Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel-rt@4.18.0-513.5.1.rt7.307?arch=el8_9
Typerpm
Namespaceredhat
Namekernel-rt
Version4.18.0-513.5.1.rt7.307
Qualifiers
arch el8_9
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1a4w-wmuv-bkgp
vulnerability_id VCID-1a4w-wmuv-bkgp
summary kernel: out-of-bounds write in hw_atl_utils_fw_rpc_wait() in drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43975.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43975.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-43975
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.04968
published_at 2026-04-01T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.05226
published_at 2026-04-26T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.05059
published_at 2026-04-13T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.05005
published_at 2026-04-16T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.05011
published_at 2026-04-18T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.05157
published_at 2026-04-21T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.05184
published_at 2026-04-24T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.0502
published_at 2026-04-02T12:55:00Z
8
value 0.00019
scoring_system epss
scoring_elements 0.05049
published_at 2026-04-04T12:55:00Z
9
value 0.00019
scoring_system epss
scoring_elements 0.05071
published_at 2026-04-07T12:55:00Z
10
value 0.00019
scoring_system epss
scoring_elements 0.05104
published_at 2026-04-08T12:55:00Z
11
value 0.00019
scoring_system epss
scoring_elements 0.05118
published_at 2026-04-09T12:55:00Z
12
value 0.00019
scoring_system epss
scoring_elements 0.05093
published_at 2026-04-11T12:55:00Z
13
value 0.00019
scoring_system epss
scoring_elements 0.05076
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-43975
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375
53
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
54
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2024989
reference_id 2024989
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2024989
55
reference_url https://security.archlinux.org/AVG-2610
reference_id AVG-2610
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2610
56
reference_url https://security.archlinux.org/AVG-2611
reference_id AVG-2611
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2611
57
reference_url https://security.archlinux.org/AVG-2612
reference_id AVG-2612
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2612
58
reference_url https://security.archlinux.org/AVG-2613
reference_id AVG-2613
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2613
59
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
60
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
61
reference_url https://access.redhat.com/errata/RHSA-2024:1188
reference_id RHSA-2024:1188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1188
62
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
63
reference_url https://usn.ubuntu.com/5278-1/
reference_id USN-5278-1
reference_type
scores
url https://usn.ubuntu.com/5278-1/
64
reference_url https://usn.ubuntu.com/5294-1/
reference_id USN-5294-1
reference_type
scores
url https://usn.ubuntu.com/5294-1/
65
reference_url https://usn.ubuntu.com/5294-2/
reference_id USN-5294-2
reference_type
scores
url https://usn.ubuntu.com/5294-2/
66
reference_url https://usn.ubuntu.com/5297-1/
reference_id USN-5297-1
reference_type
scores
url https://usn.ubuntu.com/5297-1/
67
reference_url https://usn.ubuntu.com/5337-1/
reference_id USN-5337-1
reference_type
scores
url https://usn.ubuntu.com/5337-1/
68
reference_url https://usn.ubuntu.com/5368-1/
reference_id USN-5368-1
reference_type
scores
url https://usn.ubuntu.com/5368-1/
69
reference_url https://usn.ubuntu.com/5385-1/
reference_id USN-5385-1
reference_type
scores
url https://usn.ubuntu.com/5385-1/
fixed_packages
aliases CVE-2021-43975
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1a4w-wmuv-bkgp
1
url VCID-1b2u-7w7f-wudv
vulnerability_id VCID-1b2u-7w7f-wudv
summary kernel: use-after-free due to race condition in qdisc_graft()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0590.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0590.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0590
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01801
published_at 2026-04-07T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01804
published_at 2026-04-08T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01818
published_at 2026-04-09T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01789
published_at 2026-04-02T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02654
published_at 2026-04-18T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02766
published_at 2026-04-21T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02756
published_at 2026-04-24T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02744
published_at 2026-04-26T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02682
published_at 2026-04-11T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02668
published_at 2026-04-12T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02665
published_at 2026-04-13T12:55:00Z
11
value 0.00014
scoring_system epss
scoring_elements 0.02646
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0590
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0590
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2165741
reference_id 2165741
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2165741
5
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
6
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
7
reference_url https://access.redhat.com/errata/RHSA-2023:5627
reference_id RHSA-2023:5627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5627
8
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
9
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
10
reference_url https://access.redhat.com/errata/RHSA-2023:7382
reference_id RHSA-2023:7382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7382
11
reference_url https://access.redhat.com/errata/RHSA-2023:7389
reference_id RHSA-2023:7389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7389
12
reference_url https://usn.ubuntu.com/5850-1/
reference_id USN-5850-1
reference_type
scores
url https://usn.ubuntu.com/5850-1/
13
reference_url https://usn.ubuntu.com/5851-1/
reference_id USN-5851-1
reference_type
scores
url https://usn.ubuntu.com/5851-1/
14
reference_url https://usn.ubuntu.com/5860-1/
reference_id USN-5860-1
reference_type
scores
url https://usn.ubuntu.com/5860-1/
15
reference_url https://usn.ubuntu.com/5876-1/
reference_id USN-5876-1
reference_type
scores
url https://usn.ubuntu.com/5876-1/
16
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
17
reference_url https://usn.ubuntu.com/5878-1/
reference_id USN-5878-1
reference_type
scores
url https://usn.ubuntu.com/5878-1/
18
reference_url https://usn.ubuntu.com/5879-1/
reference_id USN-5879-1
reference_type
scores
url https://usn.ubuntu.com/5879-1/
19
reference_url https://usn.ubuntu.com/6284-1/
reference_id USN-6284-1
reference_type
scores
url https://usn.ubuntu.com/6284-1/
20
reference_url https://usn.ubuntu.com/6301-1/
reference_id USN-6301-1
reference_type
scores
url https://usn.ubuntu.com/6301-1/
21
reference_url https://usn.ubuntu.com/6312-1/
reference_id USN-6312-1
reference_type
scores
url https://usn.ubuntu.com/6312-1/
22
reference_url https://usn.ubuntu.com/6314-1/
reference_id USN-6314-1
reference_type
scores
url https://usn.ubuntu.com/6314-1/
23
reference_url https://usn.ubuntu.com/6331-1/
reference_id USN-6331-1
reference_type
scores
url https://usn.ubuntu.com/6331-1/
24
reference_url https://usn.ubuntu.com/6337-1/
reference_id USN-6337-1
reference_type
scores
url https://usn.ubuntu.com/6337-1/
fixed_packages
aliases CVE-2023-0590
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1b2u-7w7f-wudv
2
url VCID-1vns-urfn-93dn
vulnerability_id VCID-1vns-urfn-93dn
summary kernel: Denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28328.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28328.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-28328
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.02172
published_at 2026-04-02T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02195
published_at 2026-04-26T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.02171
published_at 2026-04-11T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02156
published_at 2026-04-12T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02153
published_at 2026-04-13T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02129
published_at 2026-04-16T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02141
published_at 2026-04-18T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02226
published_at 2026-04-21T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.02205
published_at 2026-04-24T12:55:00Z
9
value 0.00013
scoring_system epss
scoring_elements 0.02178
published_at 2026-04-04T12:55:00Z
10
value 0.00013
scoring_system epss
scoring_elements 0.02173
published_at 2026-04-07T12:55:00Z
11
value 0.00013
scoring_system epss
scoring_elements 0.02174
published_at 2026-04-08T12:55:00Z
12
value 0.00013
scoring_system epss
scoring_elements 0.02196
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-28328
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28328
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28328
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2177389
reference_id 2177389
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:15Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2177389
5
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:15Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
6
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:15Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
7
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
8
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
9
reference_url https://access.redhat.com/errata/RHSA-2024:0575
reference_id RHSA-2024:0575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0575
10
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
11
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
12
reference_url https://usn.ubuntu.com/5981-1/
reference_id USN-5981-1
reference_type
scores
url https://usn.ubuntu.com/5981-1/
13
reference_url https://usn.ubuntu.com/5982-1/
reference_id USN-5982-1
reference_type
scores
url https://usn.ubuntu.com/5982-1/
14
reference_url https://usn.ubuntu.com/5984-1/
reference_id USN-5984-1
reference_type
scores
url https://usn.ubuntu.com/5984-1/
15
reference_url https://usn.ubuntu.com/5987-1/
reference_id USN-5987-1
reference_type
scores
url https://usn.ubuntu.com/5987-1/
16
reference_url https://usn.ubuntu.com/5991-1/
reference_id USN-5991-1
reference_type
scores
url https://usn.ubuntu.com/5991-1/
17
reference_url https://usn.ubuntu.com/6000-1/
reference_id USN-6000-1
reference_type
scores
url https://usn.ubuntu.com/6000-1/
18
reference_url https://usn.ubuntu.com/6004-1/
reference_id USN-6004-1
reference_type
scores
url https://usn.ubuntu.com/6004-1/
19
reference_url https://usn.ubuntu.com/6009-1/
reference_id USN-6009-1
reference_type
scores
url https://usn.ubuntu.com/6009-1/
20
reference_url https://usn.ubuntu.com/6024-1/
reference_id USN-6024-1
reference_type
scores
url https://usn.ubuntu.com/6024-1/
21
reference_url https://usn.ubuntu.com/6030-1/
reference_id USN-6030-1
reference_type
scores
url https://usn.ubuntu.com/6030-1/
22
reference_url https://usn.ubuntu.com/6149-1/
reference_id USN-6149-1
reference_type
scores
url https://usn.ubuntu.com/6149-1/
23
reference_url https://usn.ubuntu.com/6385-1/
reference_id USN-6385-1
reference_type
scores
url https://usn.ubuntu.com/6385-1/
fixed_packages
aliases CVE-2023-28328
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1vns-urfn-93dn
3
url VCID-2n9k-dqfk-gkb9
vulnerability_id VCID-2n9k-dqfk-gkb9
summary kernel: blocking operation in dvb_frontend_get_event and wait_event_interruptible
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-31084.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-31084.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-31084
reference_id
reference_type
scores
0
value 9e-05
scoring_system epss
scoring_elements 0.00829
published_at 2026-04-04T12:55:00Z
1
value 9e-05
scoring_system epss
scoring_elements 0.00869
published_at 2026-04-26T12:55:00Z
2
value 9e-05
scoring_system epss
scoring_elements 0.0083
published_at 2026-04-07T12:55:00Z
3
value 9e-05
scoring_system epss
scoring_elements 0.00834
published_at 2026-04-08T12:55:00Z
4
value 9e-05
scoring_system epss
scoring_elements 0.00831
published_at 2026-04-09T12:55:00Z
5
value 9e-05
scoring_system epss
scoring_elements 0.0082
published_at 2026-04-18T12:55:00Z
6
value 9e-05
scoring_system epss
scoring_elements 0.00815
published_at 2026-04-16T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.00816
published_at 2026-04-13T12:55:00Z
8
value 9e-05
scoring_system epss
scoring_elements 0.00865
published_at 2026-04-21T12:55:00Z
9
value 9e-05
scoring_system epss
scoring_elements 0.00867
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-31084
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
33
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2213139
reference_id 2213139
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2213139
35
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6HIEOLEOURP4BJZMIL7UGGPYRRB44UDN/
reference_id 6HIEOLEOURP4BJZMIL7UGGPYRRB44UDN
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6HIEOLEOURP4BJZMIL7UGGPYRRB44UDN/
36
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AOATNX5UFL7V7W2QDIQKOHFFHYKWFP4W/
reference_id AOATNX5UFL7V7W2QDIQKOHFFHYKWFP4W
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AOATNX5UFL7V7W2QDIQKOHFFHYKWFP4W/
37
reference_url https://lore.kernel.org/all/CA+UBctCu7fXn4q41O_3=id1+OdyQ85tZY1x+TkT-6OVBL6KAUw%40mail.gmail.com/
reference_id CA+UBctCu7fXn4q41O_3=id1+OdyQ85tZY1x+TkT-6OVBL6KAUw%40mail.gmail.com
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/
url https://lore.kernel.org/all/CA+UBctCu7fXn4q41O_3=id1+OdyQ85tZY1x+TkT-6OVBL6KAUw%40mail.gmail.com/
38
reference_url https://www.debian.org/security/2023/dsa-5448
reference_id dsa-5448
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/
url https://www.debian.org/security/2023/dsa-5448
39
reference_url https://www.debian.org/security/2023/dsa-5480
reference_id dsa-5480
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/
url https://www.debian.org/security/2023/dsa-5480
40
reference_url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b8c75e4a1b325ea0a9433fa8834be97b5836b946
reference_id ?id=b8c75e4a1b325ea0a9433fa8834be97b5836b946
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/
url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b8c75e4a1b325ea0a9433fa8834be97b5836b946
41
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
42
reference_url https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
reference_id msg00030.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/
url https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
43
reference_url https://security.netapp.com/advisory/ntap-20230929-0003/
reference_id ntap-20230929-0003
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:03Z/
url https://security.netapp.com/advisory/ntap-20230929-0003/
44
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
45
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
46
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
47
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
48
reference_url https://usn.ubuntu.com/6231-1/
reference_id USN-6231-1
reference_type
scores
url https://usn.ubuntu.com/6231-1/
49
reference_url https://usn.ubuntu.com/6309-1/
reference_id USN-6309-1
reference_type
scores
url https://usn.ubuntu.com/6309-1/
50
reference_url https://usn.ubuntu.com/6327-1/
reference_id USN-6327-1
reference_type
scores
url https://usn.ubuntu.com/6327-1/
51
reference_url https://usn.ubuntu.com/6338-1/
reference_id USN-6338-1
reference_type
scores
url https://usn.ubuntu.com/6338-1/
52
reference_url https://usn.ubuntu.com/6338-2/
reference_id USN-6338-2
reference_type
scores
url https://usn.ubuntu.com/6338-2/
53
reference_url https://usn.ubuntu.com/6339-1/
reference_id USN-6339-1
reference_type
scores
url https://usn.ubuntu.com/6339-1/
54
reference_url https://usn.ubuntu.com/6339-2/
reference_id USN-6339-2
reference_type
scores
url https://usn.ubuntu.com/6339-2/
55
reference_url https://usn.ubuntu.com/6339-3/
reference_id USN-6339-3
reference_type
scores
url https://usn.ubuntu.com/6339-3/
56
reference_url https://usn.ubuntu.com/6339-4/
reference_id USN-6339-4
reference_type
scores
url https://usn.ubuntu.com/6339-4/
57
reference_url https://usn.ubuntu.com/6340-1/
reference_id USN-6340-1
reference_type
scores
url https://usn.ubuntu.com/6340-1/
58
reference_url https://usn.ubuntu.com/6340-2/
reference_id USN-6340-2
reference_type
scores
url https://usn.ubuntu.com/6340-2/
59
reference_url https://usn.ubuntu.com/6342-1/
reference_id USN-6342-1
reference_type
scores
url https://usn.ubuntu.com/6342-1/
60
reference_url https://usn.ubuntu.com/6342-2/
reference_id USN-6342-2
reference_type
scores
url https://usn.ubuntu.com/6342-2/
61
reference_url https://usn.ubuntu.com/6344-1/
reference_id USN-6344-1
reference_type
scores
url https://usn.ubuntu.com/6344-1/
62
reference_url https://usn.ubuntu.com/6349-1/
reference_id USN-6349-1
reference_type
scores
url https://usn.ubuntu.com/6349-1/
63
reference_url https://usn.ubuntu.com/6350-1/
reference_id USN-6350-1
reference_type
scores
url https://usn.ubuntu.com/6350-1/
64
reference_url https://usn.ubuntu.com/6351-1/
reference_id USN-6351-1
reference_type
scores
url https://usn.ubuntu.com/6351-1/
65
reference_url https://usn.ubuntu.com/6357-1/
reference_id USN-6357-1
reference_type
scores
url https://usn.ubuntu.com/6357-1/
66
reference_url https://usn.ubuntu.com/6397-1/
reference_id USN-6397-1
reference_type
scores
url https://usn.ubuntu.com/6397-1/
fixed_packages
aliases CVE-2023-31084
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2n9k-dqfk-gkb9
4
url VCID-4gq7-1egy-p7a4
vulnerability_id VCID-4gq7-1egy-p7a4
summary kernel: vmwgfx: use-after-free in vmw_cmd_res_check
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38457.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38457.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-38457
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.1298
published_at 2026-04-11T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12969
published_at 2026-04-08T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.1302
published_at 2026-04-09T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12944
published_at 2026-04-12T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.129
published_at 2026-04-13T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.128
published_at 2026-04-16T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.12803
published_at 2026-04-18T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.1289
published_at 2026-04-07T12:55:00Z
8
value 0.00044
scoring_system epss
scoring_elements 0.13448
published_at 2026-04-02T12:55:00Z
9
value 0.00044
scoring_system epss
scoring_elements 0.13513
published_at 2026-04-04T12:55:00Z
10
value 0.00044
scoring_system epss
scoring_elements 0.13295
published_at 2026-04-26T12:55:00Z
11
value 0.00044
scoring_system epss
scoring_elements 0.13315
published_at 2026-04-21T12:55:00Z
12
value 0.00044
scoring_system epss
scoring_elements 0.13322
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-38457
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38457
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38457
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2133455
reference_id 2133455
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2133455
5
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
6
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
7
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
8
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
9
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
10
reference_url https://access.redhat.com/errata/RHSA-2024:4823
reference_id RHSA-2024:4823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4823
11
reference_url https://access.redhat.com/errata/RHSA-2024:4831
reference_id RHSA-2024:4831
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4831
fixed_packages
aliases CVE-2022-38457
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4gq7-1egy-p7a4
5
url VCID-5m63-9wck-6ud6
vulnerability_id VCID-5m63-9wck-6ud6
summary kernel: saa7134: race condition leading to use-after-free in saa7134_finidev()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35823.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35823.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-35823
reference_id
reference_type
scores
0
value 0.0001
scoring_system epss
scoring_elements 0.01136
published_at 2026-04-26T12:55:00Z
1
value 0.0001
scoring_system epss
scoring_elements 0.01057
published_at 2026-04-16T12:55:00Z
2
value 0.0001
scoring_system epss
scoring_elements 0.01065
published_at 2026-04-18T12:55:00Z
3
value 0.0001
scoring_system epss
scoring_elements 0.0113
published_at 2026-04-24T12:55:00Z
4
value 9e-05
scoring_system epss
scoring_elements 0.00942
published_at 2026-04-11T12:55:00Z
5
value 9e-05
scoring_system epss
scoring_elements 0.00949
published_at 2026-04-02T12:55:00Z
6
value 9e-05
scoring_system epss
scoring_elements 0.00938
published_at 2026-04-13T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.00937
published_at 2026-04-12T12:55:00Z
8
value 9e-05
scoring_system epss
scoring_elements 0.0095
published_at 2026-04-04T12:55:00Z
9
value 9e-05
scoring_system epss
scoring_elements 0.00954
published_at 2026-04-07T12:55:00Z
10
value 9e-05
scoring_system epss
scoring_elements 0.00958
published_at 2026-04-08T12:55:00Z
11
value 9e-05
scoring_system epss
scoring_elements 0.00953
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-35823
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35823
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2215835
reference_id 2215835
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2215835
5
reference_url https://lore.kernel.org/all/49bb0b6a-e669-d4e7-d742-a19d2763e947%40xs4all.nl/
reference_id 49bb0b6a-e669-d4e7-d742-a19d2763e947%40xs4all.nl
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:44Z/
url https://lore.kernel.org/all/49bb0b6a-e669-d4e7-d742-a19d2763e947%40xs4all.nl/
6
reference_url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2
reference_id ChangeLog-6.3.2
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:44Z/
url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2
7
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=30cf57da176cca80f11df0d9b7f71581fe601389
reference_id ?id=30cf57da176cca80f11df0d9b7f71581fe601389
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:44Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=30cf57da176cca80f11df0d9b7f71581fe601389
8
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:44Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
9
reference_url https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
reference_id msg00030.html
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:44Z/
url https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
10
reference_url https://security.netapp.com/advisory/ntap-20230803-0002/
reference_id ntap-20230803-0002
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:44Z/
url https://security.netapp.com/advisory/ntap-20230803-0002/
11
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
12
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
13
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
14
reference_url https://access.redhat.com/errata/RHSA-2024:0575
reference_id RHSA-2024:0575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0575
15
reference_url https://lore.kernel.org/lkml/20230318085023.832510-1-zyytlz.wz%40163.com/t/
reference_id t
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:44Z/
url https://lore.kernel.org/lkml/20230318085023.832510-1-zyytlz.wz%40163.com/t/
16
reference_url https://usn.ubuntu.com/6283-1/
reference_id USN-6283-1
reference_type
scores
url https://usn.ubuntu.com/6283-1/
17
reference_url https://usn.ubuntu.com/6300-1/
reference_id USN-6300-1
reference_type
scores
url https://usn.ubuntu.com/6300-1/
