Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/runc@4:1.1.9-2.1.rhaos4.14?arch=el8
Typerpm
Namespaceredhat
Namerunc
Version4:1.1.9-2.1.rhaos4.14
Qualifiers
arch el8
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-4c51-73a9-17f9
vulnerability_id VCID-4c51-73a9-17f9
summary Multiple vulnerabilities have been discovered in Go, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39322.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39322.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39322
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.12871
published_at 2026-04-02T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.1276
published_at 2026-04-21T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.12804
published_at 2026-04-08T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12854
published_at 2026-04-09T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12821
published_at 2026-04-11T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.12784
published_at 2026-04-12T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.12738
published_at 2026-04-13T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.1264
published_at 2026-04-16T12:55:00Z
8
value 0.00042
scoring_system epss
scoring_elements 0.12649
published_at 2026-04-18T12:55:00Z
9
value 0.00042
scoring_system epss
scoring_elements 0.12922
published_at 2026-04-04T12:55:00Z
10
value 0.00042
scoring_system epss
scoring_elements 0.12724
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39322
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2237778
reference_id 2237778
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2237778
4
reference_url https://go.dev/cl/523039
reference_id 523039
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:53:33Z/
url https://go.dev/cl/523039
5
reference_url https://go.dev/issue/62266
reference_id 62266
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:53:33Z/
url https://go.dev/issue/62266
6
reference_url https://pkg.go.dev/vuln/GO-2023-2045
reference_id GO-2023-2045
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:53:33Z/
url https://pkg.go.dev/vuln/GO-2023-2045
7
reference_url https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ
reference_id L1hdrPhfBAAJ
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:53:33Z/
url https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ
8
reference_url https://security.netapp.com/advisory/ntap-20231020-0004/
reference_id ntap-20231020-0004
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:53:33Z/
url https://security.netapp.com/advisory/ntap-20231020-0004/
9
reference_url https://access.redhat.com/errata/RHSA-2023:5009
reference_id RHSA-2023:5009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5009
10
reference_url https://access.redhat.com/errata/RHSA-2023:5947
reference_id RHSA-2023:5947
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5947
11
reference_url https://access.redhat.com/errata/RHSA-2023:5974
reference_id RHSA-2023:5974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5974
12
reference_url https://access.redhat.com/errata/RHSA-2023:6031
reference_id RHSA-2023:6031
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6031
13
reference_url https://access.redhat.com/errata/RHSA-2023:6115
reference_id RHSA-2023:6115
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6115
14
reference_url https://access.redhat.com/errata/RHSA-2023:6154
reference_id RHSA-2023:6154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6154
15
reference_url https://access.redhat.com/errata/RHSA-2023:6161
reference_id RHSA-2023:6161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6161
16
reference_url https://access.redhat.com/errata/RHSA-2023:6840
reference_id RHSA-2023:6840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6840
17
reference_url https://access.redhat.com/errata/RHSA-2023:7517
reference_id RHSA-2023:7517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7517
18
reference_url https://access.redhat.com/errata/RHSA-2023:7762
reference_id RHSA-2023:7762
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7762
19
reference_url https://access.redhat.com/errata/RHSA-2023:7763
reference_id RHSA-2023:7763
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7763
20
reference_url https://access.redhat.com/errata/RHSA-2023:7764
reference_id RHSA-2023:7764
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7764
21
reference_url https://access.redhat.com/errata/RHSA-2023:7765
reference_id RHSA-2023:7765
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7765
22
reference_url https://access.redhat.com/errata/RHSA-2023:7766
reference_id RHSA-2023:7766
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7766
23
reference_url https://access.redhat.com/errata/RHSA-2024:0121
reference_id RHSA-2024:0121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0121
24
reference_url https://access.redhat.com/errata/RHSA-2024:1383
reference_id RHSA-2024:1383
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1383
25
reference_url https://access.redhat.com/errata/RHSA-2024:1901
reference_id RHSA-2024:1901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1901
26
reference_url https://access.redhat.com/errata/RHSA-2024:2988
reference_id RHSA-2024:2988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2988
27
reference_url https://access.redhat.com/errata/RHSA-2024:3467
