2054
33
reference_url https://access.redhat.com/errata/RHSA-2024:2071
reference_id RHSA-2024:2071
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2071
34
reference_url https://access.redhat.com/errata/RHSA-2024:2096
reference_id RHSA-2024:2096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2096
35
reference_url https://access.redhat.com/errata/RHSA-2024:2549
reference_id RHSA-2024:2549
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2549
36
reference_url https://access.redhat.com/errata/RHSA-2024:2639
reference_id RHSA-2024:2639
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2639
37
reference_url https://access.redhat.com/errata/RHSA-2024:2773
reference_id RHSA-2024:2773
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2773
38
reference_url https://access.redhat.com/errata/RHSA-2024:2776
reference_id RHSA-2024:2776
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2776
39
reference_url https://access.redhat.com/errata/RHSA-2024:2865
reference_id RHSA-2024:2865
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2865
40
reference_url https://access.redhat.com/errata/RHSA-2024:2869
reference_id RHSA-2024:2869
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2869
41
reference_url https://access.redhat.com/errata/RHSA-2024:2875
reference_id RHSA-2024:2875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2875
42
reference_url https://access.redhat.com/errata/RHSA-2024:3327
reference_id RHSA-2024:3327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3327
43
reference_url https://access.redhat.com/errata/RHSA-2024:3349
reference_id RHSA-2024:3349
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3349
44
reference_url https://access.redhat.com/errata/RHSA-2024:3351
reference_id RHSA-2024:3351
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3351
45
reference_url https://access.redhat.com/errata/RHSA-2024:3523
reference_id RHSA-2024:3523
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3523
46
reference_url https://access.redhat.com/errata/RHSA-2024:3826
reference_id RHSA-2024:3826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3826
47
reference_url https://access.redhat.com/errata/RHSA-2024:3827
reference_id RHSA-2024:3827
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3827
48
reference_url https://access.redhat.com/errata/RHSA-2024:3968
reference_id RHSA-2024:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3968
49
reference_url https://access.redhat.com/errata/RHSA-2024:4006
reference_id RHSA-2024:4006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4006
50
reference_url https://access.redhat.com/errata/RHSA-2024:4010
reference_id RHSA-2024:4010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4010
51
reference_url https://access.redhat.com/errata/RHSA-2024:4041
reference_id RHSA-2024:4041
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4041
52
reference_url https://access.redhat.com/errata/RHSA-2024:4455
reference_id RHSA-2024:4455
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4455
53
reference_url https://access.redhat.com/errata/RHSA-2024:4484
reference_id RHSA-2024:4484
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4484
54
reference_url https://access.redhat.com/errata/RHSA-2024:6209
reference_id RHSA-2024:6209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6209
55
reference_url https://access.redhat.com/errata/RHSA-2024:7179
reference_id RHSA-2024:7179
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7179
56
reference_url https://access.redhat.com/errata/RHSA-2024:8229
reference_id RHSA-2024:8229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8229
57
reference_url https://access.redhat.com/errata/RHSA-2024:8235
reference_id RHSA-2024:8235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8235
58
reference_url https://access.redhat.com/errata/RHSA-2024:8974
reference_id RHSA-2024:8974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8974
59
reference_url https://access.redhat.com/errata/RHSA-2025:0536
reference_id RHSA-2025:0536
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0536
60
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UG5FSEYJ3GP27FZXC5YAAMMEC5XWKJHG/
reference_id UG5FSEYJ3GP27FZXC5YAAMMEC5XWKJHG
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-11T15:08:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UG5FSEYJ3GP27FZXC5YAAMMEC5XWKJHG/
61
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJO2U5ACZVACNQXJ5EBRFLFW6DP5BROY/
reference_id UJO2U5ACZVACNQXJ5EBRFLFW6DP5BROY
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-11T15:08:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJO2U5ACZVACNQXJ5EBRFLFW6DP5BROY/
62
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJDO5VSIAOGT2WP63AXAAWNRSVJCNCRH/
reference_id XJDO5VSIAOGT2WP63AXAAWNRSVJCNCRH
