Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@4.18.0-513.9.1?arch=el8_9
Typerpm
Namespaceredhat
Namekernel
Version4.18.0-513.9.1
Qualifiers
arch el8_9
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-7bp6-cn74-ayar
vulnerability_id VCID-7bp6-cn74-ayar
summary kernel: mm/slab_common: slab_caches list corruption after kmem_cache_destroy()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52562.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52562.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-52562
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04509
published_at 2026-04-02T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04718
published_at 2026-04-24T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04556
published_at 2026-04-13T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04532
published_at 2026-04-16T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04541
published_at 2026-04-18T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04678
published_at 2026-04-21T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04535
published_at 2026-04-04T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04548
published_at 2026-04-07T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04584
published_at 2026-04-08T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.04599
published_at 2026-04-09T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04589
published_at 2026-04-11T12:55:00Z
11
value 0.00018
scoring_system epss
scoring_elements 0.04572
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-52562
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2267737
reference_id 2267737
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2267737
4
reference_url https://git.kernel.org/stable/c/46a9ea6681907a3be6b6b0d43776dccc62cad6cf
reference_id 46a9ea6681907a3be6b6b0d43776dccc62cad6cf
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:56:36Z/
url https://git.kernel.org/stable/c/46a9ea6681907a3be6b6b0d43776dccc62cad6cf
5
reference_url https://git.kernel.org/stable/c/51988be187b041e5355245957b0b9751fa382e0d
reference_id 51988be187b041e5355245957b0b9751fa382e0d
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:56:36Z/
url https://git.kernel.org/stable/c/51988be187b041e5355245957b0b9751fa382e0d
6
reference_url https://git.kernel.org/stable/c/a5569bb187521432f509b69dda7d29f78b2d38b0
reference_id a5569bb187521432f509b69dda7d29f78b2d38b0
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:56:36Z/
url https://git.kernel.org/stable/c/a5569bb187521432f509b69dda7d29f78b2d38b0
7
reference_url https://access.redhat.com/errata/RHSA-2023:7539
reference_id RHSA-2023:7539
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7539
8
reference_url https://access.redhat.com/errata/RHSA-2023:7549
reference_id RHSA-2023:7549
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7549
9
reference_url https://access.redhat.com/errata/RHSA-2024:0448
reference_id RHSA-2024:0448
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0448
fixed_packages
aliases CVE-2023-52562
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7bp6-cn74-ayar
1
url VCID-ae5d-jmsc-9ba5
vulnerability_id VCID-ae5d-jmsc-9ba5
summary kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2163.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2163.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2163
reference_id
reference_type
scores
0
value 0.00188
scoring_system epss
scoring_elements 0.40695
published_at 2026-04-02T12:55:00Z
1
value 0.00188
scoring_system epss
scoring_elements 0.40702
published_at 2026-04-09T12:55:00Z
2
value 0.00188
scoring_system epss
scoring_elements 0.40723
published_at 2026-04-04T12:55:00Z
3
value 0.00188
scoring_system epss
scoring_elements 0.40646
published_at 2026-04-07T12:55:00Z
4
value 0.00188
scoring_system epss
scoring_elements 0.40696
published_at 2026-04-08T12:55:00Z
5
value 0.00188
scoring_system epss
scoring_elements 0.40719
published_at 2026-04-11T12:55:00Z
6
value 0.00188
scoring_system epss
scoring_elements 0.40685
published_at 2026-04-12T12:55:00Z
7
value 0.00209
scoring_system epss
scoring_elements 0.43416
published_at 2026-04-16T12:55:00Z
8
value 0.00209
scoring_system epss
scoring_elements 0.43272
published_at 2026-04-24T12:55:00Z
9
value 0.00209
scoring_system epss
scoring_elements 0.43274
published_at 2026-04-26T12:55:00Z
10
value 0.00209
scoring_system epss
scoring_elements 0.43357
published_at 2026-04-13T12:55:00Z
11
value 0.00209
scoring_system epss
scoring_elements 0.43339
published_at 2026-04-21T12:55:00Z
12
value 0.00209
scoring_system epss
scoring_elements 0.43405
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2163
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2163
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2163
