Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/microshift@4.14.0-202310261440.p0.g1586504.assembly.4.14.0?arch=el9
Typerpm
Namespaceredhat
Namemicroshift
Version4.14.0-202310261440.p0.g1586504.assembly.4.14.0
Qualifiers
arch el9
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-4c51-73a9-17f9
vulnerability_id VCID-4c51-73a9-17f9
summary Multiple vulnerabilities have been discovered in Go, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39322.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39322.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39322
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.12871
published_at 2026-04-02T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.1276
published_at 2026-04-21T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.12804
published_at 2026-04-08T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12854
published_at 2026-04-09T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12821
published_at 2026-04-11T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.12784
published_at 2026-04-12T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.12738
published_at 2026-04-13T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.1264
published_at 2026-04-16T12:55:00Z
8
value 0.00042
scoring_system epss
scoring_elements 0.12649
published_at 2026-04-18T12:55:00Z
9
value 0.00042
scoring_system epss
scoring_elements 0.12922
published_at 2026-04-04T12:55:00Z
10
value 0.00042
scoring_system epss
scoring_elements 0.12724
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39322
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2237778
reference_id 2237778
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2237778
4
reference_url https://go.dev/cl/523039
reference_id 523039
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:53:33Z/
url https://go.dev/cl/523039
5
reference_url https://go.dev/issue/62266
reference_id 62266
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:53:33Z/
url https://go.dev/issue/62266
6
reference_url https://pkg.go.dev/vuln/GO-2023-2045
reference_id GO-2023-2045
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:53:33Z/
url https://pkg.go.dev/vuln/GO-2023-2045
7
reference_url https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ
reference_id L1hdrPhfBAAJ
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:53:33Z/
url https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ
8
reference_url https://security.netapp.com/advisory/ntap-20231020-0004/
reference_id ntap-20231020-0004
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:53:33Z/
url https://security.netapp.com/advisory/ntap-20231020-0004/
9
reference_url https://access.redhat.com/errata/RHSA-2023:5009
reference_id RHSA-2023:5009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5009
10
reference_url https://access.redhat.com/errata/RHSA-2023:5947
reference_id RHSA-2023:5947
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5947
11
reference_url https://access.redhat.com/errata/RHSA-2023:5974
reference_id RHSA-2023:5974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5974
12
reference_url https://access.redhat.com/errata/RHSA-2023:6031
reference_id RHSA-2023:6031
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6031
13
reference_url https://access.redhat.com/errata/RHSA-2023:6115
reference_id RHSA-2023:6115
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6115
14
reference_url https://access.redhat.com/errata/RHSA-2023:6154
reference_id RHSA-2023:6154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6154
15
reference_url https://access.redhat.com/errata/RHSA-2023:6161
reference_id RHSA-2023:6161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6161
16
reference_url https://access.redhat.com/errata/RHSA-2023:6840
reference_id RHSA-2023:6840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6840
17
reference_url https://access.redhat.com/errata/RHSA-2023:7517
reference_id RHSA-2023:7517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7517
18
reference_url https://access.redhat.com/errata/RHSA-2023:7762
reference_id RHSA-2023:7762
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7762
19
reference_url https://access.redhat.com/errata/RHSA-2023:7763
reference_id RHSA-2023:7763
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7763
20
reference_url https://access.redhat.com/errata/RHSA-2023:7764
reference_id RHSA-2023:7764
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7764
21
reference_url https://access.redhat.com/errata/RHSA-2023:7765
reference_id RHSA-2023:7765
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7765
22
reference_url https://access.redhat.com/errata/RHSA-2023:7766
reference_id RHSA-2023:7766
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7766
23
reference_url https://access.redhat.com/errata/RHSA-2024:0121
reference_id RHSA-2024:0121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0121
24
reference_url https://access.redhat.com/errata/RHSA-2024:1383
reference_id RHSA-2024:1383
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1383
25
reference_url https://access.redhat.com/errata/RHSA-2024:1901
reference_id RHSA-2024:1901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1901
26
reference_url https://access.redhat.com/errata/RHSA-2024:2988
reference_id RHSA-2024:2988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2988
27
reference_url https://access.redhat.com/errata/RHSA-2024:3467
reference_id RHSA-2024:3467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3467
fixed_packages
aliases CVE-2023-39322
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4c51-73a9-17f9
1
url VCID-67w5-xc8t-pqby
vulnerability_id VCID-67w5-xc8t-pqby
summary
kube-apiserver authentication bypass vulnerability
An authentication bypass vulnerability was discovered in kube-apiserver. This issue could allow a remote, authenticated attacker who has been given permissions "update, patch" the "pods/ephemeralcontainers" subresource beyond what the default is. They would then need to create a new pod or patch one that they already have access to. This might allow evasion of SCC admission restrictions, thereby gaining control of a privileged pod.