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-11T15:08:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJDO5VSIAOGT2WP63AXAAWNRSVJCNCRH/
fixed_packages
aliases CVE-2024-28180, GHSA-c5q2-7r4c-mv6g
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bq1t-9nnj-mkes
2
url VCID-wq29-hzz2-5beh
vulnerability_id VCID-wq29-hzz2-5beh
summary Multiple vulnerabilities have been discovered in Go, the worst of which could lead to information leakage or a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45290.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45290.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-45290
reference_id
reference_type
scores
0
value 0.00491
scoring_system epss
scoring_elements 0.65559
published_at 2026-04-02T12:55:00Z
1
value 0.00491
scoring_system epss
scoring_elements 0.65626
published_at 2026-04-21T12:55:00Z
2
value 0.00491
scoring_system epss
scoring_elements 0.65588
published_at 2026-04-04T12:55:00Z
3
value 0.00491
scoring_system epss
scoring_elements 0.65555
published_at 2026-04-07T12:55:00Z
4
value 0.00491
scoring_system epss
scoring_elements 0.65607
published_at 2026-04-08T12:55:00Z
5
value 0.00491
scoring_system epss
scoring_elements 0.6562
published_at 2026-04-09T12:55:00Z
6
value 0.00491
scoring_system epss
scoring_elements 0.65639
published_at 2026-04-11T12:55:00Z
7
value 0.00491
scoring_system epss
scoring_elements 0.65624
published_at 2026-04-12T12:55:00Z
8
value 0.00491
scoring_system epss
scoring_elements 0.65595
published_at 2026-04-13T12:55:00Z
9
value 0.00491
scoring_system epss
scoring_elements 0.6563
published_at 2026-04-16T12:55:00Z
10
value 0.00491
scoring_system epss
scoring_elements 0.65643
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-45290
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45290
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45290
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2268017
reference_id 2268017
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2268017
5
reference_url https://go.dev/cl/569341
reference_id 569341
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-06T15:04:15Z/
url https://go.dev/cl/569341
6
reference_url https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg
reference_id 5pwGVUPoMbg
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-06T15:04:15Z/
url https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg
7
reference_url https://go.dev/issue/65383
reference_id 65383
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-06T15:04:15Z/
url https://go.dev/issue/65383
8
reference_url https://security.gentoo.org/glsa/202408-07
reference_id GLSA-202408-07
reference_type
scores
url https://security.gentoo.org/glsa/202408-07
9
reference_url https://pkg.go.dev/vuln/GO-2024-2599
reference_id GO-2024-2599
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-06T15:04:15Z/
url https://pkg.go.dev/vuln/GO-2024-2599
10
reference_url https://security.netapp.com/advisory/ntap-20240329-0004/
reference_id ntap-20240329-0004
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-06T15:04:15Z/
url https://security.netapp.com/advisory/ntap-20240329-0004/
11
reference_url https://access.redhat.com/errata/RHSA-2024:1616
reference_id RHSA-2024:1616
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1616
12
reference_url https://access.redhat.com/errata/RHSA-2024:2096
reference_id RHSA-2024:2096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2096
13
reference_url https://access.redhat.com/errata/RHSA-2024:2724
reference_id RHSA-2024:2724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2724
14
reference_url https://access.redhat.com/errata/RHSA-2024:2901
reference_id RHSA-2024:2901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2901
15
reference_url https://access.redhat.com/errata/RHSA-2024:2941
reference_id RHSA-2024:2941
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2941
16
reference_url https://access.redhat.com/errata/RHSA-2024:3259
reference_id RHSA-2024:3259
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3259
17
reference_url https://access.redhat.com/errata/RHSA-2024:3346
reference_id RHSA-2024:3346
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3346
18
reference_url https://access.redhat.com/errata/RHSA-2024:3617
reference_id RHSA-2024:3617
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3617
19
reference_url https://access.redhat.com/errata/RHSA-2024:3621
reference_id RHSA-2024:3621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3621
20
reference_url https://access.redhat.com/errata/RHSA-2024:3637
reference_id RHSA-2024:3637
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3637
21
reference_url https://access.redhat.com/errata/RHSA-2024:3781
reference_id RHSA-2024:3781
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3781
22
reference_url https://access.redhat.com/errata/RHSA-2024:3790
reference_id RHSA-2024:3790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3790