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2240249
reference_id 2240249
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2240249
5
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=71b547f561247897a0a14f3082730156c0533fed
reference_id ?id=71b547f561247897a0a14f3082730156c0533fed
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-02-26T21:50:53Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=71b547f561247897a0a14f3082730156c0533fed
6
reference_url https://access.redhat.com/errata/RHSA-2023:7548
reference_id RHSA-2023:7548
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7548
7
reference_url https://access.redhat.com/errata/RHSA-2023:7549
reference_id RHSA-2023:7549
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7549
8
reference_url https://access.redhat.com/errata/RHSA-2023:7554
reference_id RHSA-2023:7554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7554
9
reference_url https://access.redhat.com/errata/RHSA-2024:0376
reference_id RHSA-2024:0376
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0376
10
reference_url https://access.redhat.com/errata/RHSA-2024:0378
reference_id RHSA-2024:0378
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0378
11
reference_url https://access.redhat.com/errata/RHSA-2024:0381
reference_id RHSA-2024:0381
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0381
12
reference_url https://access.redhat.com/errata/RHSA-2024:0402
reference_id RHSA-2024:0402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0402
13
reference_url https://access.redhat.com/errata/RHSA-2024:0403
reference_id RHSA-2024:0403
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0403
14
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
15
reference_url https://access.redhat.com/errata/RHSA-2024:0439
reference_id RHSA-2024:0439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0439
16
reference_url https://access.redhat.com/errata/RHSA-2024:0448
reference_id RHSA-2024:0448
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0448
17
reference_url https://access.redhat.com/errata/RHSA-2024:0554
reference_id RHSA-2024:0554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0554
18
reference_url https://access.redhat.com/errata/RHSA-2024:0562
reference_id RHSA-2024:0562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0562
19
reference_url https://access.redhat.com/errata/RHSA-2024:0563
reference_id RHSA-2024:0563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0563
20
reference_url https://access.redhat.com/errata/RHSA-2024:0575
reference_id RHSA-2024:0575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0575
21
reference_url https://access.redhat.com/errata/RHSA-2024:0593
reference_id RHSA-2024:0593
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0593
22
reference_url https://access.redhat.com/errata/RHSA-2024:1250
reference_id RHSA-2024:1250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1250
23
reference_url https://access.redhat.com/errata/RHSA-2024:1253
reference_id RHSA-2024:1253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1253
24
reference_url https://access.redhat.com/errata/RHSA-2024:1306
reference_id RHSA-2024:1306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1306
25
reference_url https://usn.ubuntu.com/6300-1/
reference_id USN-6300-1
reference_type
scores
url https://usn.ubuntu.com/6300-1/
26
reference_url https://usn.ubuntu.com/6311-1/
reference_id USN-6311-1
reference_type
scores
url https://usn.ubuntu.com/6311-1/
27
reference_url https://usn.ubuntu.com/6332-1/
reference_id USN-6332-1
reference_type
scores
url https://usn.ubuntu.com/6332-1/
28
reference_url https://usn.ubuntu.com/6340-1/
reference_id USN-6340-1
reference_type
scores
url https://usn.ubuntu.com/6340-1/
29
reference_url https://usn.ubuntu.com/6340-2/
reference_id USN-6340-2
reference_type
scores
url https://usn.ubuntu.com/6340-2/
30
reference_url https://usn.ubuntu.com/6347-1/
reference_id USN-6347-1
reference_type
scores
url https://usn.ubuntu.com/6347-1/
31
reference_url https://usn.ubuntu.com/6349-1/
reference_id USN-6349-1
reference_type
scores
url https://usn.ubuntu.com/6349-1/
32
reference_url https://usn.ubuntu.com/6357-1/
reference_id USN-6357-1
reference_type
scores
url https://usn.ubuntu.com/6357-1/
33
reference_url https://usn.ubuntu.com/6385-1/
reference_id USN-6385-1
reference_type
scores
url https://usn.ubuntu.com/6385-1/
34
reference_url https://usn.ubuntu.com/6397-1/
reference_id USN-6397-1
reference_type
scores
url https://usn.ubuntu.com/6397-1/
fixed_packages
aliases CVE-2023-2163
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ae5d-jmsc-9ba5
2
url VCID-ed7y-vzk5-53bs
vulnerability_id VCID-ed7y-vzk5-53bs