references
0
reference_url https://access.redhat.com/errata/RHSA-2023:3976
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2023:3976
1
reference_url https://access.redhat.com/errata/RHSA-2023:4093
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2023:4093
2
reference_url https://access.redhat.com/errata/RHSA-2023:4312
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2023:4312
3
reference_url https://access.redhat.com/errata/RHSA-2023:4898
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2023:4898
4
reference_url https://access.redhat.com/errata/RHSA-2023:5008
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2023:5008
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1260.json
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1260.json
6
reference_url https://access.redhat.com/security/cve/CVE-2023-1260
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/CVE-2023-1260
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1260
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.18277
published_at 2026-04-02T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19935
published_at 2026-04-04T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19674
published_at 2026-04-18T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19688
published_at 2026-04-21T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.19672
published_at 2026-04-16T12:55:00Z
5
value 0.00063
scoring_system epss
scoring_elements 0.19697
published_at 2026-04-13T12:55:00Z
6
value 0.00063
scoring_system epss
scoring_elements 0.19754
published_at 2026-04-12T12:55:00Z
7
value 0.00063
scoring_system epss
scoring_elements 0.19799
published_at 2026-04-11T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.19795
published_at 2026-04-09T12:55:00Z
9
value 0.00063
scoring_system epss
scoring_elements 0.19743
published_at 2026-04-08T12:55:00Z
10
value 0.00063
scoring_system epss
scoring_elements 0.19663
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1260
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2176267
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=2176267
9
reference_url https://github.com/advisories/GHSA-92hx-3mh6-hc49
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-92hx-3mh6-hc49
10
reference_url https://github.com/openshift/apiserver-library-go
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/openshift/apiserver-library-go
11
reference_url https://github.com/openshift/apiserver-library-go/commit/a994128188486d2dce99a528fbcc017d276081e0
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/openshift/apiserver-library-go/commit/a994128188486d2dce99a528fbcc017d276081e0
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-1260
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-1260
13
reference_url https://security.netapp.com/advisory/ntap-20231020-0010
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20231020-0010
fixed_packages
aliases CVE-2023-1260, GHSA-92hx-3mh6-hc49
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-67w5-xc8t-pqby
2
url VCID-7359-arkb-zkg6
vulnerability_id VCID-7359-arkb-zkg6
summary
Kubernetes mountable secrets policy bypass
Users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using ephemeral containers. The policy ensures pods running with a service account may only reference secrets specified in the service account’s secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the `kubernetes.io/enforce-mountable-secrets` annotation are used together with ephemeral containers.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2728.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2728.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2728
reference_id
reference_type
scores
0
value 0.04853
scoring_system epss
scoring_elements 0.89556
published_at 2026-04-18T12:55:00Z
1
value 0.04853
scoring_system epss
scoring_elements 0.89554
published_at 2026-04-21T12:55:00Z
2
value 0.04853
scoring_system epss
scoring_elements 0.89546
published_at 2026-04-12T12:55:00Z
3
value 0.04853
scoring_system epss
scoring_elements 0.89548
published_at 2026-04-11T12:55:00Z
4
value 0.04853
scoring_system epss
scoring_elements 0.89521
published_at 2026-04-07T12:55:00Z
5
value 0.04853
scoring_system epss
scoring_elements 0.89509
published_at 2026-04-02T12:55:00Z
6
value 0.04853
scoring_system epss
scoring_elements 0.89541
published_at 2026-04-13T12:55:00Z
7
value 0.04853
scoring_system epss
scoring_elements 0.89537
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2728
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2728
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/kubernetes/kubernetes