18
reference_url https://usn.ubuntu.com/6311-1/
reference_id USN-6311-1
reference_type
scores
url https://usn.ubuntu.com/6311-1/
19
reference_url https://usn.ubuntu.com/6332-1/
reference_id USN-6332-1
reference_type
scores
url https://usn.ubuntu.com/6332-1/
20
reference_url https://usn.ubuntu.com/6340-1/
reference_id USN-6340-1
reference_type
scores
url https://usn.ubuntu.com/6340-1/
21
reference_url https://usn.ubuntu.com/6340-2/
reference_id USN-6340-2
reference_type
scores
url https://usn.ubuntu.com/6340-2/
22
reference_url https://usn.ubuntu.com/6347-1/
reference_id USN-6347-1
reference_type
scores
url https://usn.ubuntu.com/6347-1/
23
reference_url https://usn.ubuntu.com/6349-1/
reference_id USN-6349-1
reference_type
scores
url https://usn.ubuntu.com/6349-1/
24
reference_url https://usn.ubuntu.com/6357-1/
reference_id USN-6357-1
reference_type
scores
url https://usn.ubuntu.com/6357-1/
25
reference_url https://usn.ubuntu.com/6397-1/
reference_id USN-6397-1
reference_type
scores
url https://usn.ubuntu.com/6397-1/
fixed_packages
aliases CVE-2023-35823
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5m63-9wck-6ud6
6
url VCID-69a4-qgg3-hkg5
vulnerability_id VCID-69a4-qgg3-hkg5
summary kernel: vmwgfx: race condition leading to information disclosure vulnerability
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-33951.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-33951.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-33951
reference_id
reference_type
scores
0
value 6e-05
scoring_system epss
scoring_elements 0.0031
published_at 2026-04-26T12:55:00Z
1
value 6e-05
scoring_system epss
scoring_elements 0.00297
published_at 2026-04-08T12:55:00Z
2
value 6e-05
scoring_system epss
scoring_elements 0.00296
published_at 2026-04-11T12:55:00Z
3
value 6e-05
scoring_system epss
scoring_elements 0.00293
published_at 2026-04-18T12:55:00Z
4
value 6e-05
scoring_system epss
scoring_elements 0.00289
published_at 2026-04-16T12:55:00Z
5
value 6e-05
scoring_system epss
scoring_elements 0.00312
published_at 2026-04-24T12:55:00Z
6
value 6e-05
scoring_system epss
scoring_elements 0.00308
published_at 2026-04-04T12:55:00Z
7
value 6e-05
scoring_system epss
scoring_elements 0.00299
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-33951
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2218195
reference_id 2218195
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2218195
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv
reference_id cpe:/a:redhat:enterprise_linux:8::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime
reference_id cpe:/a:redhat:enterprise_linux:8::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv
reference_id cpe:/a:redhat:enterprise_linux:9::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime
reference_id cpe:/a:redhat:enterprise_linux:9::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb
reference_id cpe:/a:redhat:rhel_eus:8.8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb
reference_id cpe:/a:redhat:rhel_eus:9.2::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv
reference_id cpe:/a:redhat:rhel_eus:9.2::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime
reference_id cpe:/a:redhat:rhel_eus:9.2::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
reference_id cpe:/o:redhat:rhel_eus:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
23
reference_url https://access.redhat.com/security/cve/CVE-2023-33951
reference_id CVE-2023-33951
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/
url https://access.redhat.com/security/cve/CVE-2023-33951
24
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/
url https://access.redhat.com/errata/RHSA-2023:6583
25
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/
url https://access.redhat.com/errata/RHSA-2023:6901
26
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/
url https://access.redhat.com/errata/RHSA-2023:7077
27
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/
url https://access.redhat.com/errata/RHSA-2024:1404
28
reference_url https://access.redhat.com/errata/RHSA-2024:4823
reference_id RHSA-2024:4823
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/
url https://access.redhat.com/errata/RHSA-2024:4823
29
reference_url https://access.redhat.com/errata/RHSA-2024:4831
reference_id RHSA-2024:4831
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/
url https://access.redhat.com/errata/RHSA-2024:4831
30
reference_url https://www.zerodayinitiative.com/advisories/ZDI-CAN-20110/
reference_id ZDI-CAN-20110
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-26T17:35:27Z/
url https://www.zerodayinitiative.com/advisories/ZDI-CAN-20110/
fixed_packages
aliases CVE-2023-33951
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-69a4-qgg3-hkg5
7
url VCID-6ehx-j3nb-2ffn
vulnerability_id VCID-6ehx-j3nb-2ffn
summary kernel: mpls: double free on sysctl allocation failure
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-26545.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-26545.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-26545
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03275
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03324
published_at 2026-04-26T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03285
published_at 2026-04-04T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03294
published_at 2026-04-07T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.033
published_at 2026-04-08T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03321
published_at 2026-04-09T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.03279
published_at 2026-04-11T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03251
published_at 2026-04-12T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.0323
published_at 2026-04-13T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03205
published_at 2026-04-16T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03214
published_at 2026-04-18T12:55:00Z
11
value 0.00015
scoring_system epss
scoring_elements 0.03334
published_at 2026-04-21T12:55:00Z
12
value 0.00015
scoring_system epss
scoring_elements 0.03325
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-26545
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26545
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2182443
reference_id 2182443
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2182443
5
reference_url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.13
reference_id ChangeLog-6.1.13
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:11Z/
url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.13
6
reference_url https://github.com/torvalds/linux/commit/fda6c89fe3d9aca073495a664e1d5aea28cd4377
reference_id fda6c89fe3d9aca073495a664e1d5aea28cd4377
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:11Z/
url https://github.com/torvalds/linux/commit/fda6c89fe3d9aca073495a664e1d5aea28cd4377
7
reference_url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fda6c89fe3d9aca073495a664e1d5aea28cd4377
reference_id ?id=fda6c89fe3d9aca073495a664e1d5aea28cd4377
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:11Z/
url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fda6c89fe3d9aca073495a664e1d5aea28cd4377
8
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:11Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
9
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:11Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
10
reference_url https://security.netapp.com/advisory/ntap-20230316-0009/
reference_id ntap-20230316-0009
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:11Z/
url https://security.netapp.com/advisory/ntap-20230316-0009/
11
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
12
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
13
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
14
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
15
reference_url https://access.redhat.com/errata/RHSA-2024:0575
reference_id RHSA-2024:0575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0575
16
reference_url https://usn.ubuntu.com/5978-1/
reference_id USN-5978-1
reference_type
scores
url https://usn.ubuntu.com/5978-1/
17
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
18
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
19
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
20
reference_url https://usn.ubuntu.com/6024-1/
reference_id USN-6024-1
reference_type
scores
url https://usn.ubuntu.com/6024-1/
21
reference_url https://usn.ubuntu.com/6025-1/
reference_id USN-6025-1
reference_type
scores
url https://usn.ubuntu.com/6025-1/
22
reference_url https://usn.ubuntu.com/6027-1/
reference_id USN-6027-1
reference_type
scores
url https://usn.ubuntu.com/6027-1/
23
reference_url https://usn.ubuntu.com/6029-1/
reference_id USN-6029-1
reference_type
scores
url https://usn.ubuntu.com/6029-1/
24
reference_url https://usn.ubuntu.com/6030-1/
reference_id USN-6030-1
reference_type
scores
url https://usn.ubuntu.com/6030-1/
25
reference_url https://usn.ubuntu.com/6040-1/
reference_id USN-6040-1
reference_type
scores
url https://usn.ubuntu.com/6040-1/
26
reference_url https://usn.ubuntu.com/6057-1/
reference_id USN-6057-1
reference_type
scores
url https://usn.ubuntu.com/6057-1/
27
reference_url https://usn.ubuntu.com/6071-1/
reference_id USN-6071-1
reference_type
scores
url https://usn.ubuntu.com/6071-1/
28
reference_url https://usn.ubuntu.com/6072-1/
reference_id USN-6072-1
reference_type
scores
url https://usn.ubuntu.com/6072-1/
29
reference_url https://usn.ubuntu.com/6093-1/
reference_id USN-6093-1
reference_type
scores
url https://usn.ubuntu.com/6093-1/
30
reference_url https://usn.ubuntu.com/6134-1/
reference_id USN-6134-1
reference_type
scores
url https://usn.ubuntu.com/6134-1/
31
reference_url https://usn.ubuntu.com/6222-1/
reference_id USN-6222-1
reference_type
scores
url https://usn.ubuntu.com/6222-1/
32
reference_url https://usn.ubuntu.com/6256-1/
reference_id USN-6256-1
reference_type
scores
url https://usn.ubuntu.com/6256-1/
fixed_packages
aliases CVE-2023-26545
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6ehx-j3nb-2ffn
8
url VCID-6nm8-f9v9-bqe3
vulnerability_id VCID-6nm8-f9v9-bqe3
summary kernel: speculative pointer dereference in do_prlimit() in kernel/sys.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0458.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0458.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0458
reference_id
reference_type
scores
0
value 0.00085
scoring_system epss
scoring_elements 0.24773
published_at 2026-04-02T12:55:00Z
1
value 0.00085
scoring_system epss
scoring_elements 0.24491
published_at 2026-04-26T12:55:00Z
2
value 0.00085
scoring_system epss
scoring_elements 0.24655
published_at 2026-04-08T12:55:00Z
3
value 0.00085
scoring_system epss
scoring_elements 0.24702
published_at 2026-04-09T12:55:00Z
4
value 0.00085
scoring_system epss
scoring_elements 0.24716
published_at 2026-04-11T12:55:00Z
5
value 0.00085
scoring_system epss
scoring_elements 0.24675
published_at 2026-04-12T12:55:00Z
6
value 0.00085
scoring_system epss
scoring_elements 0.24618
published_at 2026-04-13T12:55:00Z
7
value 0.00085
scoring_system epss
scoring_elements 0.24631
published_at 2026-04-16T12:55:00Z
8
value 0.00085
scoring_system epss
scoring_elements 0.24621
published_at 2026-04-18T12:55:00Z
9
value 0.00085
scoring_system epss
scoring_elements 0.2456
published_at 2026-04-21T12:55:00Z
10
value 0.00085
scoring_system epss
scoring_elements 0.24504
published_at 2026-04-24T12:55:00Z
11
value 0.00085
scoring_system epss
scoring_elements 0.24812
published_at 2026-04-04T12:55:00Z
12
value 0.00085
scoring_system epss
scoring_elements 0.24585
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0458
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0458
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0458
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2193219
reference_id 2193219
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2193219
5
reference_url https://github.com/torvalds/linux/commit/739790605705ddcf18f21782b9c99ad7d53a8c11
reference_id 739790605705ddcf18f21782b9c99ad7d53a8c11
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-30T21:32:45Z/
url https://github.com/torvalds/linux/commit/739790605705ddcf18f21782b9c99ad7d53a8c11
6
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-30T21:32:45Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
7
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-30T21:32:45Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
8
reference_url https://access.redhat.com/errata/RHSA-2023:4377
reference_id RHSA-2023:4377
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4377
9
reference_url https://access.redhat.com/errata/RHSA-2023:4378
reference_id RHSA-2023:4378
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4378
10
reference_url https://access.redhat.com/errata/RHSA-2023:4801
reference_id RHSA-2023:4801
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4801
11
reference_url https://access.redhat.com/errata/RHSA-2023:4814
reference_id RHSA-2023:4814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4814
12
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
13
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
14
reference_url https://access.redhat.com/errata/RHSA-2024:0575
reference_id RHSA-2024:0575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0575
15
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
16
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/diff/kernel/sys.c?id=v6.1.8&id2=v6.1.7
reference_id sys.c?id=v6.1.8&id2=v6.1.7
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-30T21:32:45Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/diff/kernel/sys.c?id=v6.1.8&id2=v6.1.7
17
reference_url https://usn.ubuntu.com/6079-1/
reference_id USN-6079-1
reference_type
scores
url https://usn.ubuntu.com/6079-1/
18
reference_url https://usn.ubuntu.com/6091-1/
reference_id USN-6091-1
reference_type
scores
url https://usn.ubuntu.com/6091-1/
19
reference_url https://usn.ubuntu.com/6093-1/
reference_id USN-6093-1
reference_type
scores
url https://usn.ubuntu.com/6093-1/
20
reference_url https://usn.ubuntu.com/6096-1/
reference_id USN-6096-1
reference_type
scores
url https://usn.ubuntu.com/6096-1/
21
reference_url https://usn.ubuntu.com/6134-1/
reference_id USN-6134-1
reference_type
scores
url https://usn.ubuntu.com/6134-1/
22
reference_url https://usn.ubuntu.com/6222-1/
reference_id USN-6222-1
reference_type
scores
url https://usn.ubuntu.com/6222-1/
23
reference_url https://usn.ubuntu.com/6254-1/
reference_id USN-6254-1
reference_type
scores
url https://usn.ubuntu.com/6254-1/
24
reference_url https://usn.ubuntu.com/6256-1/
reference_id USN-6256-1
reference_type
scores
url https://usn.ubuntu.com/6256-1/
25
reference_url https://usn.ubuntu.com/6341-1/
reference_id USN-6341-1
reference_type
scores
url https://usn.ubuntu.com/6341-1/
26
reference_url https://usn.ubuntu.com/6385-1/
reference_id USN-6385-1
reference_type
scores
url https://usn.ubuntu.com/6385-1/
fixed_packages
aliases CVE-2023-0458
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6nm8-f9v9-bqe3
9
url VCID-6znz-cyqz-7qeh
vulnerability_id VCID-6znz-cyqz-7qeh
summary kernel: r592: race condition leading to use-after-free in r592_remove()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35825.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35825.json
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2215837
reference_id 2215837
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2215837
3
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
4
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
5
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
6
reference_url https://access.redhat.com/errata/RHSA-2024:0575
reference_id RHSA-2024:0575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0575
7
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
fixed_packages
aliases CVE-2023-35825
risk_score 2.9
exploitability 0.5
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6znz-cyqz-7qeh
10
url VCID-86j6-rxsj-jucj
vulnerability_id VCID-86j6-rxsj-jucj
summary kernel: sctp: fail if no bound addresses can be used for a given scope
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1074.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1074.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1074
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01603
published_at 2026-04-11T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01609
published_at 2026-04-07T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01594
published_at 2026-04-12T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01618
published_at 2026-04-09T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01611
published_at 2026-04-08T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01592
published_at 2026-04-13T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02001
published_at 2026-04-26T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02018
published_at 2026-04-21T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.02004
published_at 2026-04-24T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02428
published_at 2026-04-18T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02421
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1074
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1074
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.openwall.com/lists/oss-security/2023/01/23/1
reference_id 1
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:31Z/
url https://www.openwall.com/lists/oss-security/2023/01/23/1
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2173430
reference_id 2173430
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:31Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2173430
6
reference_url http://www.openwall.com/lists/oss-security/2023/11/05/4
reference_id 4
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:31Z/
url http://www.openwall.com/lists/oss-security/2023/11/05/4
7
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=458e279f861d3f61796894cd158b780765a1569f
reference_id ?id=458e279f861d3f61796894cd158b780765a1569f
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:31Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=458e279f861d3f61796894cd158b780765a1569f
8
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:31Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
9
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:31Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
10
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
11
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
12
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
13
reference_url https://access.redhat.com/errata/RHSA-2024:0723
reference_id RHSA-2024:0723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0723
14
reference_url https://access.redhat.com/errata/RHSA-2024:0725
reference_id RHSA-2024:0725
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0725
15
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
16
reference_url https://usn.ubuntu.com/5978-1/
reference_id USN-5978-1
reference_type
scores
url https://usn.ubuntu.com/5978-1/
17
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
18
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
19
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
20
reference_url https://usn.ubuntu.com/6025-1/
reference_id USN-6025-1
reference_type
scores
url https://usn.ubuntu.com/6025-1/
21
reference_url https://usn.ubuntu.com/6027-1/
reference_id USN-6027-1
reference_type
scores
url https://usn.ubuntu.com/6027-1/
22
reference_url https://usn.ubuntu.com/6029-1/
reference_id USN-6029-1
reference_type
scores
url https://usn.ubuntu.com/6029-1/
23
reference_url https://usn.ubuntu.com/6030-1/
reference_id USN-6030-1
reference_type
scores
url https://usn.ubuntu.com/6030-1/
24
reference_url https://usn.ubuntu.com/6031-1/
reference_id USN-6031-1
reference_type
scores
url https://usn.ubuntu.com/6031-1/
25
reference_url https://usn.ubuntu.com/6032-1/
reference_id USN-6032-1
reference_type
scores
url https://usn.ubuntu.com/6032-1/
26
reference_url https://usn.ubuntu.com/6040-1/
reference_id USN-6040-1
reference_type
scores
url https://usn.ubuntu.com/6040-1/
27
reference_url https://usn.ubuntu.com/6057-1/
reference_id USN-6057-1
reference_type
scores
url https://usn.ubuntu.com/6057-1/
28
reference_url https://usn.ubuntu.com/6079-1/
reference_id USN-6079-1
reference_type
scores
url https://usn.ubuntu.com/6079-1/
29
reference_url https://usn.ubuntu.com/6091-1/
reference_id USN-6091-1
reference_type
scores
url https://usn.ubuntu.com/6091-1/
30
reference_url https://usn.ubuntu.com/6093-1/
reference_id USN-6093-1
reference_type
scores
url https://usn.ubuntu.com/6093-1/
31
reference_url https://usn.ubuntu.com/6096-1/
reference_id USN-6096-1
reference_type
scores
url https://usn.ubuntu.com/6096-1/
32
reference_url https://usn.ubuntu.com/6134-1/
reference_id USN-6134-1
reference_type
scores
url https://usn.ubuntu.com/6134-1/
33
reference_url https://usn.ubuntu.com/6222-1/
reference_id USN-6222-1
reference_type
scores
url https://usn.ubuntu.com/6222-1/
34
reference_url https://usn.ubuntu.com/6256-1/
reference_id USN-6256-1
reference_type
scores
url https://usn.ubuntu.com/6256-1/
fixed_packages
aliases CVE-2023-1074
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-86j6-rxsj-jucj
11
url VCID-8uzn-q3h8-8qfs
vulnerability_id VCID-8uzn-q3h8-8qfs
summary kernel: KVM: nVMX: missing consistency checks for CR0 and CR4
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-30456.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-30456.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-30456
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.0134
published_at 2026-04-21T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01352
published_at 2026-04-26T12:55:00Z
2
value 0.00011
scoring_system epss
scoring_elements 0.01347
published_at 2026-04-24T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03282
published_at 2026-04-04T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03272
published_at 2026-04-02T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03291
published_at 2026-04-07T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.03297
published_at 2026-04-08T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03318
published_at 2026-04-09T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.03295
published_at 2026-04-11T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03267
published_at 2026-04-12T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03246
published_at 2026-04-13T12:55:00Z
11
value 0.00015
scoring_system epss
scoring_elements 0.03223
published_at 2026-04-16T12:55:00Z
12
value 0.00015
scoring_system epss
scoring_elements 0.03233
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-30456
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30456
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/torvalds/linux/commit/112e66017bff7f2837030f34c2bc19501e9212d5
reference_id 112e66017bff7f2837030f34c2bc19501e9212d5
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/
url https://github.com/torvalds/linux/commit/112e66017bff7f2837030f34c2bc19501e9212d5
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188468
reference_id 2188468
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188468
6
reference_url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.8
reference_id ChangeLog-6.2.8
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/
url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.8
7
reference_url http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html
reference_id Kernel-Live-Patch-Security-Notice-LSN-0096-1.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/
url http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html
8
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
9
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
10
reference_url https://security.netapp.com/advisory/ntap-20230511-0007/
reference_id ntap-20230511-0007
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:29Z/
url https://security.netapp.com/advisory/ntap-20230511-0007/
11
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
12
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
13
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
14
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
15
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