reference_id RHSA-2024:3467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3467
fixed_packages
aliases CVE-2023-39322
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4c51-73a9-17f9
1
url VCID-7359-arkb-zkg6
vulnerability_id VCID-7359-arkb-zkg6
summary
Kubernetes mountable secrets policy bypass
Users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using ephemeral containers. The policy ensures pods running with a service account may only reference secrets specified in the service account’s secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the `kubernetes.io/enforce-mountable-secrets` annotation are used together with ephemeral containers.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2728.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2728.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2728
reference_id
reference_type
scores
0
value 0.04853
scoring_system epss
scoring_elements 0.89556
published_at 2026-04-18T12:55:00Z
1
value 0.04853
scoring_system epss
scoring_elements 0.89554
published_at 2026-04-21T12:55:00Z
2
value 0.04853
scoring_system epss
scoring_elements 0.89546
published_at 2026-04-12T12:55:00Z
3
value 0.04853
scoring_system epss
scoring_elements 0.89548
published_at 2026-04-11T12:55:00Z
4
value 0.04853
scoring_system epss
scoring_elements 0.89521
published_at 2026-04-07T12:55:00Z
5
value 0.04853
scoring_system epss
scoring_elements 0.89509
published_at 2026-04-02T12:55:00Z
6
value 0.04853
scoring_system epss
scoring_elements 0.89541
published_at 2026-04-13T12:55:00Z
7
value 0.04853
scoring_system epss
scoring_elements 0.89537
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2728
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2728
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/kubernetes/kubernetes
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes
5
reference_url https://github.com/kubernetes/kubernetes/issues/118640
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-25T17:02:56Z/
url https://github.com/kubernetes/kubernetes/issues/118640
6
reference_url https://github.com/kubernetes/kubernetes/pull/118356
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/118356
7
reference_url https://github.com/kubernetes/kubernetes/pull/118471
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/118471
8
reference_url https://github.com/kubernetes/kubernetes/pull/118473
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/118473
9
reference_url https://github.com/kubernetes/kubernetes/pull/118474
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/118474
10
reference_url https://github.com/kubernetes/kubernetes/pull/118512
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/118512
11
reference_url https://groups.google.com/g/kubernetes-security-announce/c/vPWYJ_L84m8
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-25T17:02:56Z/
url https://groups.google.com/g/kubernetes-security-announce/c/vPWYJ_L84m8
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-2728
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-2728
13
reference_url https://security.netapp.com/advisory/ntap-20230803-0004
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20230803-0004
14
reference_url http://www.openwall.com/lists/oss-security/2023/07/06/3
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-25T17:02:56Z/
url http://www.openwall.com/lists/oss-security/2023/07/06/3
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2211348
reference_id 2211348
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2211348
16
reference_url https://security.netapp.com/advisory/ntap-20230803-0004/
reference_id ntap-20230803-0004
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-25T17:02:56Z/
url https://security.netapp.com/advisory/ntap-20230803-0004/
17
reference_url https://access.redhat.com/errata/RHSA-2023:5009
reference_id RHSA-2023:5009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5009
fixed_packages
aliases CVE-2023-2728, GHSA-cgcv-5272-97pr
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7359-arkb-zkg6
2
url VCID-95zc-mxqu-tyfp
vulnerability_id VCID-95zc-mxqu-tyfp
summary Multiple vulnerabilities have been discovered in Go, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39318.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39318.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39318
reference_id
reference_type
scores
0
value 0.00087
scoring_system epss
scoring_elements 0.24872
published_at 2026-04-21T12:55:00Z
1
value 0.00105
scoring_system epss
scoring_elements 0.28726
published_at 2026-04-02T12:55:00Z
2
value 0.00105
scoring_system epss
scoring_elements 0.28647
published_at 2026-04-08T12:55:00Z
3
value 0.00105
scoring_system epss
scoring_elements 0.28687
published_at 2026-04-09T12:55:00Z
4
value 0.00105
scoring_system epss
scoring_elements 0.28689
published_at 2026-04-11T12:55:00Z
5
value 0.00105
scoring_system epss
scoring_elements 0.28645
published_at 2026-04-12T12:55:00Z
6
value 0.00105
scoring_system epss
scoring_elements 0.28597
published_at 2026-04-13T12:55:00Z
7
value 0.00105
scoring_system epss
scoring_elements 0.28617
published_at 2026-04-16T12:55:00Z
8
value 0.00105
scoring_system epss
scoring_elements 0.28592
published_at 2026-04-18T12:55:00Z
9
value 0.00105
scoring_system epss
scoring_elements 0.28774
published_at 2026-04-04T12:55:00Z