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes
5
reference_url https://github.com/kubernetes/kubernetes/issues/118640
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-25T17:02:56Z/
url https://github.com/kubernetes/kubernetes/issues/118640
6
reference_url https://github.com/kubernetes/kubernetes/pull/118356
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/118356
7
reference_url https://github.com/kubernetes/kubernetes/pull/118471
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/118471
8
reference_url https://github.com/kubernetes/kubernetes/pull/118473
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/118473
9
reference_url https://github.com/kubernetes/kubernetes/pull/118474
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/118474
10
reference_url https://github.com/kubernetes/kubernetes/pull/118512
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/118512
11
reference_url https://groups.google.com/g/kubernetes-security-announce/c/vPWYJ_L84m8
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-25T17:02:56Z/
url https://groups.google.com/g/kubernetes-security-announce/c/vPWYJ_L84m8
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-2728
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-2728
13
reference_url https://security.netapp.com/advisory/ntap-20230803-0004
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20230803-0004
14
reference_url http://www.openwall.com/lists/oss-security/2023/07/06/3
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-25T17:02:56Z/
url http://www.openwall.com/lists/oss-security/2023/07/06/3
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2211348
reference_id 2211348
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2211348
16
reference_url https://security.netapp.com/advisory/ntap-20230803-0004/
reference_id ntap-20230803-0004
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-25T17:02:56Z/
url https://security.netapp.com/advisory/ntap-20230803-0004/
17
reference_url https://access.redhat.com/errata/RHSA-2023:5009
reference_id RHSA-2023:5009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5009
fixed_packages
aliases CVE-2023-2728, GHSA-cgcv-5272-97pr
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7359-arkb-zkg6
3
url VCID-95zc-mxqu-tyfp
vulnerability_id VCID-95zc-mxqu-tyfp
summary Multiple vulnerabilities have been discovered in Go, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39318.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39318.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39318
reference_id
reference_type
scores
0
value 0.00087
scoring_system epss
scoring_elements 0.24872
published_at 2026-04-21T12:55:00Z
1
value 0.00105
scoring_system epss
scoring_elements 0.28726
published_at 2026-04-02T12:55:00Z
2
value 0.00105
scoring_system epss
scoring_elements 0.28647
published_at 2026-04-08T12:55:00Z
3
value 0.00105
scoring_system epss
scoring_elements 0.28687
published_at 2026-04-09T12:55:00Z
4
value 0.00105
scoring_system epss
scoring_elements 0.28689
published_at 2026-04-11T12:55:00Z
5
value 0.00105
scoring_system epss
scoring_elements 0.28645
published_at 2026-04-12T12:55:00Z
6
value 0.00105
scoring_system epss
scoring_elements 0.28597
published_at 2026-04-13T12:55:00Z
7
value 0.00105
scoring_system epss
scoring_elements 0.28617
published_at 2026-04-16T12:55:00Z
8
value 0.00105
scoring_system epss
scoring_elements 0.28592
published_at 2026-04-18T12:55:00Z
9
value 0.00105
scoring_system epss
scoring_elements 0.28774
published_at 2026-04-04T12:55:00Z
10
value 0.00105
scoring_system epss
scoring_elements 0.28581
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39318
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39318
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2237776
reference_id 2237776
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2237776
5
reference_url https://go.dev/cl/526156
reference_id 526156
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T16:02:51Z/
url https://go.dev/cl/526156
6
reference_url https://go.dev/issue/62196
reference_id 62196
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T16:02:51Z/
url https://go.dev/issue/62196
7
reference_url https://pkg.go.dev/vuln/GO-2023-2041
reference_id GO-2023-2041
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T16:02:51Z/
url https://pkg.go.dev/vuln/GO-2023-2041
8
reference_url https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ
reference_id L1hdrPhfBAAJ
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T16:02:51Z/
url https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ
9
reference_url https://security.netapp.com/advisory/ntap-20231020-0009/
reference_id ntap-20231020-0009
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T16:02:51Z/
url https://security.netapp.com/advisory/ntap-20231020-0009/
10
reference_url https://access.redhat.com/errata/RHSA-2023:5009
reference_id RHSA-2023:5009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5009
11
reference_url https://access.redhat.com/errata/RHSA-2023:5947
reference_id RHSA-2023:5947
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5947
12
reference_url https://access.redhat.com/errata/RHSA-2023:5974
reference_id RHSA-2023:5974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5974
13
reference_url https://access.redhat.com/errata/RHSA-2023:6115
reference_id RHSA-2023:6115
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6115
14
reference_url https://access.redhat.com/errata/RHSA-2023:6154
reference_id RHSA-2023:6154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6154
15
reference_url https://access.redhat.com/errata/RHSA-2023:6161
reference_id RHSA-2023:6161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6161
16
reference_url https://access.redhat.com/errata/RHSA-2023:6840
reference_id RHSA-2023:6840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6840
17
reference_url https://access.redhat.com/errata/RHSA-2023:7762
reference_id RHSA-2023:7762
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7762
18
reference_url https://access.redhat.com/errata/RHSA-2023:7764
reference_id RHSA-2023:7764
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7764
19
reference_url https://access.redhat.com/errata/RHSA-2023:7765
reference_id RHSA-2023:7765
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7765
20
reference_url https://access.redhat.com/errata/RHSA-2023:7766
reference_id RHSA-2023:7766
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7766
21
reference_url https://access.redhat.com/errata/RHSA-2024:0121
reference_id RHSA-2024:0121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0121
22
reference_url https://access.redhat.com/errata/RHSA-2024:1383
reference_id RHSA-2024:1383
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1383
23
reference_url https://access.redhat.com/errata/RHSA-2024:1901
reference_id RHSA-2024:1901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1901
24
reference_url https://access.redhat.com/errata/RHSA-2024:2160
reference_id RHSA-2024:2160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2160
25
reference_url https://access.redhat.com/errata/RHSA-2024:2988
reference_id RHSA-2024:2988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2988
26
reference_url https://access.redhat.com/errata/RHSA-2024:3467
reference_id RHSA-2024:3467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3467
27
reference_url https://usn.ubuntu.com/6574-1/
reference_id USN-6574-1
reference_type
scores
url https://usn.ubuntu.com/6574-1/
28
reference_url https://usn.ubuntu.com/7061-1/
reference_id USN-7061-1
reference_type
scores
url https://usn.ubuntu.com/7061-1/
29
reference_url https://usn.ubuntu.com/7109-1/
reference_id USN-7109-1
reference_type
scores
url https://usn.ubuntu.com/7109-1/
fixed_packages
aliases CVE-2023-39318
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-95zc-mxqu-tyfp
4
url VCID-a25b-3vep-y3gm
vulnerability_id VCID-a25b-3vep-y3gm
summary Multiple vulnerabilities have been discovered in Go, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39319.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39319.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39319
reference_id
reference_type
scores
0
value 0.00087
scoring_system epss
scoring_elements 0.24872
published_at 2026-04-21T12:55:00Z
1
value 0.00105
scoring_system epss
scoring_elements 0.28726
published_at 2026-04-02T12:55:00Z
2
value 0.00105
scoring_system epss
scoring_elements 0.28647
published_at 2026-04-08T12:55:00Z
3
value 0.00105
scoring_system epss
scoring_elements 0.28687
published_at 2026-04-09T12:55:00Z
4
value 0.00105
scoring_system epss
scoring_elements 0.28689
published_at 2026-04-11T12:55:00Z
5
value 0.00105
scoring_system epss
scoring_elements 0.28645
published_at 2026-04-12T12:55:00Z
6
value 0.00105
scoring_system epss
scoring_elements 0.28597
published_at 2026-04-13T12:55:00Z
7
value 0.00105
scoring_system epss
scoring_elements 0.28617
published_at 2026-04-16T12:55:00Z
8
value 0.00105
scoring_system epss
scoring_elements 0.28592
published_at 2026-04-18T12:55:00Z
9
value 0.00105
scoring_system epss
scoring_elements 0.28774
published_at 2026-04-04T12:55:00Z
10