23
reference_url https://access.redhat.com/errata/RHSA-2024:3826
reference_id RHSA-2024:3826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3826
24
reference_url https://access.redhat.com/errata/RHSA-2024:3827
reference_id RHSA-2024:3827
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3827
25
reference_url https://access.redhat.com/errata/RHSA-2024:3830
reference_id RHSA-2024:3830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3830
26
reference_url https://access.redhat.com/errata/RHSA-2024:3831
reference_id RHSA-2024:3831
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3831
27
reference_url https://access.redhat.com/errata/RHSA-2024:3868
reference_id RHSA-2024:3868
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3868
28
reference_url https://access.redhat.com/errata/RHSA-2024:4023
reference_id RHSA-2024:4023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4023
29
reference_url https://access.redhat.com/errata/RHSA-2024:4520
reference_id RHSA-2024:4520
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4520
30
reference_url https://access.redhat.com/errata/RHSA-2024:4893
reference_id RHSA-2024:4893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4893
31
reference_url https://access.redhat.com/errata/RHSA-2024:5013
reference_id RHSA-2024:5013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5013
32
reference_url https://access.redhat.com/errata/RHSA-2024:5075
reference_id RHSA-2024:5075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5075
33
reference_url https://access.redhat.com/errata/RHSA-2024:5077
reference_id RHSA-2024:5077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5077
34
reference_url https://access.redhat.com/errata/RHSA-2024:5202
reference_id RHSA-2024:5202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5202
35
reference_url https://access.redhat.com/errata/RHSA-2024:5433
reference_id RHSA-2024:5433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5433
36
reference_url https://access.redhat.com/errata/RHSA-2024:5436
reference_id RHSA-2024:5436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5436
37
reference_url https://access.redhat.com/errata/RHSA-2024:5439
reference_id RHSA-2024:5439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5439
38
reference_url https://access.redhat.com/errata/RHSA-2024:5442
reference_id RHSA-2024:5442
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5442
39
reference_url https://access.redhat.com/errata/RHSA-2024:5444
reference_id RHSA-2024:5444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5444
40
reference_url https://access.redhat.com/errata/RHSA-2024:5446
reference_id RHSA-2024:5446
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5446
41
reference_url https://access.redhat.com/errata/RHSA-2024:5808
reference_id RHSA-2024:5808
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5808
42
reference_url https://access.redhat.com/errata/RHSA-2024:5810
reference_id RHSA-2024:5810
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5810
43
reference_url https://access.redhat.com/errata/RHSA-2024:6221
reference_id RHSA-2024:6221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6221
44
reference_url https://access.redhat.com/errata/RHSA-2024:6969
reference_id RHSA-2024:6969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6969
45
reference_url https://access.redhat.com/errata/RHSA-2024:7548
reference_id RHSA-2024:7548
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7548
46
reference_url https://access.redhat.com/errata/RHSA-2024:8038
reference_id RHSA-2024:8038
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8038
47
reference_url https://access.redhat.com/errata/RHSA-2024:9135
reference_id RHSA-2024:9135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9135
48
reference_url https://access.redhat.com/errata/RHSA-2024:9485
reference_id RHSA-2024:9485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9485
49
reference_url https://access.redhat.com/errata/RHSA-2025:11889
reference_id RHSA-2025:11889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:11889
50
reference_url https://access.redhat.com/errata/RHSA-2025:9776
reference_id RHSA-2025:9776
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:9776
51
reference_url https://usn.ubuntu.com/6886-1/
reference_id USN-6886-1
reference_type
scores
url https://usn.ubuntu.com/6886-1/
52
reference_url https://usn.ubuntu.com/7109-1/
reference_id USN-7109-1
reference_type
scores
url https://usn.ubuntu.com/7109-1/
53
reference_url https://usn.ubuntu.com/7111-1/
reference_id USN-7111-1
reference_type
scores
url https://usn.ubuntu.com/7111-1/
fixed_packages
aliases CVE-2023-45290
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wq29-hzz2-5beh
Fixing_vulnerabilities
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/buildah@2:1.33.7-2%3Farch=el9_4