16
reference_url https://usn.ubuntu.com/6033-1/
reference_id USN-6033-1
reference_type
scores
url https://usn.ubuntu.com/6033-1/
17
reference_url https://usn.ubuntu.com/6123-1/
reference_id USN-6123-1
reference_type
scores
url https://usn.ubuntu.com/6123-1/
18
reference_url https://usn.ubuntu.com/6124-1/
reference_id USN-6124-1
reference_type
scores
url https://usn.ubuntu.com/6124-1/
19
reference_url https://usn.ubuntu.com/6127-1/
reference_id USN-6127-1
reference_type
scores
url https://usn.ubuntu.com/6127-1/
20
reference_url https://usn.ubuntu.com/6130-1/
reference_id USN-6130-1
reference_type
scores
url https://usn.ubuntu.com/6130-1/
21
reference_url https://usn.ubuntu.com/6131-1/
reference_id USN-6131-1
reference_type
scores
url https://usn.ubuntu.com/6131-1/
22
reference_url https://usn.ubuntu.com/6132-1/
reference_id USN-6132-1
reference_type
scores
url https://usn.ubuntu.com/6132-1/
23
reference_url https://usn.ubuntu.com/6135-1/
reference_id USN-6135-1
reference_type
scores
url https://usn.ubuntu.com/6135-1/
24
reference_url https://usn.ubuntu.com/6149-1/
reference_id USN-6149-1
reference_type
scores
url https://usn.ubuntu.com/6149-1/
25
reference_url https://usn.ubuntu.com/6150-1/
reference_id USN-6150-1
reference_type
scores
url https://usn.ubuntu.com/6150-1/
26
reference_url https://usn.ubuntu.com/6162-1/
reference_id USN-6162-1
reference_type
scores
url https://usn.ubuntu.com/6162-1/
27
reference_url https://usn.ubuntu.com/6175-1/
reference_id USN-6175-1
reference_type
scores
url https://usn.ubuntu.com/6175-1/
28
reference_url https://usn.ubuntu.com/6186-1/
reference_id USN-6186-1
reference_type
scores
url https://usn.ubuntu.com/6186-1/
29
reference_url https://usn.ubuntu.com/6222-1/
reference_id USN-6222-1
reference_type
scores
url https://usn.ubuntu.com/6222-1/
30
reference_url https://usn.ubuntu.com/6256-1/
reference_id USN-6256-1
reference_type
scores
url https://usn.ubuntu.com/6256-1/
31
reference_url https://usn.ubuntu.com/6699-1/
reference_id USN-6699-1
reference_type
scores
url https://usn.ubuntu.com/6699-1/
fixed_packages
aliases CVE-2023-30456
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8uzn-q3h8-8qfs
12
url VCID-a2u7-uepg-jfa1
vulnerability_id VCID-a2u7-uepg-jfa1
summary kernel: gfs2: NULL pointer dereference in gfs2_evict_inode()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3212.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3212.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3212
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01721
published_at 2026-04-02T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.0173
published_at 2026-04-04T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01729
published_at 2026-04-07T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01732
published_at 2026-04-08T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01741
published_at 2026-04-09T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01727
published_at 2026-04-11T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01718
published_at 2026-04-12T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.01717
published_at 2026-04-13T12:55:00Z
8
value 0.00012
scoring_system epss
scoring_elements 0.01705
published_at 2026-04-16T12:55:00Z
9
value 0.00012
scoring_system epss
scoring_elements 0.01706
published_at 2026-04-18T12:55:00Z
10
value 0.00013
scoring_system epss
scoring_elements 0.02117
published_at 2026-04-26T12:55:00Z
11
value 0.00013
scoring_system epss
scoring_elements 0.02158
published_at 2026-04-21T12:55:00Z
12
value 0.00013
scoring_system epss
scoring_elements 0.02125
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3212
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
33
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2214348
reference_id 2214348
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2214348
35
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
36
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
37
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
38
reference_url https://usn.ubuntu.com/6231-1/
reference_id USN-6231-1
reference_type
scores
url https://usn.ubuntu.com/6231-1/
39
reference_url https://usn.ubuntu.com/6339-1/
reference_id USN-6339-1
reference_type
scores
url https://usn.ubuntu.com/6339-1/
40
reference_url https://usn.ubuntu.com/6339-2/
reference_id USN-6339-2
reference_type
scores
url https://usn.ubuntu.com/6339-2/
41
reference_url https://usn.ubuntu.com/6339-3/
reference_id USN-6339-3
reference_type
scores
url https://usn.ubuntu.com/6339-3/
42
reference_url https://usn.ubuntu.com/6339-4/
reference_id USN-6339-4
reference_type
scores
url https://usn.ubuntu.com/6339-4/
43
reference_url https://usn.ubuntu.com/6350-1/
reference_id USN-6350-1
reference_type
scores
url https://usn.ubuntu.com/6350-1/
44
reference_url https://usn.ubuntu.com/6351-1/
reference_id USN-6351-1
reference_type
scores
url https://usn.ubuntu.com/6351-1/
45
reference_url https://usn.ubuntu.com/6388-1/
reference_id USN-6388-1
reference_type
scores
url https://usn.ubuntu.com/6388-1/
46
reference_url https://usn.ubuntu.com/6396-1/
reference_id USN-6396-1
reference_type
scores
url https://usn.ubuntu.com/6396-1/
47
reference_url https://usn.ubuntu.com/6396-2/
reference_id USN-6396-2
reference_type
scores
url https://usn.ubuntu.com/6396-2/
48
reference_url https://usn.ubuntu.com/6396-3/
reference_id USN-6396-3
reference_type
scores
url https://usn.ubuntu.com/6396-3/
49
reference_url https://usn.ubuntu.com/6412-1/
reference_id USN-6412-1
reference_type
scores
url https://usn.ubuntu.com/6412-1/
50
reference_url https://usn.ubuntu.com/6417-1/
reference_id USN-6417-1
reference_type
scores
url https://usn.ubuntu.com/6417-1/
51
reference_url https://usn.ubuntu.com/6466-1/
reference_id USN-6466-1
reference_type
scores
url https://usn.ubuntu.com/6466-1/
fixed_packages
aliases CVE-2023-3212
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a2u7-uepg-jfa1
13
url VCID-a5jg-3sk6-eqhw
vulnerability_id VCID-a5jg-3sk6-eqhw
summary kernel: tun: avoid double free in tun_free_netdev
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4744.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4744.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-4744
reference_id
reference_type
scores
0
value 0.00085
scoring_system epss
scoring_elements 0.24747
published_at 2026-04-04T12:55:00Z
1
value 0.00085
scoring_system epss
scoring_elements 0.24708
published_at 2026-04-02T12:55:00Z
2
value 0.00085
scoring_system epss
scoring_elements 0.2452
published_at 2026-04-07T12:55:00Z
3
value 0.00085
scoring_system epss
scoring_elements 0.24591
published_at 2026-04-08T12:55:00Z
4
value 0.00085
scoring_system epss
scoring_elements 0.24637
published_at 2026-04-09T12:55:00Z
5
value 0.00085
scoring_system epss
scoring_elements 0.24654
published_at 2026-04-11T12:55:00Z
6
value 0.00085
scoring_system epss
scoring_elements 0.24611
published_at 2026-04-12T12:55:00Z
7
value 0.00085
scoring_system epss
scoring_elements 0.24556
published_at 2026-04-13T12:55:00Z
8
value 0.00085
scoring_system epss
scoring_elements 0.24569
published_at 2026-04-16T12:55:00Z
9
value 0.00098
scoring_system epss
scoring_elements 0.26956
published_at 2026-04-21T12:55:00Z
10
value 0.00098
scoring_system epss
scoring_elements 0.26909
published_at 2026-04-24T12:55:00Z
11
value 0.00098
scoring_system epss
scoring_elements 0.26902
published_at 2026-04-26T12:55:00Z
12
value 0.00098
scoring_system epss
scoring_elements 0.26993
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-4744
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4744
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2156322
reference_id 2156322
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2156322
5
reference_url http://packetstormsecurity.com/files/171912/CentOS-Stream-9-Missing-Kernel-Security-Fix.html
reference_id CentOS-Stream-9-Missing-Kernel-Security-Fix.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:43:44Z/
url http://packetstormsecurity.com/files/171912/CentOS-Stream-9-Missing-Kernel-Security-Fix.html
6
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=158b515f703e
reference_id ?id=158b515f703e
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:43:44Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=158b515f703e
7
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:43:44Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
8
reference_url https://security.netapp.com/advisory/ntap-20230526-0009/
reference_id ntap-20230526-0009
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-14T15:43:44Z/
url https://security.netapp.com/advisory/ntap-20230526-0009/
9
reference_url https://access.redhat.com/errata/RHSA-2023:1466
reference_id RHSA-2023:1466
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1466
10
reference_url https://access.redhat.com/errata/RHSA-2023:1467
reference_id RHSA-2023:1467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1467
11
reference_url https://access.redhat.com/errata/RHSA-2023:1468
reference_id RHSA-2023:1468
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1468
12
reference_url https://access.redhat.com/errata/RHSA-2023:1469
reference_id RHSA-2023:1469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1469
13
reference_url https://access.redhat.com/errata/RHSA-2023:1470
reference_id RHSA-2023:1470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1470
14
reference_url https://access.redhat.com/errata/RHSA-2023:1471
reference_id RHSA-2023:1471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1471
15
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
16
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
17
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
fixed_packages
aliases CVE-2022-4744
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a5jg-3sk6-eqhw
14
url VCID-amu6-u9vr-x3gf
vulnerability_id VCID-amu6-u9vr-x3gf
summary kernel: Race between task migrating pages and another task calling exit_mmap to release those same pages getting invalid opcode BUG in include/linux/swapops.h
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4732.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4732.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4732
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.02259
published_at 2026-04-02T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02264
published_at 2026-04-04T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.02262
published_at 2026-04-07T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02263
published_at 2026-04-08T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02285
published_at 2026-04-09T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02268
published_at 2026-04-11T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02256
published_at 2026-04-12T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02254
published_at 2026-04-13T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.02235
published_at 2026-04-16T12:55:00Z
9
value 0.00013
scoring_system epss
scoring_elements 0.02245
published_at 2026-04-18T12:55:00Z
10
value 0.00013
scoring_system epss
scoring_elements 0.02339
published_at 2026-04-21T12:55:00Z
11
value 0.00013
scoring_system epss
scoring_elements 0.02317
published_at 2026-04-24T12:55:00Z
12
value 0.00013
scoring_system epss
scoring_elements 0.0231
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4732
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4732
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2236982
reference_id 2236982
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2236982
4
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
5
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
6
reference_url https://access.redhat.com/errata/RHSA-2023:7539
reference_id RHSA-2023:7539
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7539
7
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
fixed_packages
aliases CVE-2023-4732
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-amu6-u9vr-x3gf
15
url VCID-bdv6-qrn1-aqhv
vulnerability_id VCID-bdv6-qrn1-aqhv
summary kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3611.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3611.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3611
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02662
published_at 2026-04-02T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02741
published_at 2026-04-26T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02675
published_at 2026-04-04T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02683
published_at 2026-04-07T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02685
published_at 2026-04-08T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02705
published_at 2026-04-09T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02678
published_at 2026-04-11T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02664
published_at 2026-04-12T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02661
published_at 2026-04-13T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02643
published_at 2026-04-16T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02651
published_at 2026-04-18T12:55:00Z
11
value 0.00014
scoring_system epss
scoring_elements 0.02764
published_at 2026-04-21T12:55:00Z
12
value 0.00014
scoring_system epss
scoring_elements 0.02754
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3611
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
33
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2225191
reference_id 2225191
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2225191
35
reference_url https://kernel.dance/3e337087c3b5805fe0b8a46ba622a962880b5d64
reference_id 3e337087c3b5805fe0b8a46ba622a962880b5d64
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T13:33:11Z/
url https://kernel.dance/3e337087c3b5805fe0b8a46ba622a962880b5d64
36
reference_url https://www.debian.org/security/2023/dsa-5480
reference_id dsa-5480
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T13:33:11Z/
url https://www.debian.org/security/2023/dsa-5480
37
reference_url https://www.debian.org/security/2023/dsa-5492
reference_id dsa-5492
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T13:33:11Z/
url https://www.debian.org/security/2023/dsa-5492
38
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e337087c3b5805fe0b8a46ba622a962880b5d64
reference_id ?id=3e337087c3b5805fe0b8a46ba622a962880b5d64
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T13:33:11Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e337087c3b5805fe0b8a46ba622a962880b5d64
39
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
reference_id msg00004.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T13:33:11Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
40
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T13:33:11Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
41
reference_url https://security.netapp.com/advisory/ntap-20230908-0002/
reference_id ntap-20230908-0002
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T13:33:11Z/
url https://security.netapp.com/advisory/ntap-20230908-0002/
42
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
43
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
44
reference_url https://access.redhat.com/errata/RHSA-2023:7419
reference_id RHSA-2023:7419
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7419
45
reference_url https://access.redhat.com/errata/RHSA-2023:7423
reference_id RHSA-2023:7423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7423
46
reference_url https://access.redhat.com/errata/RHSA-2023:7424
reference_id RHSA-2023:7424
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7424
47
reference_url https://access.redhat.com/errata/RHSA-2024:0261
reference_id RHSA-2024:0261
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0261
48
reference_url https://access.redhat.com/errata/RHSA-2024:0262
reference_id RHSA-2024:0262
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0262
49
reference_url https://access.redhat.com/errata/RHSA-2024:0378
reference_id RHSA-2024:0378
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0378
50
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
51
reference_url https://access.redhat.com/errata/RHSA-2024:0554
reference_id RHSA-2024:0554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0554
52
reference_url https://access.redhat.com/errata/RHSA-2024:0575
reference_id RHSA-2024:0575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0575
53
reference_url https://access.redhat.com/errata/RHSA-2024:1268
reference_id RHSA-2024:1268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1268
54
reference_url https://access.redhat.com/errata/RHSA-2024:1269
reference_id RHSA-2024:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1269
55
reference_url https://access.redhat.com/errata/RHSA-2024:1278
reference_id RHSA-2024:1278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1278
56
reference_url https://access.redhat.com/errata/RHSA-2024:1367
reference_id RHSA-2024:1367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1367
57
reference_url https://access.redhat.com/errata/RHSA-2024:1377
reference_id RHSA-2024:1377
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1377
58
reference_url https://access.redhat.com/errata/RHSA-2024:1382
reference_id RHSA-2024:1382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1382
59
reference_url https://access.redhat.com/errata/RHSA-2024:1831
reference_id RHSA-2024:1831
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1831
60
reference_url https://usn.ubuntu.com/6285-1/
reference_id USN-6285-1
reference_type
scores
url https://usn.ubuntu.com/6285-1/
61
reference_url https://usn.ubuntu.com/6309-1/
reference_id USN-6309-1
reference_type
scores
url https://usn.ubuntu.com/6309-1/
62
reference_url https://usn.ubuntu.com/6315-1/
reference_id USN-6315-1
reference_type
scores
url https://usn.ubuntu.com/6315-1/
63
reference_url https://usn.ubuntu.com/6317-1/
reference_id USN-6317-1
reference_type
scores
url https://usn.ubuntu.com/6317-1/
64
reference_url https://usn.ubuntu.com/6318-1/
reference_id USN-6318-1
reference_type
scores
url https://usn.ubuntu.com/6318-1/
65
reference_url https://usn.ubuntu.com/6321-1/
reference_id USN-6321-1
reference_type
scores
url https://usn.ubuntu.com/6321-1/
66
reference_url https://usn.ubuntu.com/6324-1/
reference_id USN-6324-1
reference_type
scores
url https://usn.ubuntu.com/6324-1/
67
reference_url https://usn.ubuntu.com/6325-1/
reference_id USN-6325-1
reference_type
scores
url https://usn.ubuntu.com/6325-1/
68
reference_url https://usn.ubuntu.com/6327-1/
reference_id USN-6327-1
reference_type
scores
url https://usn.ubuntu.com/6327-1/
69
reference_url https://usn.ubuntu.com/6328-1/
reference_id USN-6328-1
reference_type
scores
url https://usn.ubuntu.com/6328-1/
70
reference_url https://usn.ubuntu.com/6329-1/
reference_id USN-6329-1
reference_type
scores
url https://usn.ubuntu.com/6329-1/
71
reference_url https://usn.ubuntu.com/6330-1/
reference_id USN-6330-1
reference_type
scores
url https://usn.ubuntu.com/6330-1/
72
reference_url https://usn.ubuntu.com/6331-1/
reference_id USN-6331-1
reference_type
scores
url https://usn.ubuntu.com/6331-1/
73
reference_url https://usn.ubuntu.com/6332-1/
reference_id USN-6332-1
reference_type
scores
url https://usn.ubuntu.com/6332-1/
74
reference_url https://usn.ubuntu.com/6341-1/
reference_id USN-6341-1
reference_type
scores
url https://usn.ubuntu.com/6341-1/
75
reference_url https://usn.ubuntu.com/6342-1/
reference_id USN-6342-1
reference_type
scores
url https://usn.ubuntu.com/6342-1/
76
reference_url https://usn.ubuntu.com/6342-2/
reference_id USN-6342-2
reference_type
scores
url https://usn.ubuntu.com/6342-2/
77
reference_url https://usn.ubuntu.com/6346-1/
reference_id USN-6346-1
reference_type
scores
url https://usn.ubuntu.com/6346-1/
78
reference_url https://usn.ubuntu.com/6348-1/
reference_id USN-6348-1
reference_type
scores
url https://usn.ubuntu.com/6348-1/
79
reference_url https://usn.ubuntu.com/6357-1/
reference_id USN-6357-1
reference_type
scores
url https://usn.ubuntu.com/6357-1/
80
reference_url https://usn.ubuntu.com/6385-1/
reference_id USN-6385-1
reference_type
scores
url https://usn.ubuntu.com/6385-1/
81
reference_url https://usn.ubuntu.com/6397-1/
reference_id USN-6397-1
reference_type
scores
url https://usn.ubuntu.com/6397-1/
fixed_packages
aliases CVE-2023-3611
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bdv6-qrn1-aqhv
16
url VCID-brwq-qcbd-c3ep
vulnerability_id VCID-brwq-qcbd-c3ep
summary kernel: x86/mm: Randomize per-cpu entry area
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0597.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0597.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0597
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.05031
published_at 2026-04-02T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.05237
published_at 2026-04-26T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.0507
published_at 2026-04-13T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.05016
published_at 2026-04-16T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.05022
published_at 2026-04-18T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.05169
published_at 2026-04-21T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.05194
published_at 2026-04-24T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.0506
published_at 2026-04-04T12:55:00Z
8
value 0.00019
scoring_system epss
scoring_elements 0.05081
published_at 2026-04-07T12:55:00Z
9
value 0.00019
scoring_system epss
scoring_elements 0.05114
published_at 2026-04-08T12:55:00Z
10
value 0.00019
scoring_system epss
scoring_elements 0.05129
published_at 2026-04-09T12:55:00Z
11
value 0.00019
scoring_system epss
scoring_elements 0.05104
published_at 2026-04-11T12:55:00Z
12
value 0.00019
scoring_system epss
scoring_elements 0.05086
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0597
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0597
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://www.openwall.com/lists/oss-security/2023/07/28/1
reference_id 1
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-12T19:17:29Z/
url http://www.openwall.com/lists/oss-security/2023/07/28/1
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2165926
reference_id 2165926
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2165926
6
reference_url https://git.kernel.org/linus/97e3d26b5e5f371b3ee223d94dd123e6c442ba80
reference_id 97e3d26b5e5f371b3ee223d94dd123e6c442ba80
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-12T19:17:29Z/
url https://git.kernel.org/linus/97e3d26b5e5f371b3ee223d94dd123e6c442ba80
7
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
8
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
9
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
10
reference_url https://access.redhat.com/errata/RHSA-2024:10262
reference_id RHSA-2024:10262
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10262
11
reference_url https://access.redhat.com/errata/RHSA-2024:10772
reference_id RHSA-2024:10772
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10772
12
reference_url https://access.redhat.com/errata/RHSA-2024:10773
reference_id RHSA-2024:10773
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10773
13
reference_url https://access.redhat.com/errata/RHSA-2024:1188
reference_id RHSA-2024:1188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1188
14
reference_url https://usn.ubuntu.com/6206-1/
reference_id USN-6206-1
reference_type
scores
url https://usn.ubuntu.com/6206-1/
15
reference_url https://usn.ubuntu.com/6235-1/
reference_id USN-6235-1
reference_type
scores
url https://usn.ubuntu.com/6235-1/
16
reference_url https://usn.ubuntu.com/6300-1/
reference_id USN-6300-1
reference_type
scores
url https://usn.ubuntu.com/6300-1/
17
reference_url https://usn.ubuntu.com/6311-1/
reference_id USN-6311-1
reference_type
scores
url https://usn.ubuntu.com/6311-1/
18
reference_url https://usn.ubuntu.com/6332-1/
reference_id USN-6332-1
reference_type
scores
url https://usn.ubuntu.com/6332-1/
19
reference_url https://usn.ubuntu.com/6347-1/
reference_id USN-6347-1
reference_type
scores
url https://usn.ubuntu.com/6347-1/
20
reference_url https://usn.ubuntu.com/6440-1/
reference_id USN-6440-1
reference_type
scores
url https://usn.ubuntu.com/6440-1/
21
reference_url https://usn.ubuntu.com/6440-2/
reference_id USN-6440-2
reference_type
scores
url https://usn.ubuntu.com/6440-2/