summary kernel: use-after-free due to race condition occurring in dvb_ca_en50221.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45919.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45919.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-45919
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05947
published_at 2026-04-26T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05736
published_at 2026-04-18T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.0588
published_at 2026-04-21T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05911
published_at 2026-04-24T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06044
published_at 2026-04-07T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06122
published_at 2026-04-09T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06113
published_at 2026-04-11T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06109
published_at 2026-04-12T12:55:00Z
8
value 0.00023
scoring_system epss
scoring_elements 0.06101
published_at 2026-04-13T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06064
published_at 2026-04-16T12:55:00Z
10
value 0.00023
scoring_system epss
scoring_elements 0.06084
published_at 2026-04-08T12:55:00Z
11
value 0.00023
scoring_system epss
scoring_elements 0.06024
published_at 2026-04-02T12:55:00Z
12
value 0.00023
scoring_system epss
scoring_elements 0.06059
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-45919
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45919
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2151956
reference_id 2151956
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2151956
5
reference_url https://access.redhat.com/errata/RHSA-2023:7398
reference_id RHSA-2023:7398
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7398
6
reference_url https://access.redhat.com/errata/RHSA-2023:7539
reference_id RHSA-2023:7539
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7539
7
reference_url https://access.redhat.com/errata/RHSA-2023:7548
reference_id RHSA-2023:7548
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7548
8
reference_url https://access.redhat.com/errata/RHSA-2023:7549
reference_id RHSA-2023:7549
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7549
9
reference_url https://usn.ubuntu.com/6412-1/
reference_id USN-6412-1
reference_type
scores
url https://usn.ubuntu.com/6412-1/
10
reference_url https://usn.ubuntu.com/6466-1/
reference_id USN-6466-1
reference_type
scores
url https://usn.ubuntu.com/6466-1/
fixed_packages
aliases CVE-2022-45919
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ed7y-vzk5-53bs
3
url VCID-fzyb-pezt-bkbt
vulnerability_id VCID-fzyb-pezt-bkbt
summary kernel: use-after-free due to race condition occurring in dvb_register_device()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45884.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45884.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-45884
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04141
published_at 2026-04-02T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.0416
published_at 2026-04-04T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.03966
published_at 2026-04-07T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.03971
published_at 2026-04-08T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.03996
published_at 2026-04-09T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.03965
published_at 2026-04-11T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.03948
published_at 2026-04-12T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.03918
published_at 2026-04-13T12:55:00Z
8
value 0.00019
scoring_system epss
scoring_elements 0.05248
published_at 2026-04-26T12:55:00Z
9
value 0.00019
scoring_system epss
scoring_elements 0.04834
published_at 2026-04-16T12:55:00Z
10
value 0.00019
scoring_system epss
scoring_elements 0.04842
published_at 2026-04-18T12:55:00Z
11
value 0.00019
scoring_system epss
scoring_elements 0.0518
published_at 2026-04-21T12:55:00Z
12
value 0.00019
scoring_system epss
scoring_elements 0.05205
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-45884
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45884
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2148510
reference_id 2148510
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2148510
5
reference_url https://access.redhat.com/errata/RHSA-2023:7398
reference_id RHSA-2023:7398
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7398
6
reference_url https://access.redhat.com/errata/RHSA-2023:7539
reference_id RHSA-2023:7539
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7539
7
reference_url https://access.redhat.com/errata/RHSA-2023:7548
reference_id RHSA-2023:7548
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7548
8
reference_url https://access.redhat.com/errata/RHSA-2023:7549
reference_id RHSA-2023:7549