value 0.00105
scoring_system epss
scoring_elements 0.28581
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39319
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39319
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2237773
reference_id 2237773
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2237773
5
reference_url https://go.dev/cl/526157
reference_id 526157
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T16:02:49Z/
url https://go.dev/cl/526157
6
reference_url https://go.dev/issue/62197
reference_id 62197
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T16:02:49Z/
url https://go.dev/issue/62197
7
reference_url https://pkg.go.dev/vuln/GO-2023-2043
reference_id GO-2023-2043
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T16:02:49Z/
url https://pkg.go.dev/vuln/GO-2023-2043
8
reference_url https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ
reference_id L1hdrPhfBAAJ
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T16:02:49Z/
url https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ
9
reference_url https://security.netapp.com/advisory/ntap-20231020-0009/
reference_id ntap-20231020-0009
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T16:02:49Z/
url https://security.netapp.com/advisory/ntap-20231020-0009/
10
reference_url https://access.redhat.com/errata/RHSA-2023:5009
reference_id RHSA-2023:5009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5009
11
reference_url https://access.redhat.com/errata/RHSA-2023:5947
reference_id RHSA-2023:5947
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5947
12
reference_url https://access.redhat.com/errata/RHSA-2023:5974
reference_id RHSA-2023:5974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5974
13
reference_url https://access.redhat.com/errata/RHSA-2023:6115
reference_id RHSA-2023:6115
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6115
14
reference_url https://access.redhat.com/errata/RHSA-2023:6154
reference_id RHSA-2023:6154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6154
15
reference_url https://access.redhat.com/errata/RHSA-2023:6161
reference_id RHSA-2023:6161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6161
16
reference_url https://access.redhat.com/errata/RHSA-2023:6840
reference_id RHSA-2023:6840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6840
17
reference_url https://access.redhat.com/errata/RHSA-2023:7762
reference_id RHSA-2023:7762
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7762
18
reference_url https://access.redhat.com/errata/RHSA-2023:7764
reference_id RHSA-2023:7764
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7764
19
reference_url https://access.redhat.com/errata/RHSA-2023:7765
reference_id RHSA-2023:7765
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7765
20
reference_url https://access.redhat.com/errata/RHSA-2023:7766
reference_id RHSA-2023:7766
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7766
21
reference_url https://access.redhat.com/errata/RHSA-2024:0121
reference_id RHSA-2024:0121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0121
22
reference_url https://access.redhat.com/errata/RHSA-2024:1383
reference_id RHSA-2024:1383
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1383
23
reference_url https://access.redhat.com/errata/RHSA-2024:1901
reference_id RHSA-2024:1901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1901
24
reference_url https://access.redhat.com/errata/RHSA-2024:2160
reference_id RHSA-2024:2160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2160
25
reference_url https://access.redhat.com/errata/RHSA-2024:2988
reference_id RHSA-2024:2988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2988
26
reference_url https://access.redhat.com/errata/RHSA-2024:3467
reference_id RHSA-2024:3467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3467
27
reference_url https://usn.ubuntu.com/6574-1/
reference_id USN-6574-1
reference_type
scores
url https://usn.ubuntu.com/6574-1/
28
reference_url https://usn.ubuntu.com/7061-1/
reference_id USN-7061-1
reference_type
scores
url https://usn.ubuntu.com/7061-1/
29
reference_url https://usn.ubuntu.com/7109-1/
reference_id USN-7109-1
reference_type
scores
url https://usn.ubuntu.com/7109-1/
fixed_packages
aliases CVE-2023-39319
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a25b-3vep-y3gm
5
url VCID-pqb1-j3ad-efam
vulnerability_id VCID-pqb1-j3ad-efam
summary
kube-apiserver vulnerable to policy bypass