22
reference_url https://usn.ubuntu.com/6440-3/
reference_id USN-6440-3
reference_type
scores
url https://usn.ubuntu.com/6440-3/
23
reference_url https://usn.ubuntu.com/6462-1/
reference_id USN-6462-1
reference_type
scores
url https://usn.ubuntu.com/6462-1/
24
reference_url https://usn.ubuntu.com/6462-2/
reference_id USN-6462-2
reference_type
scores
url https://usn.ubuntu.com/6462-2/
fixed_packages
aliases CVE-2023-0597
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-brwq-qcbd-c3ep
17
url VCID-c3z5-1arv-kqck
vulnerability_id VCID-c3z5-1arv-kqck
summary kernel: ext4: use-after-free in ext4_xattr_set_entry()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2513.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2513.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2513
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.0214
published_at 2026-04-02T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02154
published_at 2026-04-26T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.02137
published_at 2026-04-11T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02122
published_at 2026-04-12T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02118
published_at 2026-04-13T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02093
published_at 2026-04-16T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02106
published_at 2026-04-18T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02193
published_at 2026-04-21T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.02163
published_at 2026-04-24T12:55:00Z
9
value 0.00013
scoring_system epss
scoring_elements 0.02146
published_at 2026-04-04T12:55:00Z
10
value 0.00013
scoring_system epss
scoring_elements 0.02142
published_at 2026-04-07T12:55:00Z
11
value 0.00013
scoring_system epss
scoring_elements 0.02141
published_at 2026-04-08T12:55:00Z
12
value 0.00013
scoring_system epss
scoring_elements 0.02159
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2513
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2513
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lore.kernel.org/all/20220616021358.2504451-1-libaokun1%40huawei.com/
reference_id 20220616021358.2504451-1-libaokun1%40huawei.com
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:28Z/
url https://lore.kernel.org/all/20220616021358.2504451-1-libaokun1%40huawei.com/
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2193097
reference_id 2193097
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:28Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2193097
6
reference_url https://github.com/torvalds/linux/commit/67d7d8ad99be
reference_id 67d7d8ad99be
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:28Z/
url https://github.com/torvalds/linux/commit/67d7d8ad99be
7
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
8
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
9
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
10
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
11
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
12
reference_url https://access.redhat.com/errata/RHSA-2025:15649
reference_id RHSA-2025:15649
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15649
13
reference_url https://access.redhat.com/errata/RHSA-2025:15656
reference_id RHSA-2025:15656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15656
14
reference_url https://access.redhat.com/errata/RHSA-2025:15658
reference_id RHSA-2025:15658
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15658
15
reference_url https://access.redhat.com/errata/RHSA-2025:15660
reference_id RHSA-2025:15660
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15660
16
reference_url https://access.redhat.com/errata/RHSA-2025:15670
reference_id RHSA-2025:15670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15670
17
reference_url https://usn.ubuntu.com/6254-1/
reference_id USN-6254-1
reference_type
scores
url https://usn.ubuntu.com/6254-1/
fixed_packages
aliases CVE-2023-2513
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c3z5-1arv-kqck
18
url VCID-cf2b-yvwj-wyh1
vulnerability_id VCID-cf2b-yvwj-wyh1
summary kernel: KVM: SEV-ES / SEV-SNP VMGEXIT double fetch vulnerability
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4155.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4155.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4155
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01846
published_at 2026-04-16T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01864
published_at 2026-04-13T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01885
published_at 2026-04-11T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01869
published_at 2026-04-12T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01931
published_at 2026-04-21T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01845
published_at 2026-04-18T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02092
published_at 2026-04-26T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02098
published_at 2026-04-24T12:55:00Z
8
value 8e-05
scoring_system epss
scoring_elements 0.00714
published_at 2026-04-08T12:55:00Z
9
value 8e-05
scoring_system epss
scoring_elements 0.00715
published_at 2026-04-07T12:55:00Z
10
value 8e-05
scoring_system epss
scoring_elements 0.0071
published_at 2026-04-04T12:55:00Z
11
value 8e-05
scoring_system epss
scoring_elements 0.00713
published_at 2026-04-02T12:55:00Z
12
value 8e-05
scoring_system epss
scoring_elements 0.00705
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4155
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2213802
reference_id 2213802
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-26T21:49:34Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2213802
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
8
reference_url https://access.redhat.com/security/cve/CVE-2023-4155
reference_id CVE-2023-4155
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-26T21:49:34Z/
url https://access.redhat.com/security/cve/CVE-2023-4155
9
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
10
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
11
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
12
reference_url https://access.redhat.com/errata/RHSA-2024:3859
reference_id RHSA-2024:3859
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3859
13
reference_url https://access.redhat.com/errata/RHSA-2024:4740
reference_id RHSA-2024:4740
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4740
14
reference_url https://usn.ubuntu.com/6343-1/
reference_id USN-6343-1
reference_type
scores
url https://usn.ubuntu.com/6343-1/
15
reference_url https://usn.ubuntu.com/6412-1/
reference_id USN-6412-1
reference_type
scores
url https://usn.ubuntu.com/6412-1/
16
reference_url https://usn.ubuntu.com/6416-1/
reference_id USN-6416-1
reference_type
scores
url https://usn.ubuntu.com/6416-1/
17
reference_url https://usn.ubuntu.com/6416-2/
reference_id USN-6416-2
reference_type
scores
url https://usn.ubuntu.com/6416-2/
18
reference_url https://usn.ubuntu.com/6416-3/
reference_id USN-6416-3
reference_type
scores
url https://usn.ubuntu.com/6416-3/
19
reference_url https://usn.ubuntu.com/6445-1/
reference_id USN-6445-1
reference_type
scores
url https://usn.ubuntu.com/6445-1/
20
reference_url https://usn.ubuntu.com/6445-2/
reference_id USN-6445-2
reference_type
scores
url https://usn.ubuntu.com/6445-2/
21
reference_url https://usn.ubuntu.com/6466-1/
reference_id USN-6466-1
reference_type
scores
url https://usn.ubuntu.com/6466-1/
fixed_packages
aliases CVE-2023-4155
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cf2b-yvwj-wyh1
19
url VCID-ebxk-u1b1-zybq
vulnerability_id VCID-ebxk-u1b1-zybq
summary kernel: use-after-free bug in remove function xgene_hwmon_remove
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1855.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1855.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1855
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02657
published_at 2026-04-02T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.0267
published_at 2026-04-04T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02688
published_at 2026-04-07T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.0269
published_at 2026-04-08T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.0271
published_at 2026-04-09T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02683
published_at 2026-04-11T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02669
published_at 2026-04-12T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02666
published_at 2026-04-13T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02647
published_at 2026-04-16T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02655
published_at 2026-04-18T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02767
published_at 2026-04-21T12:55:00Z
11
value 0.00017
scoring_system epss
scoring_elements 0.03979
published_at 2026-04-26T12:55:00Z
12
value 0.00017
scoring_system epss
scoring_elements 0.03976
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1855
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1855
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lore.kernel.org/all/20230318122758.2140868-1-linux%40roeck-us.net/
reference_id 20230318122758.2140868-1-linux%40roeck-us.net
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-12T16:06:04Z/
url https://lore.kernel.org/all/20230318122758.2140868-1-linux%40roeck-us.net/
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2184578
reference_id 2184578
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2184578
6
reference_url https://github.com/torvalds/linux/commit/cb090e64cf25602b9adaf32d5dfc9c8bec493cd1
reference_id cb090e64cf25602b9adaf32d5dfc9c8bec493cd1
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-12T16:06:04Z/
url https://github.com/torvalds/linux/commit/cb090e64cf25602b9adaf32d5dfc9c8bec493cd1
7
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-12T16:06:04Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
8
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-12T16:06:04Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
9
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
10
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
11
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
12
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
13
reference_url https://access.redhat.com/errata/RHSA-2024:0575
reference_id RHSA-2024:0575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0575
14
reference_url https://usn.ubuntu.com/6033-1/
reference_id USN-6033-1
reference_type
scores
url https://usn.ubuntu.com/6033-1/
15
reference_url https://usn.ubuntu.com/6175-1/
reference_id USN-6175-1
reference_type
scores
url https://usn.ubuntu.com/6175-1/
16
reference_url https://usn.ubuntu.com/6186-1/
reference_id USN-6186-1
reference_type
scores
url https://usn.ubuntu.com/6186-1/
17
reference_url https://usn.ubuntu.com/6284-1/
reference_id USN-6284-1
reference_type
scores
url https://usn.ubuntu.com/6284-1/
18
reference_url https://usn.ubuntu.com/6300-1/
reference_id USN-6300-1
reference_type
scores
url https://usn.ubuntu.com/6300-1/
19
reference_url https://usn.ubuntu.com/6301-1/
reference_id USN-6301-1
reference_type
scores
url https://usn.ubuntu.com/6301-1/
20
reference_url https://usn.ubuntu.com/6311-1/
reference_id USN-6311-1
reference_type
scores
url https://usn.ubuntu.com/6311-1/
21
reference_url https://usn.ubuntu.com/6312-1/
reference_id USN-6312-1
reference_type
scores
url https://usn.ubuntu.com/6312-1/
22
reference_url https://usn.ubuntu.com/6314-1/
reference_id USN-6314-1
reference_type
scores
url https://usn.ubuntu.com/6314-1/
23
reference_url https://usn.ubuntu.com/6331-1/
reference_id USN-6331-1
reference_type
scores
url https://usn.ubuntu.com/6331-1/
24
reference_url https://usn.ubuntu.com/6332-1/
reference_id USN-6332-1
reference_type
scores
url https://usn.ubuntu.com/6332-1/
25
reference_url https://usn.ubuntu.com/6337-1/
reference_id USN-6337-1
reference_type
scores
url https://usn.ubuntu.com/6337-1/
26
reference_url https://usn.ubuntu.com/6347-1/
reference_id USN-6347-1
reference_type
scores
url https://usn.ubuntu.com/6347-1/
fixed_packages
aliases CVE-2023-1855
risk_score 2.9
exploitability 0.5
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ebxk-u1b1-zybq
20
url VCID-fk99-ervq-v3fx
vulnerability_id VCID-fk99-ervq-v3fx
summary kernel: ovl: fix use after free in struct ovl_aio_req
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1252.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1252.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1252
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.05154
published_at 2026-04-02T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.05182
published_at 2026-04-04T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.05203
published_at 2026-04-07T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.05235
published_at 2026-04-08T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.05254
published_at 2026-04-09T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06203
published_at 2026-04-21T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06218
published_at 2026-04-24T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06249
published_at 2026-04-26T12:55:00Z
8
value 0.00023
scoring_system epss
scoring_elements 0.06095
published_at 2026-04-11T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.0609
published_at 2026-04-12T12:55:00Z
10
value 0.00023
scoring_system epss
scoring_elements 0.06081
published_at 2026-04-13T12:55:00Z
11
value 0.00023
scoring_system epss
scoring_elements 0.06046
published_at 2026-04-16T12:55:00Z
12
value 0.00023
scoring_system epss
scoring_elements 0.06055
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1252
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1252
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1252
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2176140
reference_id 2176140
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2176140
5
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
6
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
7
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
8
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
9
reference_url https://access.redhat.com/errata/RHSA-2024:8107
reference_id RHSA-2024:8107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8107
10
reference_url https://access.redhat.com/errata/RHSA-2024:8613
reference_id RHSA-2024:8613
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8613
11
reference_url https://access.redhat.com/errata/RHSA-2024:8614
reference_id RHSA-2024:8614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8614
fixed_packages
aliases CVE-2023-1252
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fk99-ervq-v3fx
21
url VCID-ghef-adjn-rqcb
vulnerability_id VCID-ghef-adjn-rqcb
summary kernel: denial of service in tipc_conn_close
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1382.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1382.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1382
reference_id
reference_type
scores
0
value 0.0001
scoring_system epss
scoring_elements 0.01095
published_at 2026-04-09T12:55:00Z
1
value 0.0001
scoring_system epss
scoring_elements 0.01091
published_at 2026-04-07T12:55:00Z
2
value 0.0001
scoring_system epss
scoring_elements 0.01096
published_at 2026-04-08T12:55:00Z
3
value 0.0001
scoring_system epss
scoring_elements 0.01079
published_at 2026-04-11T12:55:00Z
4
value 0.0001
scoring_system epss
scoring_elements 0.01073
published_at 2026-04-12T12:55:00Z
5
value 0.0001
scoring_system epss
scoring_elements 0.01074
published_at 2026-04-13T12:55:00Z
6
value 0.0001
scoring_system epss
scoring_elements 0.01068
published_at 2026-04-16T12:55:00Z
7
value 0.0001
scoring_system epss
scoring_elements 0.01077
published_at 2026-04-18T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.03381
published_at 2026-04-26T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03379
published_at 2026-04-24T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.0339
published_at 2026-04-21T12:55:00Z
11
value 9e-05
scoring_system epss
scoring_elements 0.00895
published_at 2026-04-04T12:55:00Z
12
value 9e-05
scoring_system epss
scoring_elements 0.00893
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1382
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1382
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1382
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2177371
reference_id 2177371
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2177371
5
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
6
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
7
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
8
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
9
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
10
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
11
reference_url https://lore.kernel.org/netdev/bc7bd3183f1c275c820690fc65b708238fe9e38e.1668807842.git.lucien.xin%40gmail.com/T/#u
reference_id #u
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:20Z/
url https://lore.kernel.org/netdev/bc7bd3183f1c275c820690fc65b708238fe9e38e.1668807842.git.lucien.xin%40gmail.com/T/#u
12
reference_url https://usn.ubuntu.com/6000-1/
reference_id USN-6000-1
reference_type
scores
url https://usn.ubuntu.com/6000-1/
13
reference_url https://usn.ubuntu.com/6739-1/
reference_id USN-6739-1
reference_type
scores
url https://usn.ubuntu.com/6739-1/
14
reference_url https://usn.ubuntu.com/6740-1/
reference_id USN-6740-1
reference_type
scores
url https://usn.ubuntu.com/6740-1/
fixed_packages
aliases CVE-2023-1382
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ghef-adjn-rqcb
22
url VCID-gpdn-rup2-7fey
vulnerability_id VCID-gpdn-rup2-7fey
summary kernel: vmwgfx: use-after-free in vmw_execbuf_tie_context
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40133.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40133.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-40133
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.1298
published_at 2026-04-11T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12969
published_at 2026-04-08T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.1302
published_at 2026-04-09T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12944
published_at 2026-04-12T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.129
published_at 2026-04-13T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.128
published_at 2026-04-16T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.12803
published_at 2026-04-18T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.1289
published_at 2026-04-07T12:55:00Z
8
value 0.00044
scoring_system epss
scoring_elements 0.13448
published_at 2026-04-02T12:55:00Z
9
value 0.00044
scoring_system epss
scoring_elements 0.13513
published_at 2026-04-04T12:55:00Z
10
value 0.00044
scoring_system epss
scoring_elements 0.13295
published_at 2026-04-26T12:55:00Z
11
value 0.00044
scoring_system epss
scoring_elements 0.13315
published_at 2026-04-21T12:55:00Z
12
value 0.00044
scoring_system epss
scoring_elements 0.13322
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-40133
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40133
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2133453
reference_id 2133453
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2133453
5
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
6
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
7
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
8
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
9
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
10
reference_url https://access.redhat.com/errata/RHSA-2024:4823
reference_id RHSA-2024:4823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4823
11
reference_url https://access.redhat.com/errata/RHSA-2024:4831
reference_id RHSA-2024:4831
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4831
fixed_packages
aliases CVE-2022-40133
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gpdn-rup2-7fey
23
url VCID-hvkn-sk3f-pud6
vulnerability_id VCID-hvkn-sk3f-pud6
summary kernel: Use after free bug in btsdio_remove due to race condition
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1989.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1989.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1989
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04404
published_at 2026-04-26T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04252
published_at 2026-04-12T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04232
published_at 2026-04-16T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.04242
published_at 2026-04-18T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.04367
published_at 2026-04-21T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.04385
published_at 2026-04-24T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04549
published_at 2026-04-09T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.0446
published_at 2026-04-02T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.0454
published_at 2026-04-11T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.04485
published_at 2026-04-04T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04498
published_at 2026-04-07T12:55:00Z
11
value 0.00018
scoring_system epss
scoring_elements 0.04534
published_at 2026-04-08T12:55:00Z
12
value 0.00019
scoring_system epss
scoring_elements 0.0511
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1989
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1989
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2185945
reference_id 2185945
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2185945
5
reference_url https://www.debian.org/security/2023/dsa-5492
reference_id dsa-5492
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:19Z/
url https://www.debian.org/security/2023/dsa-5492
6
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=f132c2d13088
reference_id ?id=f132c2d13088
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:19Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=f132c2d13088
7
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
reference_id msg00004.html
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:19Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
8
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:19Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
9
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:19Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
10
reference_url https://security.netapp.com/advisory/ntap-20230601-0004/
reference_id ntap-20230601-0004
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:19Z/
url https://security.netapp.com/advisory/ntap-20230601-0004/
11
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
12
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
13
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
14
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
15
reference_url https://access.redhat.com/errata/RHSA-2024:4740
reference_id RHSA-2024:4740
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4740
16
reference_url https://usn.ubuntu.com/6033-1/
reference_id USN-6033-1
reference_type
scores
url https://usn.ubuntu.com/6033-1/
17
reference_url https://usn.ubuntu.com/6175-1/
reference_id USN-6175-1
reference_type
scores
url https://usn.ubuntu.com/6175-1/
18
reference_url https://usn.ubuntu.com/6186-1/
reference_id USN-6186-1
reference_type
scores
url https://usn.ubuntu.com/6186-1/
fixed_packages
aliases CVE-2023-1989
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hvkn-sk3f-pud6
24
url VCID-j7z5-3htn-vkd2
vulnerability_id VCID-j7z5-3htn-vkd2
summary kernel: hash collisions in the IPv6 connection lookup table
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1206.json
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1206.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1206
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11447
published_at 2026-04-02T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11294
published_at 2026-04-07T12:55:00Z
2
value 0.00038
scoring_system epss
scoring_elements 0.11435
published_at 2026-04-09T12:55:00Z
3
value 0.00038
scoring_system epss
scoring_elements 0.1144
published_at 2026-04-11T12:55:00Z
4
value 0.00038
scoring_system epss
scoring_elements 0.11408
published_at 2026-04-12T12:55:00Z