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7549
fixed_packages
aliases CVE-2022-45884
risk_score 2.9
exploitability 0.5
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fzyb-pezt-bkbt
4
url VCID-hxjx-3the-x3ff
vulnerability_id VCID-hxjx-3the-x3ff
summary kernel: use-after-free in smb2_is_status_io_timeout()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1192.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1192.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1192
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07282
published_at 2026-04-26T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.07188
published_at 2026-04-02T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.07265
published_at 2026-04-13T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07194
published_at 2026-04-16T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.07189
published_at 2026-04-18T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.07315
published_at 2026-04-21T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.07274
published_at 2026-04-24T12:55:00Z
7
value 0.00026
scoring_system epss
scoring_elements 0.07233
published_at 2026-04-04T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.07212
published_at 2026-04-07T12:55:00Z
9
value 0.00026
scoring_system epss
scoring_elements 0.07266
published_at 2026-04-08T12:55:00Z
10
value 0.00026
scoring_system epss
scoring_elements 0.07293
published_at 2026-04-09T12:55:00Z
11
value 0.00026
scoring_system epss
scoring_elements 0.07289
published_at 2026-04-11T12:55:00Z
12
value 0.00026
scoring_system epss
scoring_elements 0.07275
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1192
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1192
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1192
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2154178
reference_id 2154178
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-26T21:48:41Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2154178
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
9
reference_url https://access.redhat.com/security/cve/CVE-2023-1192
reference_id CVE-2023-1192
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-26T21:48:41Z/
url https://access.redhat.com/security/cve/CVE-2023-1192
10
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d527f51331cace562393a8038d870b3e9916686f
reference_id ?id=d527f51331cace562393a8038d870b3e9916686f
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-26T21:48:41Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d527f51331cace562393a8038d870b3e9916686f
11
reference_url https://access.redhat.com/errata/RHSA-2023:7539
reference_id RHSA-2023:7539
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7539
12
reference_url https://access.redhat.com/errata/RHSA-2023:7548
reference_id RHSA-2023:7548
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7548
13
reference_url https://access.redhat.com/errata/RHSA-2023:7549
reference_id RHSA-2023:7549
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7549
14
reference_url https://access.redhat.com/errata/RHSA-2023:7749
reference_id RHSA-2023:7749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7749
15
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
16
reference_url https://access.redhat.com/errata/RHSA-2024:0439
reference_id RHSA-2024:0439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0439
17
reference_url https://access.redhat.com/errata/RHSA-2024:0448
reference_id RHSA-2024:0448
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0448
18
reference_url https://access.redhat.com/errata/RHSA-2024:0562
reference_id RHSA-2024:0562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0562
19
reference_url https://access.redhat.com/errata/RHSA-2024:0563
reference_id RHSA-2024:0563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0563
20
reference_url https://access.redhat.com/errata/RHSA-2024:1250
reference_id RHSA-2024:1250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1250
21
reference_url https://access.redhat.com/errata/RHSA-2024:1306
reference_id RHSA-2024:1306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1306
22
reference_url https://access.redhat.com/errata/RHSA-2024:2006
reference_id RHSA-2024:2006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2006
23
reference_url https://access.redhat.com/errata/RHSA-2024:2008
reference_id RHSA-2024:2008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2008
fixed_packages
aliases CVE-2023-1192
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hxjx-3the-x3ff
5
url VCID-mhcw-xhun-3fe7
vulnerability_id VCID-mhcw-xhun-3fe7
summary kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3812.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3812.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3812