10
value 0.00105
scoring_system epss
scoring_elements 0.28581
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39318
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39318
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2237776
reference_id 2237776
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2237776
5
reference_url https://go.dev/cl/526156
reference_id 526156
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T16:02:51Z/
url https://go.dev/cl/526156
6
reference_url https://go.dev/issue/62196
reference_id 62196
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T16:02:51Z/
url https://go.dev/issue/62196
7
reference_url https://pkg.go.dev/vuln/GO-2023-2041
reference_id GO-2023-2041
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T16:02:51Z/
url https://pkg.go.dev/vuln/GO-2023-2041
8
reference_url https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ
reference_id L1hdrPhfBAAJ
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T16:02:51Z/
url https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ
9
reference_url https://security.netapp.com/advisory/ntap-20231020-0009/
reference_id ntap-20231020-0009
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T16:02:51Z/
url https://security.netapp.com/advisory/ntap-20231020-0009/
10
reference_url https://access.redhat.com/errata/RHSA-2023:5009
reference_id RHSA-2023:5009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5009
11
reference_url https://access.redhat.com/errata/RHSA-2023:5947
reference_id RHSA-2023:5947
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5947
12
reference_url https://access.redhat.com/errata/RHSA-2023:5974
reference_id RHSA-2023:5974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5974
13
reference_url https://access.redhat.com/errata/RHSA-2023:6115
reference_id RHSA-2023:6115
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6115
14
reference_url https://access.redhat.com/errata/RHSA-2023:6154
reference_id RHSA-2023:6154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6154
15
reference_url https://access.redhat.com/errata/RHSA-2023:6161
reference_id RHSA-2023:6161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6161
16
reference_url https://access.redhat.com/errata/RHSA-2023:6840
reference_id RHSA-2023:6840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6840
17
reference_url https://access.redhat.com/errata/RHSA-2023:7762
reference_id RHSA-2023:7762
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7762
18
reference_url https://access.redhat.com/errata/RHSA-2023:7764
reference_id RHSA-2023:7764
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7764
19
reference_url https://access.redhat.com/errata/RHSA-2023:7765
reference_id RHSA-2023:7765
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7765
20
reference_url https://access.redhat.com/errata/RHSA-2023:7766
reference_id RHSA-2023:7766
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7766
21
reference_url https://access.redhat.com/errata/RHSA-2024:0121
reference_id RHSA-2024:0121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0121
22
reference_url https://access.redhat.com/errata/RHSA-2024:1383
reference_id RHSA-2024:1383
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1383
23
reference_url https://access.redhat.com/errata/RHSA-2024:1901
reference_id RHSA-2024:1901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1901
24
reference_url https://access.redhat.com/errata/RHSA-2024:2160
reference_id RHSA-2024:2160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2160
25
reference_url https://access.redhat.com/errata/RHSA-2024:2988
reference_id RHSA-2024:2988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2988
26
reference_url https://access.redhat.com/errata/RHSA-2024:3467
reference_id RHSA-2024:3467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3467
27
reference_url https://usn.ubuntu.com/6574-1/
reference_id USN-6574-1
reference_type
scores
url https://usn.ubuntu.com/6574-1/
28
reference_url https://usn.ubuntu.com/7061-1/
reference_id USN-7061-1
reference_type
scores
url https://usn.ubuntu.com/7061-1/
29
reference_url https://usn.ubuntu.com/7109-1/
reference_id USN-7109-1
reference_type
scores
url https://usn.ubuntu.com/7109-1/
fixed_packages
aliases CVE-2023-39318
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-95zc-mxqu-tyfp
3
url VCID-ppdw-akf7-dfdr
vulnerability_id VCID-ppdw-akf7-dfdr
summary Multiple vulnerabilities have been discovered in Go, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-29409.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-29409.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-29409
reference_id
reference_type
scores
0
value 0.00115
scoring_system epss
scoring_elements 0.30174
published_at 2026-04-02T12:55:00Z
1
value 0.00115
scoring_system epss
scoring_elements 0.29993
published_at 2026-04-21T12:55:00Z
2
value 0.00115
scoring_system epss
scoring_elements 0.30097
published_at 2026-04-08T12:55:00Z
3
value 0.00115
scoring_system epss
scoring_elements 0.30132
published_at 2026-04-09T12:55:00Z
4
value 0.00115
scoring_system epss
scoring_elements 0.30136
published_at 2026-04-11T12:55:00Z
5
value 0.00115
scoring_system epss
scoring_elements 0.30093
published_at 2026-04-12T12:55:00Z
6
value 0.00115
scoring_system epss
scoring_elements 0.30044
published_at 2026-04-13T12:55:00Z