5
value 0.00038
scoring_system epss
scoring_elements 0.11378
published_at 2026-04-13T12:55:00Z
6
value 0.00038
scoring_system epss
scoring_elements 0.11236
published_at 2026-04-16T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.11238
published_at 2026-04-18T12:55:00Z
8
value 0.00038
scoring_system epss
scoring_elements 0.11366
published_at 2026-04-21T12:55:00Z
9
value 0.00038
scoring_system epss
scoring_elements 0.11307
published_at 2026-04-24T12:55:00Z
10
value 0.00038
scoring_system epss
scoring_elements 0.11506
published_at 2026-04-04T12:55:00Z
11
value 0.00038
scoring_system epss
scoring_elements 0.11376
published_at 2026-04-08T12:55:00Z
12
value 0.0004
scoring_system epss
scoring_elements 0.12242
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1206
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
33
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2175903
reference_id 2175903
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:04Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2175903
35
reference_url https://www.debian.org/security/2023/dsa-5480
reference_id dsa-5480
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:04Z/
url https://www.debian.org/security/2023/dsa-5480
36
reference_url https://www.debian.org/security/2023/dsa-5492
reference_id dsa-5492
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:04Z/
url https://www.debian.org/security/2023/dsa-5492
37
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
reference_id msg00004.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:04Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
38
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:04Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
39
reference_url https://security.netapp.com/advisory/ntap-20230929-0006/
reference_id ntap-20230929-0006
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:04Z/
url https://security.netapp.com/advisory/ntap-20230929-0006/
40
reference_url https://access.redhat.com/errata/RHSA-2023:5603
reference_id RHSA-2023:5603
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5603
41
reference_url https://access.redhat.com/errata/RHSA-2023:5604
reference_id RHSA-2023:5604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5604
42
reference_url https://access.redhat.com/errata/RHSA-2023:5627
reference_id RHSA-2023:5627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5627
43
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
44
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
45
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
46
reference_url https://usn.ubuntu.com/6343-1/
reference_id USN-6343-1
reference_type
scores
url https://usn.ubuntu.com/6343-1/
47
reference_url https://usn.ubuntu.com/6385-1/
reference_id USN-6385-1
reference_type
scores
url https://usn.ubuntu.com/6385-1/
48
reference_url https://usn.ubuntu.com/6412-1/
reference_id USN-6412-1
reference_type
scores
url https://usn.ubuntu.com/6412-1/
49
reference_url https://usn.ubuntu.com/6416-1/
reference_id USN-6416-1
reference_type
scores
url https://usn.ubuntu.com/6416-1/
50
reference_url https://usn.ubuntu.com/6416-2/
reference_id USN-6416-2
reference_type
scores
url https://usn.ubuntu.com/6416-2/
51
reference_url https://usn.ubuntu.com/6416-3/
reference_id USN-6416-3
reference_type
scores
url https://usn.ubuntu.com/6416-3/
52
reference_url https://usn.ubuntu.com/6417-1/
reference_id USN-6417-1
reference_type
scores
url https://usn.ubuntu.com/6417-1/
53
reference_url https://usn.ubuntu.com/6439-1/
reference_id USN-6439-1
reference_type
scores
url https://usn.ubuntu.com/6439-1/
54
reference_url https://usn.ubuntu.com/6439-2/
reference_id USN-6439-2
reference_type
scores
url https://usn.ubuntu.com/6439-2/
55
reference_url https://usn.ubuntu.com/6440-1/
reference_id USN-6440-1
reference_type
scores
url https://usn.ubuntu.com/6440-1/
56
reference_url https://usn.ubuntu.com/6440-2/
reference_id USN-6440-2
reference_type
scores
url https://usn.ubuntu.com/6440-2/
57
reference_url https://usn.ubuntu.com/6440-3/
reference_id USN-6440-3
reference_type
scores
url https://usn.ubuntu.com/6440-3/
58
reference_url https://usn.ubuntu.com/6445-1/
reference_id USN-6445-1
reference_type
scores
url https://usn.ubuntu.com/6445-1/
59
reference_url https://usn.ubuntu.com/6445-2/
reference_id USN-6445-2
reference_type
scores
url https://usn.ubuntu.com/6445-2/
60
reference_url https://usn.ubuntu.com/6460-1/
reference_id USN-6460-1
reference_type
scores
url https://usn.ubuntu.com/6460-1/
61
reference_url https://usn.ubuntu.com/6466-1/
reference_id USN-6466-1
reference_type
scores
url https://usn.ubuntu.com/6466-1/
fixed_packages
aliases CVE-2023-1206
risk_score 2.5
exploitability 0.5
weighted_severity 5.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j7z5-3htn-vkd2
25
url VCID-j8ze-t6w6-ekak
vulnerability_id VCID-j8ze-t6w6-ekak
summary kernel: Information leak in l2cap_parse_conf_req in net/bluetooth/l2cap_core.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42895.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42895.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42895
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.21294
published_at 2026-04-26T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21444
published_at 2026-04-21T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.21296
published_at 2026-04-24T12:55:00Z
3
value 0.00076
scoring_system epss
scoring_elements 0.22822
published_at 2026-04-16T12:55:00Z
4
value 0.00076
scoring_system epss
scoring_elements 0.22882
published_at 2026-04-09T12:55:00Z
5
value 0.00076
scoring_system epss
scoring_elements 0.22902
published_at 2026-04-11T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.22865
published_at 2026-04-12T12:55:00Z
7
value 0.00076
scoring_system epss
scoring_elements 0.22809
published_at 2026-04-13T12:55:00Z
8
value 0.00076
scoring_system epss
scoring_elements 0.22816
published_at 2026-04-18T12:55:00Z
9
value 0.00076
scoring_system epss
scoring_elements 0.22918
published_at 2026-04-02T12:55:00Z
10
value 0.00076
scoring_system epss
scoring_elements 0.22962
published_at 2026-04-04T12:55:00Z
11
value 0.00076
scoring_system epss
scoring_elements 0.22755
published_at 2026-04-07T12:55:00Z
12
value 0.00076
scoring_system epss
scoring_elements 0.22829
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42895
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42895
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2147356
reference_id 2147356
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2147356
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://kernel.dance/#b1a2cd50c0357f243b7435a732b4e62ba3157a2e
reference_id #b1a2cd50c0357f243b7435a732b4e62ba3157a2e
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:36:47Z/
url https://kernel.dance/#b1a2cd50c0357f243b7435a732b4e62ba3157a2e
10
reference_url https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e
reference_id b1a2cd50c0357f243b7435a732b4e62ba3157a2e
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:36:47Z/
url https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e
11
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
12
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
13
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
14
reference_url https://access.redhat.com/errata/RHSA-2024:1877
reference_id RHSA-2024:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1877
15
reference_url https://access.redhat.com/errata/RHSA-2024:2621
reference_id RHSA-2024:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2621
16
reference_url https://usn.ubuntu.com/5780-1/
reference_id USN-5780-1
reference_type
scores
url https://usn.ubuntu.com/5780-1/
17
reference_url https://usn.ubuntu.com/5850-1/
reference_id USN-5850-1
reference_type
scores
url https://usn.ubuntu.com/5850-1/
18
reference_url https://usn.ubuntu.com/5851-1/
reference_id USN-5851-1
reference_type
scores
url https://usn.ubuntu.com/5851-1/
19
reference_url https://usn.ubuntu.com/5853-1/
reference_id USN-5853-1
reference_type
scores
url https://usn.ubuntu.com/5853-1/
20
reference_url https://usn.ubuntu.com/5858-1/
reference_id USN-5858-1
reference_type
scores
url https://usn.ubuntu.com/5858-1/
21
reference_url https://usn.ubuntu.com/5859-1/
reference_id USN-5859-1
reference_type
scores
url https://usn.ubuntu.com/5859-1/
22
reference_url https://usn.ubuntu.com/5860-1/
reference_id USN-5860-1
reference_type
scores
url https://usn.ubuntu.com/5860-1/
23
reference_url https://usn.ubuntu.com/5874-1/
reference_id USN-5874-1
reference_type
scores
url https://usn.ubuntu.com/5874-1/
24
reference_url https://usn.ubuntu.com/5875-1/
reference_id USN-5875-1
reference_type
scores
url https://usn.ubuntu.com/5875-1/
25
reference_url https://usn.ubuntu.com/5876-1/
reference_id USN-5876-1
reference_type
scores
url https://usn.ubuntu.com/5876-1/
26
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
27
reference_url https://usn.ubuntu.com/5878-1/
reference_id USN-5878-1
reference_type
scores
url https://usn.ubuntu.com/5878-1/
28
reference_url https://usn.ubuntu.com/5879-1/
reference_id USN-5879-1
reference_type
scores
url https://usn.ubuntu.com/5879-1/
29
reference_url https://usn.ubuntu.com/5883-1/
reference_id USN-5883-1
reference_type
scores
url https://usn.ubuntu.com/5883-1/
30
reference_url https://usn.ubuntu.com/5884-1/
reference_id USN-5884-1
reference_type
scores
url https://usn.ubuntu.com/5884-1/
31
reference_url https://usn.ubuntu.com/5909-1/
reference_id USN-5909-1
reference_type
scores
url https://usn.ubuntu.com/5909-1/
32
reference_url https://usn.ubuntu.com/5918-1/
reference_id USN-5918-1
reference_type
scores
url https://usn.ubuntu.com/5918-1/
33
reference_url https://usn.ubuntu.com/5919-1/
reference_id USN-5919-1
reference_type
scores
url https://usn.ubuntu.com/5919-1/
34
reference_url https://usn.ubuntu.com/5920-1/
reference_id USN-5920-1
reference_type
scores
url https://usn.ubuntu.com/5920-1/
35
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
36
reference_url https://usn.ubuntu.com/5925-1/
reference_id USN-5925-1
reference_type
scores
url https://usn.ubuntu.com/5925-1/
37
reference_url https://usn.ubuntu.com/5926-1/
reference_id USN-5926-1
reference_type
scores
url https://usn.ubuntu.com/5926-1/
38
reference_url https://usn.ubuntu.com/5927-1/
reference_id USN-5927-1
reference_type
scores
url https://usn.ubuntu.com/5927-1/
39
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
40
reference_url https://usn.ubuntu.com/6007-1/
reference_id USN-6007-1
reference_type
scores
url https://usn.ubuntu.com/6007-1/
fixed_packages
aliases CVE-2022-42895
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j8ze-t6w6-ekak
26
url VCID-jt33-xayh-5ke1
vulnerability_id VCID-jt33-xayh-5ke1
summary kernel: vmwgfx: double free within the handling of vmw_buffer_object objects
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-33952.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-33952.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-33952
reference_id
reference_type
scores
0
value 9e-05
scoring_system epss
scoring_elements 0.00991
published_at 2026-04-26T12:55:00Z
1
value 9e-05
scoring_system epss
scoring_elements 0.00927
published_at 2026-04-16T12:55:00Z
2
value 9e-05
scoring_system epss
scoring_elements 0.00935
published_at 2026-04-18T12:55:00Z
3
value 9e-05
scoring_system epss
scoring_elements 0.00985
published_at 2026-04-21T12:55:00Z
4
value 9e-05
scoring_system epss
scoring_elements 0.00987
published_at 2026-04-24T12:55:00Z
5
value 9e-05
scoring_system epss
scoring_elements 0.00941
published_at 2026-04-04T12:55:00Z
6
value 9e-05
scoring_system epss
scoring_elements 0.00946
published_at 2026-04-07T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.0095
published_at 2026-04-08T12:55:00Z
8
value 9e-05
scoring_system epss
scoring_elements 0.00945
published_at 2026-04-09T12:55:00Z
9
value 9e-05
scoring_system epss
scoring_elements 0.00934
published_at 2026-04-11T12:55:00Z
10
value 9e-05
scoring_system epss
scoring_elements 0.00929
published_at 2026-04-12T12:55:00Z
11
value 9e-05
scoring_system epss
scoring_elements 0.0093
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-33952
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2218212
reference_id 2218212
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2218212
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv
reference_id cpe:/a:redhat:enterprise_linux:8::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime
reference_id cpe:/a:redhat:enterprise_linux:8::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv
reference_id cpe:/a:redhat:enterprise_linux:9::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime
reference_id cpe:/a:redhat:enterprise_linux:9::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb
reference_id cpe:/a:redhat:rhel_eus:8.8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb
reference_id cpe:/a:redhat:rhel_eus:9.2::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv
reference_id cpe:/a:redhat:rhel_eus:9.2::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime
reference_id cpe:/a:redhat:rhel_eus:9.2::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
reference_id cpe:/o:redhat:rhel_eus:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
23
reference_url https://access.redhat.com/security/cve/CVE-2023-33952
reference_id CVE-2023-33952
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/
url https://access.redhat.com/security/cve/CVE-2023-33952
24
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/
url https://access.redhat.com/errata/RHSA-2023:6583
25
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/
url https://access.redhat.com/errata/RHSA-2023:6901
26
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/
url https://access.redhat.com/errata/RHSA-2023:7077
27
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/
url https://access.redhat.com/errata/RHSA-2024:1404
28
reference_url https://access.redhat.com/errata/RHSA-2024:4823
reference_id RHSA-2024:4823
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/
url https://access.redhat.com/errata/RHSA-2024:4823
29
reference_url https://access.redhat.com/errata/RHSA-2024:4831
reference_id RHSA-2024:4831
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/
url https://access.redhat.com/errata/RHSA-2024:4831
30
reference_url https://www.zerodayinitiative.com/advisories/ZDI-CAN-20292
reference_id ZDI-CAN-20292
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:08Z/
url https://www.zerodayinitiative.com/advisories/ZDI-CAN-20292
fixed_packages
aliases CVE-2023-33952
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jt33-xayh-5ke1
27
url VCID-jure-kwde-eufu
vulnerability_id VCID-jure-kwde-eufu
summary kernel: fbcon: shift-out-of-bounds in fbcon_set_font()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3161.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3161.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3161
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.01902
published_at 2026-04-02T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02294
published_at 2026-04-26T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.0224
published_at 2026-04-13T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02221
published_at 2026-04-16T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02231
published_at 2026-04-18T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02324
published_at 2026-04-21T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02302
published_at 2026-04-24T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.01915
published_at 2026-04-07T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.02249
published_at 2026-04-08T12:55:00Z
9
value 0.00013
scoring_system epss
scoring_elements 0.0227
published_at 2026-04-09T12:55:00Z
10
value 0.00013
scoring_system epss
scoring_elements 0.02253
published_at 2026-04-11T12:55:00Z
11
value 0.00013
scoring_system epss
scoring_elements 0.02242
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3161
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3161
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2213485
reference_id 2213485
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:24Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2213485
5
reference_url https://github.com/torvalds/linux/commit/2b09d5d364986f724f17001ccfe4126b9b43a0be
reference_id 2b09d5d364986f724f17001ccfe4126b9b43a0be
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:24Z/
url https://github.com/torvalds/linux/commit/2b09d5d364986f724f17001ccfe4126b9b43a0be
6
reference_url https://access.redhat.com/errata/RHSA-2023:5603
reference_id RHSA-2023:5603
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5603
7
reference_url https://access.redhat.com/errata/RHSA-2023:5604
reference_id RHSA-2023:5604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5604
8
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
9
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
10
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
11
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
12
reference_url https://usn.ubuntu.com/6222-1/
reference_id USN-6222-1
reference_type
scores
url https://usn.ubuntu.com/6222-1/
13
reference_url https://usn.ubuntu.com/6254-1/
reference_id USN-6254-1
reference_type
scores
url https://usn.ubuntu.com/6254-1/
14
reference_url https://usn.ubuntu.com/6256-1/
reference_id USN-6256-1
reference_type
scores
url https://usn.ubuntu.com/6256-1/
fixed_packages
aliases CVE-2023-3161
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jure-kwde-eufu
28
url VCID-ke38-q17b-13hz
vulnerability_id VCID-ke38-q17b-13hz
summary kernel: memory leak in ttusb_dec_exit_dvb() in media/usb/ttusb-dec/ttusb_dec.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45887.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45887.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-45887
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01844
published_at 2026-04-02T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.0162
published_at 2026-04-26T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01862
published_at 2026-04-08T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01876
published_at 2026-04-09T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01863
published_at 2026-04-11T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01847
published_at 2026-04-12T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01843
published_at 2026-04-13T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.01511
published_at 2026-04-16T12:55:00Z
8
value 0.00012
scoring_system epss
scoring_elements 0.01527
published_at 2026-04-18T12:55:00Z
9
value 0.00012
scoring_system epss
scoring_elements 0.01615
published_at 2026-04-21T12:55:00Z
10
value 0.00012
scoring_system epss
scoring_elements 0.01623
published_at 2026-04-24T12:55:00Z
11
value 0.00012
scoring_system epss
scoring_elements 0.01857
published_at 2026-04-04T12:55:00Z
12
value 0.00012
scoring_system epss
scoring_elements 0.01858
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-45887
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45887
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45887
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lore.kernel.org/linux-media/20221115131822.6640-1-imv4bel%40gmail.com/
reference_id 20221115131822.6640-1-imv4bel%40gmail.com
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-25T19:13:39Z/
url https://lore.kernel.org/linux-media/20221115131822.6640-1-imv4bel%40gmail.com/
5
reference_url https://lore.kernel.org/linux-media/20221115131822.6640-5-imv4bel%40gmail.com/
reference_id 20221115131822.6640-5-imv4bel%40gmail.com
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-25T19:13:39Z/
url https://lore.kernel.org/linux-media/20221115131822.6640-5-imv4bel%40gmail.com/
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2148520
reference_id 2148520
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2148520
7
reference_url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=517a281338322ff8293f988771c98aaa7205e457
reference_id ?id=517a281338322ff8293f988771c98aaa7205e457
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-25T19:13:39Z/
url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=517a281338322ff8293f988771c98aaa7205e457
8
reference_url https://security.netapp.com/advisory/ntap-20230113-0006/
reference_id ntap-20230113-0006
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-25T19:13:39Z/
url https://security.netapp.com/advisory/ntap-20230113-0006/
9
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
10
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
11
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
12
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
13
reference_url https://usn.ubuntu.com/6412-1/
reference_id USN-6412-1
reference_type
scores
url https://usn.ubuntu.com/6412-1/
14
reference_url https://usn.ubuntu.com/6466-1/
reference_id USN-6466-1
reference_type
scores
url https://usn.ubuntu.com/6466-1/
fixed_packages
aliases CVE-2022-45887
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ke38-q17b-13hz
29
url VCID-ks9z-m9jz-tybr
vulnerability_id VCID-ks9z-m9jz-tybr
summary kernel: KVM: x86/mmu: race condition in direct_page_fault()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45869.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45869.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-45869
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.049
published_at 2026-04-26T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04826
published_at 2026-04-21T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04861
published_at 2026-04-24T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.05139
published_at 2026-04-02T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.05165
published_at 2026-04-04T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.05185
published_at 2026-04-07T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.05218
published_at 2026-04-08T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.05237
published_at 2026-04-09T12:55:00Z
8
value 0.00019
scoring_system epss
scoring_elements 0.05205
published_at 2026-04-11T12:55:00Z
9
value 0.00019
scoring_system epss
scoring_elements 0.05188
published_at 2026-04-12T12:55:00Z
10
value 0.00019
scoring_system epss
scoring_elements 0.05174
published_at 2026-04-13T12:55:00Z
11
value 0.00019
scoring_system epss
scoring_elements 0.05121
published_at 2026-04-16T12:55:00Z
12
value 0.00019
scoring_system epss
scoring_elements 0.05125
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-45869
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2151317
reference_id 2151317
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2151317
4
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=47b0c2e4c220f2251fd8dcfbb44479819c715e15
reference_id ?id=47b0c2e4c220f2251fd8dcfbb44479819c715e15
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T18:57:15Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=47b0c2e4c220f2251fd8dcfbb44479819c715e15
5
reference_url https://access.redhat.com/errata/RHSA-2023:4377
reference_id RHSA-2023:4377
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4377
6
reference_url https://access.redhat.com/errata/RHSA-2023:4378
reference_id RHSA-2023:4378
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4378
7
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
8
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
9
reference_url https://access.redhat.com/errata/RHSA-2024:1188
reference_id RHSA-2024:1188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1188
10
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
11
reference_url https://usn.ubuntu.com/5911-1/
reference_id USN-5911-1
reference_type
scores
url https://usn.ubuntu.com/5911-1/
12
reference_url https://usn.ubuntu.com/5912-1/
reference_id USN-5912-1
reference_type
scores
url https://usn.ubuntu.com/5912-1/
13
reference_url https://usn.ubuntu.com/5929-1/
reference_id USN-5929-1
reference_type
scores
url https://usn.ubuntu.com/5929-1/
14
reference_url https://usn.ubuntu.com/5935-1/
reference_id USN-5935-1
reference_type
scores
url https://usn.ubuntu.com/5935-1/
15
reference_url https://usn.ubuntu.com/5938-1/
reference_id USN-5938-1
reference_type
scores
url https://usn.ubuntu.com/5938-1/
16
reference_url https://usn.ubuntu.com/5941-1/
reference_id USN-5941-1
reference_type
scores
url https://usn.ubuntu.com/5941-1/
17