reference_id
reference_type
scores
0
value 8e-05
scoring_system epss
scoring_elements 0.00764
published_at 2026-04-24T12:55:00Z
1
value 8e-05
scoring_system epss
scoring_elements 0.00727
published_at 2026-04-11T12:55:00Z
2
value 8e-05
scoring_system epss
scoring_elements 0.00721
published_at 2026-04-16T12:55:00Z
3
value 8e-05
scoring_system epss
scoring_elements 0.00726
published_at 2026-04-18T12:55:00Z
4
value 8e-05
scoring_system epss
scoring_elements 0.00766
published_at 2026-04-26T12:55:00Z
5
value 8e-05
scoring_system epss
scoring_elements 0.00737
published_at 2026-04-02T12:55:00Z
6
value 8e-05
scoring_system epss
scoring_elements 0.00735
published_at 2026-04-04T12:55:00Z
7
value 8e-05
scoring_system epss
scoring_elements 0.0074
published_at 2026-04-07T12:55:00Z
8
value 8e-05
scoring_system epss
scoring_elements 0.00739
published_at 2026-04-08T12:55:00Z
9
value 8e-05
scoring_system epss
scoring_elements 0.00731
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3812
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3812
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2224048
reference_id 2224048
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2224048
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv
reference_id cpe:/a:redhat:enterprise_linux:8::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime
reference_id cpe:/a:redhat:enterprise_linux:8::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv
reference_id cpe:/a:redhat:enterprise_linux:9::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime
reference_id cpe:/a:redhat:enterprise_linux:9::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb
reference_id cpe:/a:redhat:rhel_eus:8.6::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb
reference_id cpe:/a:redhat:rhel_eus:8.8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb
reference_id cpe:/a:redhat:rhel_eus:9.0::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::nfv
reference_id cpe:/a:redhat:rhel_eus:9.0::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::nfv
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::realtime
reference_id cpe:/a:redhat:rhel_eus:9.0::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::realtime
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb
reference_id cpe:/a:redhat:rhel_eus:9.2::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv
reference_id cpe:/a:redhat:rhel_eus:9.2::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime
reference_id cpe:/a:redhat:rhel_eus:9.2::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::nfv
reference_id cpe:/a:redhat:rhel_tus:8.2::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::nfv
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::realtime
reference_id cpe:/a:redhat:rhel_tus:8.2::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::realtime
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::nfv
reference_id cpe:/a:redhat:rhel_tus:8.4::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::nfv
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::realtime
reference_id cpe:/a:redhat:rhel_tus:8.4::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::realtime
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.1::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.1::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.1::baseos
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.2::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.2::baseos
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.4::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.4::baseos
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
reference_id cpe:/o:redhat:rhel_eus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos
reference_id cpe:/o:redhat:rhel_eus:9.0::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
reference_id cpe:/o:redhat:rhel_eus:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.2::baseos
reference_id cpe:/o:redhat:rhel_tus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.2::baseos
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.4::baseos
reference_id cpe:/o:redhat:rhel_tus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.4::baseos
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8
reference_id cpe:/o:redhat:rhev_hypervisor:4.4::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8
43
reference_url https://access.redhat.com/security/cve/CVE-2023-3812
reference_id CVE-2023-3812
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/
url https://access.redhat.com/security/cve/CVE-2023-3812
44
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=363a5328f4b0
reference_id ?id=363a5328f4b0
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=363a5328f4b0
45
reference_url https://access.redhat.com/errata/RHSA-2023:6799