7
value 0.00115
scoring_system epss
scoring_elements 0.30059
published_at 2026-04-16T12:55:00Z
8
value 0.00115
scoring_system epss
scoring_elements 0.30038
published_at 2026-04-18T12:55:00Z
9
value 0.00115
scoring_system epss
scoring_elements 0.30223
published_at 2026-04-04T12:55:00Z
10
value 0.00115
scoring_system epss
scoring_elements 0.30037
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-29409
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29409
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29409
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2228743
reference_id 2228743
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2228743
5
reference_url https://go.dev/cl/515257
reference_id 515257
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:15:51Z/
url https://go.dev/cl/515257
6
reference_url https://groups.google.com/g/golang-announce/c/X0b6CsSAaYI/m/Efv5DbZ9AwAJ
reference_id Efv5DbZ9AwAJ
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:15:51Z/
url https://groups.google.com/g/golang-announce/c/X0b6CsSAaYI/m/Efv5DbZ9AwAJ
7
reference_url https://pkg.go.dev/vuln/GO-2023-1987
reference_id GO-2023-1987
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:15:51Z/
url https://pkg.go.dev/vuln/GO-2023-1987
8
reference_url https://security.netapp.com/advisory/ntap-20230831-0010/
reference_id ntap-20230831-0010
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:15:51Z/
url https://security.netapp.com/advisory/ntap-20230831-0010/
9
reference_url https://access.redhat.com/errata/RHSA-2023:5009
reference_id RHSA-2023:5009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5009
10
reference_url https://access.redhat.com/errata/RHSA-2023:5530
reference_id RHSA-2023:5530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5530
11
reference_url https://access.redhat.com/errata/RHSA-2023:5541
reference_id RHSA-2023:5541
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5541
12
reference_url https://access.redhat.com/errata/RHSA-2023:5721
reference_id RHSA-2023:5721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5721
13
reference_url https://access.redhat.com/errata/RHSA-2023:5738
reference_id RHSA-2023:5738
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5738
14
reference_url https://access.redhat.com/errata/RHSA-2023:5805
reference_id RHSA-2023:5805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5805
15
reference_url https://access.redhat.com/errata/RHSA-2023:5933
reference_id RHSA-2023:5933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5933
16
reference_url https://access.redhat.com/errata/RHSA-2023:5935
reference_id RHSA-2023:5935
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5935
17
reference_url https://access.redhat.com/errata/RHSA-2023:5947
reference_id RHSA-2023:5947
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5947
18
reference_url https://access.redhat.com/errata/RHSA-2023:5964
reference_id RHSA-2023:5964
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5964
19
reference_url https://access.redhat.com/errata/RHSA-2023:5965
reference_id RHSA-2023:5965
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5965
20
reference_url https://access.redhat.com/errata/RHSA-2023:5969
reference_id RHSA-2023:5969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5969
21
reference_url https://access.redhat.com/errata/RHSA-2023:5971
reference_id RHSA-2023:5971
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5971
22
reference_url https://access.redhat.com/errata/RHSA-2023:5974
reference_id RHSA-2023:5974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5974
23
reference_url https://access.redhat.com/errata/RHSA-2023:5976
reference_id RHSA-2023:5976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5976
24
reference_url https://access.redhat.com/errata/RHSA-2023:6031
reference_id RHSA-2023:6031
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6031
25
reference_url https://access.redhat.com/errata/RHSA-2023:6115
reference_id RHSA-2023:6115
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6115
26
reference_url https://access.redhat.com/errata/RHSA-2023:6161
reference_id RHSA-2023:6161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6161
27
reference_url https://access.redhat.com/errata/RHSA-2023:6279
reference_id RHSA-2023:6279
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6279
28
reference_url https://access.redhat.com/errata/RHSA-2023:6296
reference_id RHSA-2023:6296
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6296
29
reference_url https://access.redhat.com/errata/RHSA-2023:6298
reference_id RHSA-2023:6298
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6298
30
reference_url https://access.redhat.com/errata/RHSA-2023:6840
reference_id RHSA-2023:6840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6840
31
reference_url https://access.redhat.com/errata/RHSA-2023:7762
reference_id RHSA-2023:7762
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7762
32
reference_url https://access.redhat.com/errata/RHSA-2023:7763
reference_id RHSA-2023:7763
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7763
33
reference_url https://access.redhat.com/errata/RHSA-2023:7764
reference_id RHSA-2023:7764
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7764
34
reference_url https://access.redhat.com/errata/RHSA-2023:7765
reference_id RHSA-2023:7765