reference_url https://usn.ubuntu.com/5950-1/
reference_id USN-5950-1
reference_type
scores
url https://usn.ubuntu.com/5950-1/
18
reference_url https://usn.ubuntu.com/5962-1/
reference_id USN-5962-1
reference_type
scores
url https://usn.ubuntu.com/5962-1/
fixed_packages
aliases CVE-2022-45869
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ks9z-m9jz-tybr
30
url VCID-kz9r-zumw-5ydf
vulnerability_id VCID-kz9r-zumw-5ydf
summary kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3609.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3609.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3609
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.0215
published_at 2026-04-09T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02144
published_at 2026-04-26T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.02153
published_at 2026-04-24T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02112
published_at 2026-04-12T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02137
published_at 2026-04-04T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02133
published_at 2026-04-07T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02132
published_at 2026-04-08T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02127
published_at 2026-04-11T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.02185
published_at 2026-04-21T12:55:00Z
9
value 0.00013
scoring_system epss
scoring_elements 0.02097
published_at 2026-04-18T12:55:00Z
10
value 0.00013
scoring_system epss
scoring_elements 0.02084
published_at 2026-04-16T12:55:00Z
11
value 0.00013
scoring_system epss
scoring_elements 0.02131
published_at 2026-04-02T12:55:00Z
12
value 0.00013
scoring_system epss
scoring_elements 0.02108
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3609
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
33
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
34
reference_url https://kernel.dance/04c55383fa5689357bcdd2c8036725a55ed632bc
reference_id 04c55383fa5689357bcdd2c8036725a55ed632bc
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:26Z/
url https://kernel.dance/04c55383fa5689357bcdd2c8036725a55ed632bc
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2225201
reference_id 2225201
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2225201
36
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=04c55383fa5689357bcdd2c8036725a55ed632bc
reference_id commit?id=04c55383fa5689357bcdd2c8036725a55ed632bc
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:26Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=04c55383fa5689357bcdd2c8036725a55ed632bc
37
reference_url https://www.debian.org/security/2023/dsa-5480
reference_id dsa-5480
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:26Z/
url https://www.debian.org/security/2023/dsa-5480
38
reference_url http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
reference_id Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:26Z/
url http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
39
reference_url http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
reference_id Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:26Z/
url http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
40
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
reference_id msg00004.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:26Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
41
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:26Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
42
reference_url https://security.netapp.com/advisory/ntap-20230818-0005/
reference_id ntap-20230818-0005
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T18:36:26Z/
url https://security.netapp.com/advisory/ntap-20230818-0005/
43
reference_url https://access.redhat.com/errata/RHSA-2023:5574
reference_id RHSA-2023:5574
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5574
44
reference_url https://access.redhat.com/errata/RHSA-2023:5621
reference_id RHSA-2023:5621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5621
45
reference_url https://access.redhat.com/errata/RHSA-2023:5622
reference_id RHSA-2023:5622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5622
46
reference_url https://access.redhat.com/errata/RHSA-2023:5628
reference_id RHSA-2023:5628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5628
47
reference_url https://access.redhat.com/errata/RHSA-2023:5775
reference_id RHSA-2023:5775
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5775
48
reference_url https://access.redhat.com/errata/RHSA-2023:5794
reference_id RHSA-2023:5794
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5794
49
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
50
reference_url https://access.redhat.com/errata/RHSA-2023:6799
reference_id RHSA-2023:6799
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6799
51
reference_url https://access.redhat.com/errata/RHSA-2023:6813
reference_id RHSA-2023:6813
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6813
52
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
53
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
54
reference_url https://access.redhat.com/errata/RHSA-2023:7294
reference_id RHSA-2023:7294
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7294
55
reference_url https://access.redhat.com/errata/RHSA-2023:7370
reference_id RHSA-2023:7370
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7370
56
reference_url https://access.redhat.com/errata/RHSA-2023:7379
reference_id RHSA-2023:7379
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7379
57
reference_url https://access.redhat.com/errata/RHSA-2023:7398
reference_id RHSA-2023:7398
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7398
58
reference_url https://access.redhat.com/errata/RHSA-2023:7410
reference_id RHSA-2023:7410
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7410
59
reference_url https://access.redhat.com/errata/RHSA-2023:7417
reference_id RHSA-2023:7417
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7417
60
reference_url https://access.redhat.com/errata/RHSA-2023:7418
reference_id RHSA-2023:7418
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7418
61
reference_url https://access.redhat.com/errata/RHSA-2023:7431
reference_id RHSA-2023:7431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7431
62
reference_url https://access.redhat.com/errata/RHSA-2023:7434
reference_id RHSA-2023:7434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7434
63
reference_url https://access.redhat.com/errata/RHSA-2023:7539
reference_id RHSA-2023:7539
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7539
64
reference_url https://access.redhat.com/errata/RHSA-2023:7558
reference_id RHSA-2023:7558
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7558
65
reference_url https://access.redhat.com/errata/RHSA-2024:0999
reference_id RHSA-2024:0999
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0999
66
reference_url https://access.redhat.com/errata/RHSA-2024:1250
reference_id RHSA-2024:1250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1250
67
reference_url https://access.redhat.com/errata/RHSA-2024:1253
reference_id RHSA-2024:1253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1253
68
reference_url https://access.redhat.com/errata/RHSA-2024:1306
reference_id RHSA-2024:1306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1306
69
reference_url https://usn.ubuntu.com/6285-1/
reference_id USN-6285-1
reference_type
scores
url https://usn.ubuntu.com/6285-1/
70
reference_url https://usn.ubuntu.com/6315-1/
reference_id USN-6315-1
reference_type
scores
url https://usn.ubuntu.com/6315-1/
71
reference_url https://usn.ubuntu.com/6317-1/
reference_id USN-6317-1
reference_type
scores
url https://usn.ubuntu.com/6317-1/
72
reference_url https://usn.ubuntu.com/6318-1/
reference_id USN-6318-1
reference_type
scores
url https://usn.ubuntu.com/6318-1/
73
reference_url https://usn.ubuntu.com/6321-1/
reference_id USN-6321-1
reference_type
scores
url https://usn.ubuntu.com/6321-1/
74
reference_url https://usn.ubuntu.com/6324-1/
reference_id USN-6324-1
reference_type
scores
url https://usn.ubuntu.com/6324-1/
75
reference_url https://usn.ubuntu.com/6325-1/
reference_id USN-6325-1
reference_type
scores
url https://usn.ubuntu.com/6325-1/
76
reference_url https://usn.ubuntu.com/6328-1/
reference_id USN-6328-1
reference_type
scores
url https://usn.ubuntu.com/6328-1/
77
reference_url https://usn.ubuntu.com/6329-1/
reference_id USN-6329-1
reference_type
scores
url https://usn.ubuntu.com/6329-1/
78
reference_url https://usn.ubuntu.com/6330-1/
reference_id USN-6330-1
reference_type
scores
url https://usn.ubuntu.com/6330-1/
79
reference_url https://usn.ubuntu.com/6331-1/
reference_id USN-6331-1
reference_type
scores
url https://usn.ubuntu.com/6331-1/
80
reference_url https://usn.ubuntu.com/6332-1/
reference_id USN-6332-1
reference_type
scores
url https://usn.ubuntu.com/6332-1/
81
reference_url https://usn.ubuntu.com/6346-1/
reference_id USN-6346-1
reference_type
scores
url https://usn.ubuntu.com/6346-1/
82
reference_url https://usn.ubuntu.com/6348-1/
reference_id USN-6348-1
reference_type
scores
url https://usn.ubuntu.com/6348-1/
83
reference_url https://usn.ubuntu.com/6357-1/
reference_id USN-6357-1
reference_type
scores
url https://usn.ubuntu.com/6357-1/
84
reference_url https://usn.ubuntu.com/6385-1/
reference_id USN-6385-1
reference_type
scores
url https://usn.ubuntu.com/6385-1/
85
reference_url https://usn.ubuntu.com/6397-1/
reference_id USN-6397-1
reference_type
scores
url https://usn.ubuntu.com/6397-1/
fixed_packages
aliases CVE-2023-3609
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kz9r-zumw-5ydf
31
url VCID-n89e-y6eu-4ucf
vulnerability_id VCID-n89e-y6eu-4ucf
summary kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4128.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4128.json
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2261965
reference_id 2261965
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2261965
3
reference_url https://access.redhat.com/errata/RHSA-2023:5235
reference_id RHSA-2023:5235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5235
4
reference_url https://access.redhat.com/errata/RHSA-2023:5238
reference_id RHSA-2023:5238
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5238
5
reference_url https://access.redhat.com/errata/RHSA-2023:5548
reference_id RHSA-2023:5548
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5548
6
reference_url https://access.redhat.com/errata/RHSA-2023:5575
reference_id RHSA-2023:5575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5575
7
reference_url https://access.redhat.com/errata/RHSA-2023:5580
reference_id RHSA-2023:5580
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5580
8
reference_url https://access.redhat.com/errata/RHSA-2023:5588
reference_id RHSA-2023:5588
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5588
9
reference_url https://access.redhat.com/errata/RHSA-2023:5589
reference_id RHSA-2023:5589
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5589
10
reference_url https://access.redhat.com/errata/RHSA-2023:5603
reference_id RHSA-2023:5603
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5603
11
reference_url https://access.redhat.com/errata/RHSA-2023:5604
reference_id RHSA-2023:5604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5604
12
reference_url https://access.redhat.com/errata/RHSA-2023:5627
reference_id RHSA-2023:5627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5627
13
reference_url https://access.redhat.com/errata/RHSA-2023:5628
reference_id RHSA-2023:5628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5628
14
reference_url https://access.redhat.com/errata/RHSA-2023:5775
reference_id RHSA-2023:5775
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5775
15
reference_url https://access.redhat.com/errata/RHSA-2023:5794
reference_id RHSA-2023:5794
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5794
16
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
17
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
18
reference_url https://access.redhat.com/errata/RHSA-2023:7370
reference_id RHSA-2023:7370
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7370
19
reference_url https://access.redhat.com/errata/RHSA-2023:7379
reference_id RHSA-2023:7379
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7379
20
reference_url https://access.redhat.com/errata/RHSA-2023:7418
reference_id RHSA-2023:7418
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7418
21
reference_url https://access.redhat.com/errata/RHSA-2023:7419
reference_id RHSA-2023:7419
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7419
22
reference_url https://access.redhat.com/errata/RHSA-2023:7423
reference_id RHSA-2023:7423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7423
23
reference_url https://access.redhat.com/errata/RHSA-2023:7424
reference_id RHSA-2023:7424
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7424
24
reference_url https://access.redhat.com/errata/RHSA-2023:7539
reference_id RHSA-2023:7539
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7539
25
reference_url https://access.redhat.com/errata/RHSA-2023:7558
reference_id RHSA-2023:7558
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7558
26
reference_url https://access.redhat.com/errata/RHSA-2024:0261
reference_id RHSA-2024:0261
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0261
27
reference_url https://access.redhat.com/errata/RHSA-2024:0262
reference_id RHSA-2024:0262
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0262
28
reference_url https://usn.ubuntu.com/6343-1/
reference_id USN-6343-1
reference_type
scores
url https://usn.ubuntu.com/6343-1/
29
reference_url https://usn.ubuntu.com/6383-1/
reference_id USN-6383-1
reference_type
scores
url https://usn.ubuntu.com/6383-1/
30
reference_url https://usn.ubuntu.com/6385-1/
reference_id USN-6385-1
reference_type
scores
url https://usn.ubuntu.com/6385-1/
31
reference_url https://usn.ubuntu.com/6386-1/
reference_id USN-6386-1
reference_type
scores
url https://usn.ubuntu.com/6386-1/
32
reference_url https://usn.ubuntu.com/6386-2/
reference_id USN-6386-2
reference_type
scores
url https://usn.ubuntu.com/6386-2/
33
reference_url https://usn.ubuntu.com/6386-3/
reference_id USN-6386-3
reference_type
scores
url https://usn.ubuntu.com/6386-3/
34
reference_url https://usn.ubuntu.com/6387-1/
reference_id USN-6387-1
reference_type
scores
url https://usn.ubuntu.com/6387-1/
35
reference_url https://usn.ubuntu.com/6387-2/
reference_id USN-6387-2
reference_type
scores
url https://usn.ubuntu.com/6387-2/
36
reference_url https://usn.ubuntu.com/6388-1/
reference_id USN-6388-1
reference_type
scores
url https://usn.ubuntu.com/6388-1/
37
reference_url https://usn.ubuntu.com/6396-1/
reference_id USN-6396-1
reference_type
scores
url https://usn.ubuntu.com/6396-1/
38
reference_url https://usn.ubuntu.com/6396-2/
reference_id USN-6396-2
reference_type
scores
url https://usn.ubuntu.com/6396-2/
39
reference_url https://usn.ubuntu.com/6396-3/
reference_id USN-6396-3
reference_type
scores
url https://usn.ubuntu.com/6396-3/
40
reference_url https://usn.ubuntu.com/6466-1/
reference_id USN-6466-1
reference_type
scores
url https://usn.ubuntu.com/6466-1/
fixed_packages
aliases CVE-2023-4128
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n89e-y6eu-4ucf
32
url VCID-netb-fxrv-zyft
vulnerability_id VCID-netb-fxrv-zyft
summary kernel: xfrm: NULL pointer dereference in xfrm_update_ae_params()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3772.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3772.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3772
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01457
published_at 2026-04-02T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.0146
published_at 2026-04-04T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01467
published_at 2026-04-11T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01472
published_at 2026-04-08T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01474
published_at 2026-04-09T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01461
published_at 2026-04-12T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01462
published_at 2026-04-13T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.0145
published_at 2026-04-16T12:55:00Z
8
value 0.00012
scoring_system epss
scoring_elements 0.01465
published_at 2026-04-18T12:55:00Z
9
value 0.00012
scoring_system epss
scoring_elements 0.01669
published_at 2026-04-21T12:55:00Z
10
value 0.00012
scoring_system epss
scoring_elements 0.0168
published_at 2026-04-24T12:55:00Z
11
value 0.00012
scoring_system epss
scoring_elements 0.01676
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3772
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3772
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2218943
reference_id 2218943
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2218943
5
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
6
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
7
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
8
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
9
reference_url https://access.redhat.com/errata/RHSA-2024:0575
reference_id RHSA-2024:0575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0575
10
reference_url https://usn.ubuntu.com/6415-1/
reference_id USN-6415-1
reference_type
scores
url https://usn.ubuntu.com/6415-1/
11
reference_url https://usn.ubuntu.com/6439-1/
reference_id USN-6439-1
reference_type
scores
url https://usn.ubuntu.com/6439-1/
12
reference_url https://usn.ubuntu.com/6439-2/
reference_id USN-6439-2
reference_type
scores
url https://usn.ubuntu.com/6439-2/
13
reference_url https://usn.ubuntu.com/6440-1/
reference_id USN-6440-1
reference_type
scores
url https://usn.ubuntu.com/6440-1/
14
reference_url https://usn.ubuntu.com/6440-2/
reference_id USN-6440-2
reference_type
scores
url https://usn.ubuntu.com/6440-2/
15
reference_url https://usn.ubuntu.com/6440-3/
reference_id USN-6440-3
reference_type
scores
url https://usn.ubuntu.com/6440-3/
16
reference_url https://usn.ubuntu.com/6462-1/
reference_id USN-6462-1
reference_type
scores
url https://usn.ubuntu.com/6462-1/
17
reference_url https://usn.ubuntu.com/6462-2/
reference_id USN-6462-2
reference_type
scores
url https://usn.ubuntu.com/6462-2/
18
reference_url https://usn.ubuntu.com/6464-1/
reference_id USN-6464-1
reference_type
scores
url https://usn.ubuntu.com/6464-1/
19
reference_url https://usn.ubuntu.com/6465-1/
reference_id USN-6465-1
reference_type
scores
url https://usn.ubuntu.com/6465-1/
20
reference_url https://usn.ubuntu.com/6465-2/
reference_id USN-6465-2
reference_type
scores
url https://usn.ubuntu.com/6465-2/
21
reference_url https://usn.ubuntu.com/6465-3/
reference_id USN-6465-3
reference_type
scores
url https://usn.ubuntu.com/6465-3/
22
reference_url https://usn.ubuntu.com/6466-1/
reference_id USN-6466-1
reference_type
scores
url https://usn.ubuntu.com/6466-1/
23
reference_url https://usn.ubuntu.com/6516-1/
reference_id USN-6516-1
reference_type
scores
url https://usn.ubuntu.com/6516-1/
24
reference_url https://usn.ubuntu.com/6520-1/
reference_id USN-6520-1
reference_type
scores
url https://usn.ubuntu.com/6520-1/
fixed_packages
aliases CVE-2023-3772
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-netb-fxrv-zyft
33
url VCID-pyu4-rsap-2fhx
vulnerability_id VCID-pyu4-rsap-2fhx
summary kernel: out-of-bounds access in relay_file_read
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3268.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3268.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3268
reference_id
reference_type
scores
0
value 7e-05
scoring_system epss
scoring_elements 0.00622
published_at 2026-04-02T12:55:00Z
1
value 7e-05
scoring_system epss
scoring_elements 0.00615
published_at 2026-04-04T12:55:00Z
2
value 7e-05
scoring_system epss
scoring_elements 0.0061
published_at 2026-04-09T12:55:00Z
3
value 7e-05
scoring_system epss
scoring_elements 0.00616
published_at 2026-04-08T12:55:00Z
4
value 7e-05
scoring_system epss
scoring_elements 0.00618
published_at 2026-04-07T12:55:00Z
5
value 7e-05
scoring_system epss
scoring_elements 0.00609
published_at 2026-04-11T12:55:00Z
6
value 8e-05
scoring_system epss
scoring_elements 0.00732
published_at 2026-04-26T12:55:00Z
7
value 8e-05
scoring_system epss
scoring_elements 0.00689
published_at 2026-04-18T12:55:00Z
8
value 8e-05
scoring_system epss
scoring_elements 0.00688
published_at 2026-04-13T12:55:00Z
9
value 8e-05
scoring_system epss
scoring_elements 0.00682
published_at 2026-04-16T12:55:00Z
10
value 8e-05
scoring_system epss
scoring_elements 0.0073
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3268
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
33
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2215502
reference_id 2215502
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2215502
35
reference_url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2
reference_id ChangeLog-6.3.2
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:22Z/
url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2
36
reference_url https://www.debian.org/security/2023/dsa-5448
reference_id dsa-5448
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:22Z/
url https://www.debian.org/security/2023/dsa-5448
37
reference_url https://www.debian.org/security/2023/dsa-5480
reference_id dsa-5480
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:22Z/
url https://www.debian.org/security/2023/dsa-5480
38
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=43ec16f1450f4936025a9bdf1a273affdb9732c1
reference_id ?id=43ec16f1450f4936025a9bdf1a273affdb9732c1
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:22Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=43ec16f1450f4936025a9bdf1a273affdb9732c1
39
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:22Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
40
reference_url https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
reference_id msg00030.html
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:22Z/
url https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
41
reference_url https://security.netapp.com/advisory/ntap-20230824-0006/
reference_id ntap-20230824-0006
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:22Z/
url https://security.netapp.com/advisory/ntap-20230824-0006/
42
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
43
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
44
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
45
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
46
reference_url https://access.redhat.com/errata/RHSA-2024:1250
reference_id RHSA-2024:1250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1250
47
reference_url https://access.redhat.com/errata/RHSA-2024:1306
reference_id RHSA-2024:1306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1306
48
reference_url https://lore.kernel.org/lkml/1682238502-1892-1-git-send-email-yangpc%40wangsu.com/T/
reference_id T
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:22Z/
url https://lore.kernel.org/lkml/1682238502-1892-1-git-send-email-yangpc%40wangsu.com/T/
49
reference_url https://usn.ubuntu.com/6252-1/
reference_id USN-6252-1
reference_type
scores
url https://usn.ubuntu.com/6252-1/
50
reference_url https://usn.ubuntu.com/6254-1/
reference_id USN-6254-1
reference_type
scores
url https://usn.ubuntu.com/6254-1/
51
reference_url https://usn.ubuntu.com/6283-1/
reference_id USN-6283-1
reference_type
scores
url https://usn.ubuntu.com/6283-1/
52
reference_url https://usn.ubuntu.com/6300-1/
reference_id USN-6300-1
reference_type
scores
url https://usn.ubuntu.com/6300-1/
53
reference_url https://usn.ubuntu.com/6311-1/
reference_id USN-6311-1
reference_type
scores
url https://usn.ubuntu.com/6311-1/
54
reference_url https://usn.ubuntu.com/6332-1/
reference_id USN-6332-1
reference_type
scores
url https://usn.ubuntu.com/6332-1/
55
reference_url https://usn.ubuntu.com/6340-1/
reference_id USN-6340-1
reference_type
scores
url https://usn.ubuntu.com/6340-1/
56
reference_url https://usn.ubuntu.com/6340-2/
reference_id USN-6340-2
reference_type
scores
url https://usn.ubuntu.com/6340-2/
57
reference_url https://usn.ubuntu.com/6347-1/
reference_id USN-6347-1
reference_type
scores
url https://usn.ubuntu.com/6347-1/
58
reference_url https://usn.ubuntu.com/6349-1/
reference_id USN-6349-1
reference_type
scores
url https://usn.ubuntu.com/6349-1/
59