reference_id RHSA-2023:6799
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/
url https://access.redhat.com/errata/RHSA-2023:6799
46
reference_url https://access.redhat.com/errata/RHSA-2023:6813
reference_id RHSA-2023:6813
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/
url https://access.redhat.com/errata/RHSA-2023:6813
47
reference_url https://access.redhat.com/errata/RHSA-2023:7370
reference_id RHSA-2023:7370
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/
url https://access.redhat.com/errata/RHSA-2023:7370
48
reference_url https://access.redhat.com/errata/RHSA-2023:7379
reference_id RHSA-2023:7379
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/
url https://access.redhat.com/errata/RHSA-2023:7379
49
reference_url https://access.redhat.com/errata/RHSA-2023:7382
reference_id RHSA-2023:7382
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/
url https://access.redhat.com/errata/RHSA-2023:7382
50
reference_url https://access.redhat.com/errata/RHSA-2023:7389
reference_id RHSA-2023:7389
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/
url https://access.redhat.com/errata/RHSA-2023:7389
51
reference_url https://access.redhat.com/errata/RHSA-2023:7411
reference_id RHSA-2023:7411
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/
url https://access.redhat.com/errata/RHSA-2023:7411
52
reference_url https://access.redhat.com/errata/RHSA-2023:7418
reference_id RHSA-2023:7418
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/
url https://access.redhat.com/errata/RHSA-2023:7418
53
reference_url https://access.redhat.com/errata/RHSA-2023:7548
reference_id RHSA-2023:7548
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/
url https://access.redhat.com/errata/RHSA-2023:7548
54
reference_url https://access.redhat.com/errata/RHSA-2023:7549
reference_id RHSA-2023:7549
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/
url https://access.redhat.com/errata/RHSA-2023:7549
55
reference_url https://access.redhat.com/errata/RHSA-2023:7554
reference_id RHSA-2023:7554
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/
url https://access.redhat.com/errata/RHSA-2023:7554
56
reference_url https://access.redhat.com/errata/RHSA-2024:0340
reference_id RHSA-2024:0340
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/
url https://access.redhat.com/errata/RHSA-2024:0340
57
reference_url https://access.redhat.com/errata/RHSA-2024:0378
reference_id RHSA-2024:0378
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/
url https://access.redhat.com/errata/RHSA-2024:0378
58
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/
url https://access.redhat.com/errata/RHSA-2024:0412
59
reference_url https://access.redhat.com/errata/RHSA-2024:0461
reference_id RHSA-2024:0461
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/
url https://access.redhat.com/errata/RHSA-2024:0461
60
reference_url https://access.redhat.com/errata/RHSA-2024:0554
reference_id RHSA-2024:0554
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/
url https://access.redhat.com/errata/RHSA-2024:0554
61
reference_url https://access.redhat.com/errata/RHSA-2024:0562
reference_id RHSA-2024:0562
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/
url https://access.redhat.com/errata/RHSA-2024:0562
62
reference_url https://access.redhat.com/errata/RHSA-2024:0563
reference_id RHSA-2024:0563
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/
url https://access.redhat.com/errata/RHSA-2024:0563
63
reference_url https://access.redhat.com/errata/RHSA-2024:0575
reference_id RHSA-2024:0575
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/
url https://access.redhat.com/errata/RHSA-2024:0575
64
reference_url https://access.redhat.com/errata/RHSA-2024:0593
reference_id RHSA-2024:0593
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/
url https://access.redhat.com/errata/RHSA-2024:0593
65
reference_url https://access.redhat.com/errata/RHSA-2024:1961
reference_id RHSA-2024:1961
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/
url https://access.redhat.com/errata/RHSA-2024:1961
66
reference_url https://access.redhat.com/errata/RHSA-2024:2006
reference_id RHSA-2024:2006
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/
url https://access.redhat.com/errata/RHSA-2024:2006
67
reference_url https://access.redhat.com/errata/RHSA-2024:2008
reference_id RHSA-2024:2008
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:18Z/
url https://access.redhat.com/errata/RHSA-2024:2008
fixed_packages
aliases CVE-2023-3812
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mhcw-xhun-3fe7
6
url VCID-s15g-xfaf-pqck
vulnerability_id VCID-s15g-xfaf-pqck
summary kernel: use after free in nvmet_tcp_free_crypto in NVMe