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7765
35
reference_url https://access.redhat.com/errata/RHSA-2023:7766
reference_id RHSA-2023:7766
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7766
36
reference_url https://access.redhat.com/errata/RHSA-2024:0121
reference_id RHSA-2024:0121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0121
37
reference_url https://access.redhat.com/errata/RHSA-2024:0292
reference_id RHSA-2024:0292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0292
38
reference_url https://access.redhat.com/errata/RHSA-2024:0293
reference_id RHSA-2024:0293
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0293
39
reference_url https://access.redhat.com/errata/RHSA-2024:1027
reference_id RHSA-2024:1027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1027
40
reference_url https://access.redhat.com/errata/RHSA-2024:1383
reference_id RHSA-2024:1383
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1383
41
reference_url https://access.redhat.com/errata/RHSA-2024:2988
reference_id RHSA-2024:2988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2988
fixed_packages
aliases CVE-2023-29409
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ppdw-akf7-dfdr
4
url VCID-pqb1-j3ad-efam
vulnerability_id VCID-pqb1-j3ad-efam
summary
kube-apiserver vulnerable to policy bypass
Users may be able to launch containers using images that are restricted by ImagePolicyWebhook when using ephemeral containers. Kubernetes clusters are only affected if the ImagePolicyWebhook admission plugin is used together with ephemeral containers.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2727.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2727.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2727
reference_id
reference_type
scores
0
value 0.00191
scoring_system epss
scoring_elements 0.40892
published_at 2026-04-21T12:55:00Z
1
value 0.00191
scoring_system epss
scoring_elements 0.4097
published_at 2026-04-18T12:55:00Z
2
value 0.00191
scoring_system epss
scoring_elements 0.41
published_at 2026-04-16T12:55:00Z
3
value 0.00191
scoring_system epss
scoring_elements 0.40958
published_at 2026-04-13T12:55:00Z
4
value 0.00191
scoring_system epss
scoring_elements 0.40975
published_at 2026-04-12T12:55:00Z
5
value 0.00191
scoring_system epss
scoring_elements 0.4101
published_at 2026-04-11T12:55:00Z
6
value 0.00191
scoring_system epss
scoring_elements 0.41009
published_at 2026-04-04T12:55:00Z
7
value 0.00191
scoring_system epss
scoring_elements 0.40976
published_at 2026-04-02T12:55:00Z
8
value 0.00191
scoring_system epss
scoring_elements 0.40991
published_at 2026-04-09T12:55:00Z
9
value 0.00191
scoring_system epss
scoring_elements 0.40984
published_at 2026-04-08T12:55:00Z
10
value 0.00191
scoring_system epss
scoring_elements 0.40935
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2727
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2727
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/kubernetes/kubernetes
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes
5
reference_url https://github.com/kubernetes/kubernetes/issues/118640
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-25T17:43:56Z/
url https://github.com/kubernetes/kubernetes/issues/118640
6
reference_url https://github.com/kubernetes/kubernetes/pull/118356
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/118356
7
reference_url https://github.com/kubernetes/kubernetes/pull/118471
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/118471
8
reference_url https://github.com/kubernetes/kubernetes/pull/118473
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/118473
9
reference_url https://github.com/kubernetes/kubernetes/pull/118474
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/118474
10
reference_url https://github.com/kubernetes/kubernetes/pull/118512
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/118512
11
reference_url https://groups.google.com/g/kubernetes-security-announce/c/vPWYJ_L84m8
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-25T17:43:56Z/
url https://groups.google.com/g/kubernetes-security-announce/c/vPWYJ_L84m8
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-2727
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-2727
13
reference_url https://security.netapp.com/advisory/ntap-20230803-0004
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20230803-0004
14
reference_url http://www.openwall.com/lists/oss-security/2023/07/06/2
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-25T17:43:56Z/
url http://www.openwall.com/lists/oss-security/2023/07/06/2
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2211322
reference_id 2211322
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2211322
16
reference_url https://security.netapp.com/advisory/ntap-20230803-0004/
reference_id ntap-20230803-0004
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-25T17:43:56Z/
url https://security.netapp.com/advisory/ntap-20230803-0004/
17
reference_url https://access.redhat.com/errata/RHSA-2023:5009
reference_id RHSA-2023:5009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5009
fixed_packages
aliases CVE-2023-2727, GHSA-qc2g-gmh6-95p4
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pqb1-j3ad-efam
5
url VCID-x4ux-7vyz-eug9
vulnerability_id VCID-x4ux-7vyz-eug9