reference_url https://usn.ubuntu.com/6357-1/
reference_id USN-6357-1
reference_type
scores
url https://usn.ubuntu.com/6357-1/
60
reference_url https://usn.ubuntu.com/6397-1/
reference_id USN-6397-1
reference_type
scores
url https://usn.ubuntu.com/6397-1/
fixed_packages
aliases CVE-2023-3268
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pyu4-rsap-2fhx
34
url VCID-qe58-bb5y-u7ax
vulnerability_id VCID-qe58-bb5y-u7ax
summary kernel: Spectre v2 SMT mitigations problem
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1998.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1998.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1998
reference_id
reference_type
scores
0
value 0.00047
scoring_system epss
scoring_elements 0.14487
published_at 2026-04-18T12:55:00Z
1
value 0.00047
scoring_system epss
scoring_elements 0.14543
published_at 2026-04-16T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.16263
published_at 2026-04-12T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.16303
published_at 2026-04-11T12:55:00Z
4
value 0.00052
scoring_system epss
scoring_elements 0.16321
published_at 2026-04-09T12:55:00Z
5
value 0.00052
scoring_system epss
scoring_elements 0.16257
published_at 2026-04-08T12:55:00Z
6
value 0.00052
scoring_system epss
scoring_elements 0.16372
published_at 2026-04-04T12:55:00Z
7
value 0.00052
scoring_system epss
scoring_elements 0.16171
published_at 2026-04-07T12:55:00Z
8
value 0.00052
scoring_system epss
scoring_elements 0.16311
published_at 2026-04-02T12:55:00Z
9
value 0.00052
scoring_system epss
scoring_elements 0.16195
published_at 2026-04-13T12:55:00Z
10
value 0.00075
scoring_system epss
scoring_elements 0.22352
published_at 2026-04-26T12:55:00Z
11
value 0.00075
scoring_system epss
scoring_elements 0.22515
published_at 2026-04-21T12:55:00Z
12
value 0.00075
scoring_system epss
scoring_elements 0.22361
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1998
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1998
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1998
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2187257
reference_id 2187257
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2187257
5
reference_url https://kernel.dance/#6921ed9049bc7457f66c1596c5b78aec0dae4a9d
reference_id #6921ed9049bc7457f66c1596c5b78aec0dae4a9d
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T20:32:12Z/
url https://kernel.dance/#6921ed9049bc7457f66c1596c5b78aec0dae4a9d
6
reference_url https://github.com/torvalds/linux/commit/6921ed9049bc7457f66c1596c5b78aec0dae4a9d
reference_id 6921ed9049bc7457f66c1596c5b78aec0dae4a9d
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T20:32:12Z/
url https://github.com/torvalds/linux/commit/6921ed9049bc7457f66c1596c5b78aec0dae4a9d
7
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/51384.txt
reference_id CVE-2023-1998
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/51384.txt
8
reference_url https://github.com/google/security-research/security/advisories/GHSA-mj4w-6495-6crx
reference_id GHSA-mj4w-6495-6crx
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T20:32:12Z/
url https://github.com/google/security-research/security/advisories/GHSA-mj4w-6495-6crx
9
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T20:32:12Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
10
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T20:32:12Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
11
reference_url https://access.redhat.com/errata/RHSA-2023:4377
reference_id RHSA-2023:4377
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4377
12
reference_url https://access.redhat.com/errata/RHSA-2023:4378
reference_id RHSA-2023:4378
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4378
13
reference_url https://access.redhat.com/errata/RHSA-2023:5603
reference_id RHSA-2023:5603
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5603
14
reference_url https://access.redhat.com/errata/RHSA-2023:5604
reference_id RHSA-2023:5604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5604
15
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
16
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
17
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
18
reference_url https://access.redhat.com/errata/RHSA-2024:3810
reference_id RHSA-2024:3810
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3810
19
reference_url https://usn.ubuntu.com/6033-1/
reference_id USN-6033-1
reference_type
scores
url https://usn.ubuntu.com/6033-1/
20
reference_url https://usn.ubuntu.com/6171-1/
reference_id USN-6171-1
reference_type
scores
url https://usn.ubuntu.com/6171-1/
21
reference_url https://usn.ubuntu.com/6172-1/
reference_id USN-6172-1
reference_type
scores
url https://usn.ubuntu.com/6172-1/
22
reference_url https://usn.ubuntu.com/6185-1/
reference_id USN-6185-1
reference_type
scores
url https://usn.ubuntu.com/6185-1/
23
reference_url https://usn.ubuntu.com/6187-1/
reference_id USN-6187-1
reference_type
scores
url https://usn.ubuntu.com/6187-1/
24
reference_url https://usn.ubuntu.com/6207-1/
reference_id USN-6207-1
reference_type
scores
url https://usn.ubuntu.com/6207-1/
25
reference_url https://usn.ubuntu.com/6222-1/
reference_id USN-6222-1
reference_type
scores
url https://usn.ubuntu.com/6222-1/
26
reference_url https://usn.ubuntu.com/6223-1/
reference_id USN-6223-1
reference_type
scores
url https://usn.ubuntu.com/6223-1/
27
reference_url https://usn.ubuntu.com/6256-1/
reference_id USN-6256-1
reference_type
scores
url https://usn.ubuntu.com/6256-1/
28
reference_url https://usn.ubuntu.com/6739-1/
reference_id USN-6739-1
reference_type
scores
url https://usn.ubuntu.com/6739-1/
29
reference_url https://usn.ubuntu.com/6740-1/
reference_id USN-6740-1
reference_type
scores
url https://usn.ubuntu.com/6740-1/
fixed_packages
aliases CVE-2023-1998
risk_score 10.0
exploitability 2.0
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qe58-bb5y-u7ax
35
url VCID-qx5q-yc33-huhs
vulnerability_id VCID-qx5q-yc33-huhs
summary Kernel: denial of service in atm_tc_enqueue in net/sched/sch_atm.c due to type confusion
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23455.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23455.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-23455
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07288
published_at 2026-04-26T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.07321
published_at 2026-04-21T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.0728
published_at 2026-04-24T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.0836
published_at 2026-04-07T12:55:00Z
4
value 0.00029
scoring_system epss
scoring_elements 0.08385
published_at 2026-04-02T12:55:00Z
5
value 0.00029
scoring_system epss
scoring_elements 0.08282
published_at 2026-04-18T12:55:00Z
6
value 0.00029
scoring_system epss
scoring_elements 0.08298
published_at 2026-04-16T12:55:00Z
7
value 0.00029
scoring_system epss
scoring_elements 0.08405
published_at 2026-04-13T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08421
published_at 2026-04-12T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.0844
published_at 2026-04-11T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08447
published_at 2026-04-09T12:55:00Z
11
value 0.00029
scoring_system epss
scoring_elements 0.08437
published_at 2026-04-04T12:55:00Z
12
value 0.00029
scoring_system epss
scoring_elements 0.0843
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-23455
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://www.openwall.com/lists/oss-security/2023/01/10/1
reference_id 1
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:31Z/
url https://www.openwall.com/lists/oss-security/2023/01/10/1
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2168332
reference_id 2168332
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2168332
18
reference_url https://www.openwall.com/lists/oss-security/2023/01/10/4
reference_id 4
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:31Z/
url https://www.openwall.com/lists/oss-security/2023/01/10/4
19
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
20
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
21
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
22
reference_url https://www.debian.org/security/2023/dsa-5324
reference_id dsa-5324
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:31Z/
url https://www.debian.org/security/2023/dsa-5324
23
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2965c7be0522eaa18808684b7b82b248515511b
reference_id ?id=a2965c7be0522eaa18808684b7b82b248515511b
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:31Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2965c7be0522eaa18808684b7b82b248515511b
24
reference_url https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
reference_id msg00000.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:31Z/
url https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
25
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:31Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
26
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
27
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
28
reference_url https://access.redhat.com/errata/RHSA-2024:0575
reference_id RHSA-2024:0575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0575
29
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
30
reference_url https://usn.ubuntu.com/5915-1/
reference_id USN-5915-1
reference_type
scores
url https://usn.ubuntu.com/5915-1/
31
reference_url https://usn.ubuntu.com/5917-1/
reference_id USN-5917-1
reference_type
scores
url https://usn.ubuntu.com/5917-1/
32
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
33
reference_url https://usn.ubuntu.com/5927-1/
reference_id USN-5927-1
reference_type
scores
url https://usn.ubuntu.com/5927-1/
34
reference_url https://usn.ubuntu.com/5934-1/
reference_id USN-5934-1
reference_type
scores
url https://usn.ubuntu.com/5934-1/
35
reference_url https://usn.ubuntu.com/5939-1/
reference_id USN-5939-1
reference_type
scores
url https://usn.ubuntu.com/5939-1/
36
reference_url https://usn.ubuntu.com/5940-1/
reference_id USN-5940-1
reference_type
scores
url https://usn.ubuntu.com/5940-1/
37
reference_url https://usn.ubuntu.com/5951-1/
reference_id USN-5951-1
reference_type
scores
url https://usn.ubuntu.com/5951-1/
38
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
39
reference_url https://usn.ubuntu.com/5981-1/
reference_id USN-5981-1
reference_type
scores
url https://usn.ubuntu.com/5981-1/
40
reference_url https://usn.ubuntu.com/5982-1/
reference_id USN-5982-1
reference_type
scores
url https://usn.ubuntu.com/5982-1/
41
reference_url https://usn.ubuntu.com/5984-1/
reference_id USN-5984-1
reference_type
scores
url https://usn.ubuntu.com/5984-1/
42
reference_url https://usn.ubuntu.com/5987-1/
reference_id USN-5987-1
reference_type
scores
url https://usn.ubuntu.com/5987-1/
43
reference_url https://usn.ubuntu.com/5991-1/
reference_id USN-5991-1
reference_type
scores
url https://usn.ubuntu.com/5991-1/
44
reference_url https://usn.ubuntu.com/6000-1/
reference_id USN-6000-1
reference_type
scores
url https://usn.ubuntu.com/6000-1/
45
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
46
reference_url https://usn.ubuntu.com/6004-1/
reference_id USN-6004-1
reference_type
scores
url https://usn.ubuntu.com/6004-1/
47
reference_url https://usn.ubuntu.com/6009-1/
reference_id USN-6009-1
reference_type
scores
url https://usn.ubuntu.com/6009-1/
48
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
49
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
50
reference_url https://usn.ubuntu.com/6030-1/
reference_id USN-6030-1
reference_type
scores
url https://usn.ubuntu.com/6030-1/
51
reference_url https://usn.ubuntu.com/6071-1/
reference_id USN-6071-1
reference_type
scores
url https://usn.ubuntu.com/6071-1/
52
reference_url https://usn.ubuntu.com/6072-1/
reference_id USN-6072-1
reference_type
scores
url https://usn.ubuntu.com/6072-1/
53
reference_url https://usn.ubuntu.com/6079-1/
reference_id USN-6079-1
reference_type
scores
url https://usn.ubuntu.com/6079-1/
54
reference_url https://usn.ubuntu.com/6091-1/
reference_id USN-6091-1
reference_type
scores
url https://usn.ubuntu.com/6091-1/
55
reference_url https://usn.ubuntu.com/6096-1/
reference_id USN-6096-1
reference_type
scores
url https://usn.ubuntu.com/6096-1/
fixed_packages
aliases CVE-2023-23455
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qx5q-yc33-huhs
36
url VCID-r51v-h1rb-qqdr
vulnerability_id VCID-r51v-h1rb-qqdr
summary kernel: net: qcom/emac: race condition leading to use-after-free in emac_remove()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-33203.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-33203.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-33203
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04435
published_at 2026-04-02T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.0467
published_at 2026-04-26T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04523
published_at 2026-04-09T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04512
published_at 2026-04-11T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04497
published_at 2026-04-12T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.0448
published_at 2026-04-13T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04449
published_at 2026-04-16T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04458
published_at 2026-04-18T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04595
published_at 2026-04-21T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.04636
published_at 2026-04-24T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04461
published_at 2026-04-04T12:55:00Z
11
value 0.00018
scoring_system epss
scoring_elements 0.04473
published_at 2026-04-07T12:55:00Z
12
value 0.00018
scoring_system epss
scoring_elements 0.04507
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-33203
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33203
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2192667
reference_id 2192667
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:17Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2192667
4
reference_url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.9
reference_id ChangeLog-6.2.9
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:17Z/
url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.9
5
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75
reference_id ?id=6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:17Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75
6
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
7
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
8
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
9
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
10
reference_url https://access.redhat.com/errata/RHSA-2024:0575
reference_id RHSA-2024:0575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0575
11
reference_url https://bugzilla.suse.com/show_bug.cgi?id=1210685
reference_id show_bug.cgi?id=1210685
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:17Z/
url https://bugzilla.suse.com/show_bug.cgi?id=1210685
12
reference_url https://usn.ubuntu.com/6175-1/
reference_id USN-6175-1
reference_type
scores
url https://usn.ubuntu.com/6175-1/
13
reference_url https://usn.ubuntu.com/6186-1/
reference_id USN-6186-1
reference_type
scores
url https://usn.ubuntu.com/6186-1/
14
reference_url https://usn.ubuntu.com/6284-1/
reference_id USN-6284-1
reference_type
scores
url https://usn.ubuntu.com/6284-1/
15
reference_url https://usn.ubuntu.com/6300-1/
reference_id USN-6300-1
reference_type
scores
url https://usn.ubuntu.com/6300-1/
16
reference_url https://usn.ubuntu.com/6301-1/
reference_id USN-6301-1
reference_type
scores
url https://usn.ubuntu.com/6301-1/
17
reference_url https://usn.ubuntu.com/6311-1/
reference_id USN-6311-1
reference_type
scores
url https://usn.ubuntu.com/6311-1/
18
reference_url https://usn.ubuntu.com/6312-1/
reference_id USN-6312-1
reference_type
scores
url https://usn.ubuntu.com/6312-1/
19
reference_url https://usn.ubuntu.com/6314-1/
reference_id USN-6314-1
reference_type
scores
url https://usn.ubuntu.com/6314-1/
20
reference_url https://usn.ubuntu.com/6331-1/
reference_id USN-6331-1
reference_type
scores
url https://usn.ubuntu.com/6331-1/
21
reference_url https://usn.ubuntu.com/6332-1/
reference_id USN-6332-1
reference_type
scores
url https://usn.ubuntu.com/6332-1/
22
reference_url https://usn.ubuntu.com/6337-1/
reference_id USN-6337-1
reference_type
scores
url https://usn.ubuntu.com/6337-1/
23
reference_url https://usn.ubuntu.com/6347-1/
reference_id USN-6347-1
reference_type
scores
url https://usn.ubuntu.com/6347-1/
fixed_packages
aliases CVE-2023-33203
risk_score 2.9
exploitability 0.5
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r51v-h1rb-qqdr
37
url VCID-renx-7s4p-puaa
vulnerability_id VCID-renx-7s4p-puaa
summary kernel: Use after free bug in r592_remove
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3141.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3141.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3141
reference_id
reference_type
scores
0
value 8e-05
scoring_system epss
scoring_elements 0.00718
published_at 2026-04-02T12:55:00Z
1
value 8e-05
scoring_system epss
scoring_elements 0.00829
published_at 2026-04-26T12:55:00Z
2
value 8e-05
scoring_system epss
scoring_elements 0.00715
published_at 2026-04-04T12:55:00Z
3
value 8e-05
scoring_system epss
scoring_elements 0.00792
published_at 2026-04-07T12:55:00Z
4
value 8e-05
scoring_system epss
scoring_elements 0.00791
published_at 2026-04-08T12:55:00Z
5
value 8e-05
scoring_system epss
scoring_elements 0.00787
published_at 2026-04-09T12:55:00Z
6
value 8e-05
scoring_system epss
scoring_elements 0.00781
published_at 2026-04-18T12:55:00Z
7
value 8e-05
scoring_system epss
scoring_elements 0.00775
published_at 2026-04-12T12:55:00Z
8
value 8e-05
scoring_system epss
scoring_elements 0.00777
published_at 2026-04-16T12:55:00Z
9
value 8e-05
scoring_system epss
scoring_elements 0.00825
published_at 2026-04-21T12:55:00Z
10
value 8e-05
scoring_system epss
scoring_elements 0.00828
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3141
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3141
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3141
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2213199
reference_id 2213199
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2213199
5
reference_url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.4
reference_id ChangeLog-6.3.4
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:27Z/
url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.4
6
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=63264422785021704c39b38f65a78ab9e4a186d7
reference_id ?id=63264422785021704c39b38f65a78ab9e4a186d7
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:27Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=63264422785021704c39b38f65a78ab9e4a186d7
7
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:27Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
8
reference_url https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
reference_id msg00030.html
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:27Z/
url https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
9
reference_url https://security.netapp.com/advisory/ntap-20230706-0004/
reference_id ntap-20230706-0004
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:27Z/
url https://security.netapp.com/advisory/ntap-20230706-0004/
10
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
11
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
12
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
13
reference_url https://access.redhat.com/errata/RHSA-2024:0575
reference_id RHSA-2024:0575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0575
14
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
15
reference_url https://lore.kernel.org/lkml/CAPDyKFoV9aZObZ5GBm0U_-UVeVkBN_rAG-kH3BKoP4EXdYM4bw%40mail.gmail.com/t/
reference_id t
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:27Z/
url https://lore.kernel.org/lkml/CAPDyKFoV9aZObZ5GBm0U_-UVeVkBN_rAG-kH3BKoP4EXdYM4bw%40mail.gmail.com/t/
16
reference_url https://usn.ubuntu.com/6231-1/
reference_id USN-6231-1
reference_type
scores
url https://usn.ubuntu.com/6231-1/
17
reference_url https://usn.ubuntu.com/6252-1/
reference_id USN-6252-1
reference_type
scores
url https://usn.ubuntu.com/6252-1/
18
reference_url https://usn.ubuntu.com/6254-1/
reference_id USN-6254-1
reference_type
scores
url https://usn.ubuntu.com/6254-1/
19
reference_url https://usn.ubuntu.com/6260-1/
reference_id USN-6260-1
reference_type
scores
url https://usn.ubuntu.com/6260-1/
20
reference_url https://usn.ubuntu.com/6283-1/
reference_id USN-6283-1
reference_type
scores
url https://usn.ubuntu.com/6283-1/
21
reference_url https://usn.ubuntu.com/6284-1/
reference_id USN-6284-1
reference_type
scores
url https://usn.ubuntu.com/6284-1/
22
reference_url https://usn.ubuntu.com/6300-1/
reference_id USN-6300-1
reference_type
scores
url https://usn.ubuntu.com/6300-1/
23
reference_url https://usn.ubuntu.com/6301-1/
reference_id USN-6301-1
reference_type
scores
url https://usn.ubuntu.com/6301-1/
24
reference_url https://usn.ubuntu.com/6311-1/
reference_id USN-6311-1
reference_type
scores
url https://usn.ubuntu.com/6311-1/
25
reference_url https://usn.ubuntu.com/6312-1/
reference_id USN-6312-1
reference_type
scores
url https://usn.ubuntu.com/6312-1/
26
reference_url https://usn.ubuntu.com/6314-1/
reference_id USN-6314-1
reference_type
scores
url https://usn.ubuntu.com/6314-1/
27
reference_url https://usn.ubuntu.com/6331-1/
reference_id USN-6331-1
reference_type
scores
url https://usn.ubuntu.com/6331-1/
28
reference_url https://usn.ubuntu.com/6332-1/
reference_id USN-6332-1
reference_type
scores
url https://usn.ubuntu.com/6332-1/
29
reference_url https://usn.ubuntu.com/6337-1/
reference_id USN-6337-1
reference_type
scores
url https://usn.ubuntu.com/6337-1/
30
reference_url https://usn.ubuntu.com/6347-1/
reference_id USN-6347-1
reference_type
scores
url https://usn.ubuntu.com/6347-1/
31
reference_url https://usn.ubuntu.com/6385-1/
reference_id USN-6385-1
reference_type
scores
url https://usn.ubuntu.com/6385-1/
fixed_packages
aliases CVE-2023-3141
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-renx-7s4p-puaa
38
url VCID-ryhg-z4qf-kyd6
vulnerability_id VCID-ryhg-z4qf-kyd6
summary kernel: hid: Use After Free in asus_remove()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1079.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1079.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1079
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04248
published_at 2026-04-02T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04281
published_at 2026-04-07T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04269
published_at 2026-04-04T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.04312
published_at 2026-04-08T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.04328
published_at 2026-04-09T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.0432
published_at 2026-04-11T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.04306
published_at 2026-04-12T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.04285
published_at 2026-04-13T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05607
published_at 2026-04-26T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.0537
published_at 2026-04-16T12:55:00Z
10
value 0.0002
scoring_system epss
scoring_elements 0.05373
published_at 2026-04-18T12:55:00Z
11
value 0.0002
scoring_system epss
scoring_elements 0.05537
published_at 2026-04-21T12:55:00Z
12
value 0.0002
scoring_system epss
scoring_elements 0.05571
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1079
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1079
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2173444
reference_id 2173444
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2173444
5
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=4ab3a086d10eeec1424f2e8a968827a6336203df
reference_id ?id=4ab3a086d10eeec1424f2e8a968827a6336203df
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-19T21:35:53Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=4ab3a086d10eeec1424f2e8a968827a6336203df
6
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-19T21:35:53Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
7