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5178.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5178.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5178
reference_id
reference_type
scores
0
value 0.08634
scoring_system epss
scoring_elements 0.92459
published_at 2026-04-24T12:55:00Z
1
value 0.08634
scoring_system epss
scoring_elements 0.92453
published_at 2026-04-18T12:55:00Z
2
value 0.08634
scoring_system epss
scoring_elements 0.92456
published_at 2026-04-21T12:55:00Z
3
value 0.08634
scoring_system epss
scoring_elements 0.92417
published_at 2026-04-04T12:55:00Z
4
value 0.08634
scoring_system epss
scoring_elements 0.9242
published_at 2026-04-07T12:55:00Z
5
value 0.08634
scoring_system epss
scoring_elements 0.92432
published_at 2026-04-08T12:55:00Z
6
value 0.08634
scoring_system epss
scoring_elements 0.92437
published_at 2026-04-09T12:55:00Z
7
value 0.08634
scoring_system epss
scoring_elements 0.92443
published_at 2026-04-13T12:55:00Z
8
value 0.08634
scoring_system epss
scoring_elements 0.92445
published_at 2026-04-12T12:55:00Z
9
value 0.08634
scoring_system epss
scoring_elements 0.92454
published_at 2026-04-16T12:55:00Z
10
value 0.09291
scoring_system epss
scoring_elements 0.92718
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5178
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241924
reference_id 2241924
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2241924
22
reference_url https://access.redhat.com/errata/RHSA-2023:7370
reference_id RHSA-2023:7370
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7370
23
reference_url https://access.redhat.com/errata/RHSA-2023:7379
reference_id RHSA-2023:7379
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7379
24
reference_url https://access.redhat.com/errata/RHSA-2023:7418
reference_id RHSA-2023:7418
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7418
25
reference_url https://access.redhat.com/errata/RHSA-2023:7548
reference_id RHSA-2023:7548
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7548
26
reference_url https://access.redhat.com/errata/RHSA-2023:7549
reference_id RHSA-2023:7549
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7549
27
reference_url https://access.redhat.com/errata/RHSA-2023:7551
reference_id RHSA-2023:7551
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7551
28
reference_url https://access.redhat.com/errata/RHSA-2023:7554
reference_id RHSA-2023:7554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7554
29
reference_url https://access.redhat.com/errata/RHSA-2023:7557
reference_id RHSA-2023:7557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7557
30
reference_url https://access.redhat.com/errata/RHSA-2023:7559
reference_id RHSA-2023:7559
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7559
31
reference_url https://access.redhat.com/errata/RHSA-2024:0340
reference_id RHSA-2024:0340
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0340
32
reference_url https://access.redhat.com/errata/RHSA-2024:0378
reference_id RHSA-2024:0378
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0378
33
reference_url https://access.redhat.com/errata/RHSA-2024:0386
reference_id RHSA-2024:0386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0386
34
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
35
reference_url https://access.redhat.com/errata/RHSA-2024:0431
reference_id RHSA-2024:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0431
36
reference_url https://access.redhat.com/errata/RHSA-2024:0432
reference_id RHSA-2024:0432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0432
37
reference_url https://access.redhat.com/errata/RHSA-2024:0461
reference_id RHSA-2024:0461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0461
38
reference_url https://access.redhat.com/errata/RHSA-2024:0554
reference_id RHSA-2024:0554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0554
39
reference_url https://access.redhat.com/errata/RHSA-2024:0575
reference_id RHSA-2024:0575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0575
40
reference_url https://access.redhat.com/errata/RHSA-2024:1268
reference_id RHSA-2024:1268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1268
41
reference_url https://access.redhat.com/errata/RHSA-2024:1269
reference_id RHSA-2024:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1269
42
reference_url https://access.redhat.com/errata/RHSA-2024:1278
reference_id RHSA-2024:1278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1278
43
reference_url https://usn.ubuntu.com/6497-1/
reference_id USN-6497-1
reference_type
scores
url https://usn.ubuntu.com/6497-1/
44
reference_url https://usn.ubuntu.com/6534-1/
reference_id USN-6534-1
reference_type
scores
url https://usn.ubuntu.com/6534-1/
45
reference_url https://usn.ubuntu.com/6534-2/
reference_id USN-6534-2
reference_type
scores