summary Multiple vulnerabilities have been discovered in Go, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39321.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39321.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39321
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.17459
published_at 2026-04-02T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.17325
published_at 2026-04-21T12:55:00Z
2
value 0.00055
scoring_system epss
scoring_elements 0.17286
published_at 2026-04-16T12:55:00Z
3
value 0.00055
scoring_system epss
scoring_elements 0.17377
published_at 2026-04-08T12:55:00Z
4
value 0.00055
scoring_system epss
scoring_elements 0.17437
published_at 2026-04-09T12:55:00Z
5
value 0.00055
scoring_system epss
scoring_elements 0.17449
published_at 2026-04-11T12:55:00Z
6
value 0.00055
scoring_system epss
scoring_elements 0.17402
published_at 2026-04-12T12:55:00Z
7
value 0.00055
scoring_system epss
scoring_elements 0.17347
published_at 2026-04-13T12:55:00Z
8
value 0.00055
scoring_system epss
scoring_elements 0.17293
published_at 2026-04-18T12:55:00Z
9
value 0.00055
scoring_system epss
scoring_elements 0.17505
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39321
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2237777
reference_id 2237777
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2237777
4
reference_url https://go.dev/cl/523039
reference_id 523039
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:23:57Z/
url https://go.dev/cl/523039
5
reference_url https://go.dev/issue/62266
reference_id 62266
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:23:57Z/
url https://go.dev/issue/62266
6
reference_url https://pkg.go.dev/vuln/GO-2023-2044
reference_id GO-2023-2044
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:23:57Z/
url https://pkg.go.dev/vuln/GO-2023-2044
7
reference_url https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ
reference_id L1hdrPhfBAAJ
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:23:57Z/
url https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ
8
reference_url https://security.netapp.com/advisory/ntap-20231020-0004/
reference_id ntap-20231020-0004
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:23:57Z/
url https://security.netapp.com/advisory/ntap-20231020-0004/
9
reference_url https://access.redhat.com/errata/RHSA-2023:5009
reference_id RHSA-2023:5009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5009
10
reference_url https://access.redhat.com/errata/RHSA-2023:5947
reference_id RHSA-2023:5947
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5947
11
reference_url https://access.redhat.com/errata/RHSA-2023:5974
reference_id RHSA-2023:5974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5974
12
reference_url https://access.redhat.com/errata/RHSA-2023:6031
reference_id RHSA-2023:6031
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6031
13
reference_url https://access.redhat.com/errata/RHSA-2023:6115
reference_id RHSA-2023:6115
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6115
14
reference_url https://access.redhat.com/errata/RHSA-2023:6154
reference_id RHSA-2023:6154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6154
15
reference_url https://access.redhat.com/errata/RHSA-2023:6161
reference_id RHSA-2023:6161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6161
16
reference_url https://access.redhat.com/errata/RHSA-2023:6840
reference_id RHSA-2023:6840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6840
17
reference_url https://access.redhat.com/errata/RHSA-2023:7517
reference_id RHSA-2023:7517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7517
18
reference_url https://access.redhat.com/errata/RHSA-2023:7762
reference_id RHSA-2023:7762
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7762
19
reference_url https://access.redhat.com/errata/RHSA-2023:7763
reference_id RHSA-2023:7763
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7763
20
reference_url https://access.redhat.com/errata/RHSA-2023:7764
reference_id RHSA-2023:7764
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7764
21
reference_url https://access.redhat.com/errata/RHSA-2023:7765
reference_id RHSA-2023:7765
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7765
22
reference_url https://access.redhat.com/errata/RHSA-2023:7766
reference_id RHSA-2023:7766
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7766
23
reference_url https://access.redhat.com/errata/RHSA-2024:0121
reference_id RHSA-2024:0121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0121
24
reference_url https://access.redhat.com/errata/RHSA-2024:1383
reference_id RHSA-2024:1383
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1383
25
reference_url https://access.redhat.com/errata/RHSA-2024:1901
reference_id RHSA-2024:1901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1901
26
reference_url https://access.redhat.com/errata/RHSA-2024:2988
reference_id RHSA-2024:2988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2988
27
reference_url https://access.redhat.com/errata/RHSA-2024:3467
reference_id RHSA-2024:3467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3467
fixed_packages
aliases CVE-2023-39321
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x4ux-7vyz-eug9
Fixing_vulnerabilities
Risk_score3.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/runc@4:1.1.9-2.1.rhaos4.14%3Farch=el8