Users may be able to launch containers using images that are restricted by ImagePolicyWebhook when using ephemeral containers. Kubernetes clusters are only affected if the ImagePolicyWebhook admission plugin is used together with ephemeral containers.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2727.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2727.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2727
reference_id
reference_type
scores
0
value 0.00191
scoring_system epss
scoring_elements 0.40892
published_at 2026-04-21T12:55:00Z
1
value 0.00191
scoring_system epss
scoring_elements 0.4097
published_at 2026-04-18T12:55:00Z
2
value 0.00191
scoring_system epss
scoring_elements 0.41
published_at 2026-04-16T12:55:00Z
3
value 0.00191
scoring_system epss
scoring_elements 0.40958
published_at 2026-04-13T12:55:00Z
4
value 0.00191
scoring_system epss
scoring_elements 0.40975
published_at 2026-04-12T12:55:00Z
5
value 0.00191
scoring_system epss
scoring_elements 0.4101
published_at 2026-04-11T12:55:00Z
6
value 0.00191
scoring_system epss
scoring_elements 0.41009
published_at 2026-04-04T12:55:00Z
7
value 0.00191
scoring_system epss
scoring_elements 0.40976
published_at 2026-04-02T12:55:00Z
8
value 0.00191
scoring_system epss
scoring_elements 0.40991
published_at 2026-04-09T12:55:00Z
9
value 0.00191
scoring_system epss
scoring_elements 0.40984
published_at 2026-04-08T12:55:00Z
10
value 0.00191
scoring_system epss
scoring_elements 0.40935
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2727
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2727
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/kubernetes/kubernetes
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes
5
reference_url https://github.com/kubernetes/kubernetes/issues/118640
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-25T17:43:56Z/
url https://github.com/kubernetes/kubernetes/issues/118640
6
reference_url https://github.com/kubernetes/kubernetes/pull/118356
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/118356
7
reference_url https://github.com/kubernetes/kubernetes/pull/118471
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/118471
8
reference_url https://github.com/kubernetes/kubernetes/pull/118473
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/118473
9
reference_url https://github.com/kubernetes/kubernetes/pull/118474
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/118474
10
reference_url https://github.com/kubernetes/kubernetes/pull/118512
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/118512
11
reference_url https://groups.google.com/g/kubernetes-security-announce/c/vPWYJ_L84m8
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-25T17:43:56Z/
url https://groups.google.com/g/kubernetes-security-announce/c/vPWYJ_L84m8
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-2727
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-2727
13
reference_url https://security.netapp.com/advisory/ntap-20230803-0004
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20230803-0004
14
reference_url http://www.openwall.com/lists/oss-security/2023/07/06/2
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-25T17:43:56Z/
url http://www.openwall.com/lists/oss-security/2023/07/06/2
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2211322
reference_id 2211322
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2211322
16
reference_url https://security.netapp.com/advisory/ntap-20230803-0004/
reference_id ntap-20230803-0004
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-25T17:43:56Z/
url https://security.netapp.com/advisory/ntap-20230803-0004/
17
reference_url https://access.redhat.com/errata/RHSA-2023:5009
reference_id RHSA-2023:5009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5009
fixed_packages
aliases CVE-2023-2727, GHSA-qc2g-gmh6-95p4
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pqb1-j3ad-efam
6
url VCID-x4ux-7vyz-eug9
vulnerability_id VCID-x4ux-7vyz-eug9
summary Multiple vulnerabilities have been discovered in Go, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39321.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39321.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39321
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.17459
published_at 2026-04-02T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.17325
published_at 2026-04-21T12:55:00Z
2
value 0.00055
scoring_system epss
scoring_elements 0.17286
published_at 2026-04-16T12:55:00Z
3
value 0.00055
scoring_system epss
scoring_elements 0.17377
published_at 2026-04-08T12:55:00Z
4
value 0.00055
scoring_system epss
scoring_elements 0.17437
published_at 2026-04-09T12:55:00Z
5
value 0.00055
scoring_system epss
scoring_elements 0.17449
published_at 2026-04-11T12:55:00Z