url https://usn.ubuntu.com/6534-2/
46
reference_url https://usn.ubuntu.com/6534-3/
reference_id USN-6534-3
reference_type
scores
url https://usn.ubuntu.com/6534-3/
47
reference_url https://usn.ubuntu.com/6536-1/
reference_id USN-6536-1
reference_type
scores
url https://usn.ubuntu.com/6536-1/
48
reference_url https://usn.ubuntu.com/6537-1/
reference_id USN-6537-1
reference_type
scores
url https://usn.ubuntu.com/6537-1/
49
reference_url https://usn.ubuntu.com/6548-1/
reference_id USN-6548-1
reference_type
scores
url https://usn.ubuntu.com/6548-1/
50
reference_url https://usn.ubuntu.com/6548-2/
reference_id USN-6548-2
reference_type
scores
url https://usn.ubuntu.com/6548-2/
51
reference_url https://usn.ubuntu.com/6548-3/
reference_id USN-6548-3
reference_type
scores
url https://usn.ubuntu.com/6548-3/
52
reference_url https://usn.ubuntu.com/6548-4/
reference_id USN-6548-4
reference_type
scores
url https://usn.ubuntu.com/6548-4/
53
reference_url https://usn.ubuntu.com/6548-5/
reference_id USN-6548-5
reference_type
scores
url https://usn.ubuntu.com/6548-5/
54
reference_url https://usn.ubuntu.com/6549-1/
reference_id USN-6549-1
reference_type
scores
url https://usn.ubuntu.com/6549-1/
55
reference_url https://usn.ubuntu.com/6549-2/
reference_id USN-6549-2
reference_type
scores
url https://usn.ubuntu.com/6549-2/
56
reference_url https://usn.ubuntu.com/6549-3/
reference_id USN-6549-3
reference_type
scores
url https://usn.ubuntu.com/6549-3/
57
reference_url https://usn.ubuntu.com/6549-4/
reference_id USN-6549-4
reference_type
scores
url https://usn.ubuntu.com/6549-4/
58
reference_url https://usn.ubuntu.com/6549-5/
reference_id USN-6549-5
reference_type
scores
url https://usn.ubuntu.com/6549-5/
59
reference_url https://usn.ubuntu.com/6573-1/
reference_id USN-6573-1
reference_type
scores
url https://usn.ubuntu.com/6573-1/
60
reference_url https://usn.ubuntu.com/6635-1/
reference_id USN-6635-1
reference_type
scores
url https://usn.ubuntu.com/6635-1/
fixed_packages
aliases CVE-2023-5178
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s15g-xfaf-pqck
7
url VCID-srrf-b9jk-5uge
vulnerability_id VCID-srrf-b9jk-5uge
summary kernel: use-after-free due to race condition occurring in dvb_net.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45886.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45886.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-45886
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05382
published_at 2026-04-26T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05148
published_at 2026-04-16T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05151
published_at 2026-04-18T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05303
published_at 2026-04-21T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05341
published_at 2026-04-24T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05617
published_at 2026-04-09T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05588
published_at 2026-04-11T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05578
published_at 2026-04-12T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.0557
published_at 2026-04-13T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.05592
published_at 2026-04-08T12:55:00Z
10
value 0.00021
scoring_system epss
scoring_elements 0.0552
published_at 2026-04-02T12:55:00Z
11
value 0.00021
scoring_system epss
scoring_elements 0.05555
published_at 2026-04-04T12:55:00Z
12
value 0.00021
scoring_system epss
scoring_elements 0.05554
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-45886
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45886
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2148517
reference_id 2148517
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2148517
5
reference_url https://access.redhat.com/errata/RHSA-2023:7398
reference_id RHSA-2023:7398
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7398
6
reference_url https://access.redhat.com/errata/RHSA-2023:7539
reference_id RHSA-2023:7539
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7539
7
reference_url https://access.redhat.com/errata/RHSA-2023:7548
reference_id RHSA-2023:7548
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7548
8
reference_url https://access.redhat.com/errata/RHSA-2023:7549
reference_id RHSA-2023:7549
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7549
9
reference_url https://usn.ubuntu.com/6412-1/
reference_id USN-6412-1
reference_type
scores
url https://usn.ubuntu.com/6412-1/
10
reference_url https://usn.ubuntu.com/6466-1/
reference_id USN-6466-1
reference_type
scores
url https://usn.ubuntu.com/6466-1/
fixed_packages
aliases CVE-2022-45886
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-srrf-b9jk-5uge
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-513.9.1%3Farch=el8_9