6
value 0.00055
scoring_system epss
scoring_elements 0.17402
published_at 2026-04-12T12:55:00Z
7
value 0.00055
scoring_system epss
scoring_elements 0.17347
published_at 2026-04-13T12:55:00Z
8
value 0.00055
scoring_system epss
scoring_elements 0.17293
published_at 2026-04-18T12:55:00Z
9
value 0.00055
scoring_system epss
scoring_elements 0.17505
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39321
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2237777
reference_id 2237777
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2237777
4
reference_url https://go.dev/cl/523039
reference_id 523039
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:23:57Z/
url https://go.dev/cl/523039
5
reference_url https://go.dev/issue/62266
reference_id 62266
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:23:57Z/
url https://go.dev/issue/62266
6
reference_url https://pkg.go.dev/vuln/GO-2023-2044
reference_id GO-2023-2044
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:23:57Z/
url https://pkg.go.dev/vuln/GO-2023-2044
7
reference_url https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ
reference_id L1hdrPhfBAAJ
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:23:57Z/
url https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ
8
reference_url https://security.netapp.com/advisory/ntap-20231020-0004/
reference_id ntap-20231020-0004
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:23:57Z/
url https://security.netapp.com/advisory/ntap-20231020-0004/
9
reference_url https://access.redhat.com/errata/RHSA-2023:5009
reference_id RHSA-2023:5009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5009
10
reference_url https://access.redhat.com/errata/RHSA-2023:5947
reference_id RHSA-2023:5947
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5947
11
reference_url https://access.redhat.com/errata/RHSA-2023:5974
reference_id RHSA-2023:5974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5974
12
reference_url https://access.redhat.com/errata/RHSA-2023:6031
reference_id RHSA-2023:6031
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6031
13
reference_url https://access.redhat.com/errata/RHSA-2023:6115
reference_id RHSA-2023:6115
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6115
14
reference_url https://access.redhat.com/errata/RHSA-2023:6154
reference_id RHSA-2023:6154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6154
15
reference_url https://access.redhat.com/errata/RHSA-2023:6161
reference_id RHSA-2023:6161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6161
16
reference_url https://access.redhat.com/errata/RHSA-2023:6840
reference_id RHSA-2023:6840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6840
17
reference_url https://access.redhat.com/errata/RHSA-2023:7517
reference_id RHSA-2023:7517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7517
18
reference_url https://access.redhat.com/errata/RHSA-2023:7762
reference_id RHSA-2023:7762
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7762
19
reference_url https://access.redhat.com/errata/RHSA-2023:7763
reference_id RHSA-2023:7763
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7763
20
reference_url https://access.redhat.com/errata/RHSA-2023:7764
reference_id RHSA-2023:7764
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7764
21
reference_url https://access.redhat.com/errata/RHSA-2023:7765
reference_id RHSA-2023:7765
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7765
22
reference_url https://access.redhat.com/errata/RHSA-2023:7766
reference_id RHSA-2023:7766
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7766
23
reference_url https://access.redhat.com/errata/RHSA-2024:0121
reference_id RHSA-2024:0121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0121
24
reference_url https://access.redhat.com/errata/RHSA-2024:1383
reference_id RHSA-2024:1383
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1383
25
reference_url https://access.redhat.com/errata/RHSA-2024:1901
reference_id RHSA-2024:1901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1901
26
reference_url https://access.redhat.com/errata/RHSA-2024:2988
reference_id RHSA-2024:2988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2988
27
reference_url https://access.redhat.com/errata/RHSA-2024:3467
reference_id RHSA-2024:3467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3467
fixed_packages
aliases CVE-2023-39321
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x4ux-7vyz-eug9
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/microshift@4.14.0-202310261440.p0.g1586504.assembly.4.14.0%3Farch=el9