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-19T21:35:53Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
8
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
9
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
10
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
11
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
12
reference_url https://access.redhat.com/errata/RHSA-2024:0575
reference_id RHSA-2024:0575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0575
13
reference_url https://usn.ubuntu.com/6033-1/
reference_id USN-6033-1
reference_type
scores
url https://usn.ubuntu.com/6033-1/
14
reference_url https://usn.ubuntu.com/6171-1/
reference_id USN-6171-1
reference_type
scores
url https://usn.ubuntu.com/6171-1/
15
reference_url https://usn.ubuntu.com/6172-1/
reference_id USN-6172-1
reference_type
scores
url https://usn.ubuntu.com/6172-1/
16
reference_url https://usn.ubuntu.com/6185-1/
reference_id USN-6185-1
reference_type
scores
url https://usn.ubuntu.com/6185-1/
17
reference_url https://usn.ubuntu.com/6187-1/
reference_id USN-6187-1
reference_type
scores
url https://usn.ubuntu.com/6187-1/
18
reference_url https://usn.ubuntu.com/6207-1/
reference_id USN-6207-1
reference_type
scores
url https://usn.ubuntu.com/6207-1/
19
reference_url https://usn.ubuntu.com/6222-1/
reference_id USN-6222-1
reference_type
scores
url https://usn.ubuntu.com/6222-1/
20
reference_url https://usn.ubuntu.com/6223-1/
reference_id USN-6223-1
reference_type
scores
url https://usn.ubuntu.com/6223-1/
21
reference_url https://usn.ubuntu.com/6256-1/
reference_id USN-6256-1
reference_type
scores
url https://usn.ubuntu.com/6256-1/
22
reference_url https://usn.ubuntu.com/6604-1/
reference_id USN-6604-1
reference_type
scores
url https://usn.ubuntu.com/6604-1/
23
reference_url https://usn.ubuntu.com/6604-2/
reference_id USN-6604-2
reference_type
scores
url https://usn.ubuntu.com/6604-2/
fixed_packages
aliases CVE-2023-1079
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ryhg-z4qf-kyd6
39
url VCID-s4uv-qjv6-n7b8
vulnerability_id VCID-s4uv-qjv6-n7b8
summary kernel: net/tls: tls_is_tx_ready() checked list_entry
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1075.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1075.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1075
reference_id
reference_type
scores
0
value 0.0001
scoring_system epss
scoring_elements 0.01219
published_at 2026-04-26T12:55:00Z
1
value 0.0001
scoring_system epss
scoring_elements 0.01126
published_at 2026-04-16T12:55:00Z
2
value 0.0001
scoring_system epss
scoring_elements 0.01139
published_at 2026-04-18T12:55:00Z
3
value 0.0001
scoring_system epss
scoring_elements 0.01208
published_at 2026-04-21T12:55:00Z
4
value 0.0001
scoring_system epss
scoring_elements 0.01211
published_at 2026-04-24T12:55:00Z
5
value 9e-05
scoring_system epss
scoring_elements 0.00864
published_at 2026-04-04T12:55:00Z
6
value 9e-05
scoring_system epss
scoring_elements 0.0087
published_at 2026-04-08T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.00868
published_at 2026-04-09T12:55:00Z
8
value 9e-05
scoring_system epss
scoring_elements 0.00857
published_at 2026-04-11T12:55:00Z
9
value 9e-05
scoring_system epss
scoring_elements 0.00851
published_at 2026-04-12T12:55:00Z
10
value 9e-05
scoring_system epss
scoring_elements 0.00852
published_at 2026-04-13T12:55:00Z
11
value 9e-05
scoring_system epss
scoring_elements 0.00863
published_at 2026-04-02T12:55:00Z
12
value 9e-05
scoring_system epss
scoring_elements 0.00867
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1075
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1075
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2173434
reference_id 2173434
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2173434
5
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=ffe2a22562444720b05bdfeb999c03e810d84cbb
reference_id ?id=ffe2a22562444720b05bdfeb999c03e810d84cbb
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-24T17:05:50Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=ffe2a22562444720b05bdfeb999c03e810d84cbb
6
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
7
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
8
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
9
reference_url https://access.redhat.com/errata/RHSA-2024:0575
reference_id RHSA-2024:0575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0575
10
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
11
reference_url https://usn.ubuntu.com/5978-1/
reference_id USN-5978-1
reference_type
scores
url https://usn.ubuntu.com/5978-1/
12
reference_url https://usn.ubuntu.com/6079-1/
reference_id USN-6079-1
reference_type
scores
url https://usn.ubuntu.com/6079-1/
13
reference_url https://usn.ubuntu.com/6080-1/
reference_id USN-6080-1
reference_type
scores
url https://usn.ubuntu.com/6080-1/
14
reference_url https://usn.ubuntu.com/6085-1/
reference_id USN-6085-1
reference_type
scores
url https://usn.ubuntu.com/6085-1/
15
reference_url https://usn.ubuntu.com/6090-1/
reference_id USN-6090-1
reference_type
scores
url https://usn.ubuntu.com/6090-1/
16
reference_url https://usn.ubuntu.com/6091-1/
reference_id USN-6091-1
reference_type
scores
url https://usn.ubuntu.com/6091-1/
17
reference_url https://usn.ubuntu.com/6094-1/
reference_id USN-6094-1
reference_type
scores
url https://usn.ubuntu.com/6094-1/
18
reference_url https://usn.ubuntu.com/6096-1/
reference_id USN-6096-1
reference_type
scores
url https://usn.ubuntu.com/6096-1/
19
reference_url https://usn.ubuntu.com/6109-1/
reference_id USN-6109-1
reference_type
scores
url https://usn.ubuntu.com/6109-1/
20
reference_url https://usn.ubuntu.com/6118-1/
reference_id USN-6118-1
reference_type
scores
url https://usn.ubuntu.com/6118-1/
21
reference_url https://usn.ubuntu.com/6132-1/
reference_id USN-6132-1
reference_type
scores
url https://usn.ubuntu.com/6132-1/
22
reference_url https://usn.ubuntu.com/6133-1/
reference_id USN-6133-1
reference_type
scores
url https://usn.ubuntu.com/6133-1/
23
reference_url https://usn.ubuntu.com/6134-1/
reference_id USN-6134-1
reference_type
scores
url https://usn.ubuntu.com/6134-1/
24
reference_url https://usn.ubuntu.com/6222-1/
reference_id USN-6222-1
reference_type
scores
url https://usn.ubuntu.com/6222-1/
25
reference_url https://usn.ubuntu.com/6256-1/
reference_id USN-6256-1
reference_type
scores
url https://usn.ubuntu.com/6256-1/
26
reference_url https://usn.ubuntu.com/6385-1/
reference_id USN-6385-1
reference_type
scores
url https://usn.ubuntu.com/6385-1/
fixed_packages
aliases CVE-2023-1075
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s4uv-qjv6-n7b8
40
url VCID-sa68-r3bd-jkcs
vulnerability_id VCID-sa68-r3bd-jkcs
summary kernel: use-after-free in drivers/media/rc/ene_ir.c due to race condition
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1118.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1118.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1118
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04247
published_at 2026-04-02T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04267
published_at 2026-04-04T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04279
published_at 2026-04-07T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.0431
published_at 2026-04-08T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.04326
published_at 2026-04-09T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.04318
published_at 2026-04-11T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.04304
published_at 2026-04-12T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.04283
published_at 2026-04-13T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.04253
published_at 2026-04-16T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.04262
published_at 2026-04-18T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.04389
published_at 2026-04-21T12:55:00Z
11
value 0.00017
scoring_system epss
scoring_elements 0.04408
published_at 2026-04-24T12:55:00Z
12
value 0.00017
scoring_system epss
scoring_elements 0.04429
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1118
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1118
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2174400
reference_id 2174400
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2174400
5
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
6
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
7
reference_url https://access.redhat.com/errata/RHSA-2024:1653
reference_id RHSA-2024:1653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1653
8
reference_url https://access.redhat.com/errata/RHSA-2024:3810
reference_id RHSA-2024:3810
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3810
9
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
10
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
11
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
12
reference_url https://usn.ubuntu.com/6031-1/
reference_id USN-6031-1
reference_type
scores
url https://usn.ubuntu.com/6031-1/
13
reference_url https://usn.ubuntu.com/6032-1/
reference_id USN-6032-1
reference_type
scores
url https://usn.ubuntu.com/6032-1/
14
reference_url https://usn.ubuntu.com/6033-1/
reference_id USN-6033-1
reference_type
scores
url https://usn.ubuntu.com/6033-1/
15
reference_url https://usn.ubuntu.com/6079-1/
reference_id USN-6079-1
reference_type
scores
url https://usn.ubuntu.com/6079-1/
16
reference_url https://usn.ubuntu.com/6080-1/
reference_id USN-6080-1
reference_type
scores
url https://usn.ubuntu.com/6080-1/
17
reference_url https://usn.ubuntu.com/6081-1/
reference_id USN-6081-1
reference_type
scores
url https://usn.ubuntu.com/6081-1/
18
reference_url https://usn.ubuntu.com/6084-1/
reference_id USN-6084-1
reference_type
scores
url https://usn.ubuntu.com/6084-1/
19
reference_url https://usn.ubuntu.com/6085-1/
reference_id USN-6085-1
reference_type
scores
url https://usn.ubuntu.com/6085-1/
20
reference_url https://usn.ubuntu.com/6090-1/
reference_id USN-6090-1
reference_type
scores
url https://usn.ubuntu.com/6090-1/
21
reference_url https://usn.ubuntu.com/6091-1/
reference_id USN-6091-1
reference_type
scores
url https://usn.ubuntu.com/6091-1/
22
reference_url https://usn.ubuntu.com/6092-1/
reference_id USN-6092-1
reference_type
scores
url https://usn.ubuntu.com/6092-1/
23
reference_url https://usn.ubuntu.com/6094-1/
reference_id USN-6094-1
reference_type
scores
url https://usn.ubuntu.com/6094-1/
24
reference_url https://usn.ubuntu.com/6095-1/
reference_id USN-6095-1
reference_type
scores
url https://usn.ubuntu.com/6095-1/
25
reference_url https://usn.ubuntu.com/6096-1/
reference_id USN-6096-1
reference_type
scores
url https://usn.ubuntu.com/6096-1/
26
reference_url https://usn.ubuntu.com/6109-1/
reference_id USN-6109-1
reference_type
scores
url https://usn.ubuntu.com/6109-1/
27
reference_url https://usn.ubuntu.com/6118-1/
reference_id USN-6118-1
reference_type
scores
url https://usn.ubuntu.com/6118-1/
28
reference_url https://usn.ubuntu.com/6132-1/
reference_id USN-6132-1
reference_type
scores
url https://usn.ubuntu.com/6132-1/
29
reference_url https://usn.ubuntu.com/6133-1/
reference_id USN-6133-1
reference_type
scores
url https://usn.ubuntu.com/6133-1/
30
reference_url https://usn.ubuntu.com/6134-1/
reference_id USN-6134-1
reference_type
scores
url https://usn.ubuntu.com/6134-1/
31
reference_url https://usn.ubuntu.com/6222-1/
reference_id USN-6222-1
reference_type
scores
url https://usn.ubuntu.com/6222-1/
32
reference_url https://usn.ubuntu.com/6256-1/
reference_id USN-6256-1
reference_type
scores
url https://usn.ubuntu.com/6256-1/
fixed_packages
aliases CVE-2023-1118
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sa68-r3bd-jkcs
41
url VCID-ss41-s8fw-xub6
vulnerability_id VCID-ss41-s8fw-xub6
summary kernel: lib/seq_buf.c has a seq_buf_putmem_hex buffer overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28772.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28772.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-28772
reference_id
reference_type
scores
0
value 0.00177
scoring_system epss
scoring_elements 0.39348
published_at 2026-04-09T12:55:00Z
1
value 0.00177
scoring_system epss
scoring_elements 0.39337
published_at 2026-04-02T12:55:00Z
2
value 0.00177
scoring_system epss
scoring_elements 0.39361
published_at 2026-04-04T12:55:00Z
3
value 0.00177
scoring_system epss
scoring_elements 0.39275
published_at 2026-04-07T12:55:00Z
4
value 0.00177
scoring_system epss
scoring_elements 0.39331
published_at 2026-04-08T12:55:00Z
5
value 0.00215
scoring_system epss
scoring_elements 0.44053
published_at 2026-04-11T12:55:00Z
6
value 0.00215
scoring_system epss
scoring_elements 0.44021
published_at 2026-04-12T12:55:00Z
7
value 0.00215
scoring_system epss
scoring_elements 0.44005
published_at 2026-04-13T12:55:00Z
8
value 0.00236
scoring_system epss
scoring_elements 0.46554
published_at 2026-04-26T12:55:00Z
9
value 0.00236
scoring_system epss
scoring_elements 0.46617
published_at 2026-04-16T12:55:00Z
10
value 0.00236
scoring_system epss
scoring_elements 0.46615
published_at 2026-04-18T12:55:00Z
11
value 0.00236
scoring_system epss
scoring_elements 0.46561
published_at 2026-04-21T12:55:00Z
12
value 0.00236
scoring_system epss
scoring_elements 0.46543
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-28772
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28772
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2181330
reference_id 2181330
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2181330
5
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
6
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
7
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
8
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
fixed_packages
aliases CVE-2023-28772
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ss41-s8fw-xub6
42
url VCID-t81u-wyws-r7c3
vulnerability_id VCID-t81u-wyws-r7c3
summary kernel: Rate limit overflow messages in r8152 in intr_callback
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3594.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3594.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3594
reference_id
reference_type
scores
0
value 0.002
scoring_system epss
scoring_elements 0.41952
published_at 2026-04-26T12:55:00Z
1
value 0.002
scoring_system epss
scoring_elements 0.42075
published_at 2026-04-02T12:55:00Z
2
value 0.002
scoring_system epss
scoring_elements 0.42103
published_at 2026-04-04T12:55:00Z
3
value 0.002
scoring_system epss
scoring_elements 0.4204
published_at 2026-04-07T12:55:00Z
4
value 0.002
scoring_system epss
scoring_elements 0.42092
published_at 2026-04-08T12:55:00Z
5
value 0.002
scoring_system epss
scoring_elements 0.42104
published_at 2026-04-09T12:55:00Z
6
value 0.002
scoring_system epss
scoring_elements 0.42127
published_at 2026-04-11T12:55:00Z
7
value 0.002
scoring_system epss
scoring_elements 0.42089
published_at 2026-04-18T12:55:00Z
8
value 0.002
scoring_system epss
scoring_elements 0.42064
published_at 2026-04-13T12:55:00Z
9
value 0.002
scoring_system epss
scoring_elements 0.42115
published_at 2026-04-16T12:55:00Z
10
value 0.002
scoring_system epss
scoring_elements 0.42018
published_at 2026-04-21T12:55:00Z
11
value 0.002
scoring_system epss
scoring_elements 0.41958
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3594
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3594
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2149024
reference_id 2149024
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2149024
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://vuldb.com/?id.211363
reference_id ?id.211363
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-11T20:53:55Z/
url https://vuldb.com/?id.211363
10
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93e2be344a7db169b7119de21ac1bf253b8c6907
reference_id ?id=93e2be344a7db169b7119de21ac1bf253b8c6907
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-11T20:53:55Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93e2be344a7db169b7119de21ac1bf253b8c6907
11
reference_url https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html
reference_id msg00031.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-11T20:53:55Z/
url https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html
12
reference_url https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html
reference_id msg00034.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-11T20:53:55Z/
url https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html
13
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
14
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
15
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
16
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
17
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
18
reference_url https://usn.ubuntu.com/5754-1/
reference_id USN-5754-1
reference_type
scores
url https://usn.ubuntu.com/5754-1/
19
reference_url https://usn.ubuntu.com/5754-2/
reference_id USN-5754-2
reference_type
scores
url https://usn.ubuntu.com/5754-2/
20
reference_url https://usn.ubuntu.com/5755-1/
reference_id USN-5755-1
reference_type
scores
url https://usn.ubuntu.com/5755-1/
21
reference_url https://usn.ubuntu.com/5755-2/
reference_id USN-5755-2
reference_type
scores
url https://usn.ubuntu.com/5755-2/
22
reference_url https://usn.ubuntu.com/5756-1/
reference_id USN-5756-1
reference_type
scores
url https://usn.ubuntu.com/5756-1/
23
reference_url https://usn.ubuntu.com/5756-2/
reference_id USN-5756-2
reference_type
scores
url https://usn.ubuntu.com/5756-2/
24
reference_url https://usn.ubuntu.com/5756-3/
reference_id USN-5756-3
reference_type
scores
url https://usn.ubuntu.com/5756-3/
25
reference_url https://usn.ubuntu.com/5757-1/
reference_id USN-5757-1
reference_type
scores
url https://usn.ubuntu.com/5757-1/
26
reference_url https://usn.ubuntu.com/5757-2/
reference_id USN-5757-2
reference_type
scores
url https://usn.ubuntu.com/5757-2/
27
reference_url https://usn.ubuntu.com/5758-1/
reference_id USN-5758-1
reference_type
scores
url https://usn.ubuntu.com/5758-1/
28
reference_url https://usn.ubuntu.com/5773-1/
reference_id USN-5773-1
reference_type
scores
url https://usn.ubuntu.com/5773-1/
29
reference_url https://usn.ubuntu.com/5774-1/
reference_id USN-5774-1
reference_type
scores
url https://usn.ubuntu.com/5774-1/
30
reference_url https://usn.ubuntu.com/5779-1/
reference_id USN-5779-1
reference_type
scores
url https://usn.ubuntu.com/5779-1/
31
reference_url https://usn.ubuntu.com/5789-1/
reference_id USN-5789-1
reference_type
scores
url https://usn.ubuntu.com/5789-1/
fixed_packages
aliases CVE-2022-3594
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t81u-wyws-r7c3
43
url VCID-trxm-8mg3-4bbr
vulnerability_id VCID-trxm-8mg3-4bbr
summary x86/Intel: Gather Data Sampling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40982.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40982.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-40982
reference_id
reference_type
scores
0
value 0.00853
scoring_system epss
scoring_elements 0.74999
published_at 2026-04-26T12:55:00Z
1
value 0.00853
scoring_system epss
scoring_elements 0.7488
published_at 2026-04-02T12:55:00Z
2
value 0.00853
scoring_system epss
scoring_elements 0.74909
published_at 2026-04-04T12:55:00Z
3
value 0.00853
scoring_system epss
scoring_elements 0.74883
published_at 2026-04-07T12:55:00Z
4
value 0.00853
scoring_system epss
scoring_elements 0.74916
published_at 2026-04-08T12:55:00Z
5
value 0.00853
scoring_system epss
scoring_elements 0.74929
published_at 2026-04-09T12:55:00Z
6
value 0.00853
scoring_system epss
scoring_elements 0.74952
published_at 2026-04-11T12:55:00Z
7
value 0.00853
scoring_system epss
scoring_elements 0.7493
published_at 2026-04-12T12:55:00Z
8
value 0.00853
scoring_system epss
scoring_elements 0.74921
published_at 2026-04-13T12:55:00Z
9
value 0.00853
scoring_system epss
scoring_elements 0.74957
published_at 2026-04-21T12:55:00Z
10
value 0.00853
scoring_system epss
scoring_elements 0.74964
published_at 2026-04-18T12:55:00Z
11
value 0.00853
scoring_system epss
scoring_elements 0.74993
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-40982
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41804
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20569
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20569
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23908
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23908
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043305
reference_id 1043305
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043305
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2223949
reference_id 2223949
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2223949
9
reference_url https://access.redhat.com/solutions/7027704
reference_id 7027704
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/
url https://access.redhat.com/solutions/7027704
10
reference_url https://aws.amazon.com/security/security-bulletins/AWS-2023-007/
reference_id AWS-2023-007
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/
url https://aws.amazon.com/security/security-bulletins/AWS-2023-007/
11
reference_url https://downfall.page
reference_id downfall.page
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/
url https://downfall.page
12
reference_url https://www.debian.org/security/2023/dsa-5474
reference_id dsa-5474
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/
url https://www.debian.org/security/2023/dsa-5474
13
reference_url https://www.debian.org/security/2023/dsa-5475
reference_id dsa-5475
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/
url https://www.debian.org/security/2023/dsa-5475
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/
reference_id HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/
reference_id HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/
16
reference_url http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html
reference_id intel-sa-00828.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/
url http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html
17
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html
reference_id msg00013.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html
18
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html
reference_id msg00026.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html
19
reference_url https://security.netapp.com/advisory/ntap-20230811-0001/
reference_id ntap-20230811-0001
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/
url https://security.netapp.com/advisory/ntap-20230811-0001/
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/
reference_id OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/
21
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
22
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
23
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
24
reference_url https://access.redhat.com/errata/RHSA-2023:7370
reference_id RHSA-2023:7370
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7370
25
reference_url https://access.redhat.com/errata/RHSA-2023:7379
reference_id RHSA-2023:7379
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7379
26
reference_url https://access.redhat.com/errata/RHSA-2023:7423
reference_id RHSA-2023:7423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7423
27
reference_url https://access.redhat.com/errata/RHSA-2023:7424
reference_id RHSA-2023:7424
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7424
28
reference_url https://access.redhat.com/errata/RHSA-2023:7539
reference_id RHSA-2023:7539
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7539
29
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
30
reference_url https://access.redhat.com/errata/RHSA-2024:0562
reference_id RHSA-2024:0562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0562
31
reference_url https://access.redhat.com/errata/RHSA-2024:0563
reference_id RHSA-2024:0563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0563
32
reference_url https://access.redhat.com/errata/RHSA-2024:1250
reference_id RHSA-2024:1250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1250
33
reference_url https://access.redhat.com/errata/RHSA-2024:1268
reference_id RHSA-2024:1268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1268
34
reference_url https://access.redhat.com/errata/RHSA-2024:1269
reference_id RHSA-2024:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1269
35
reference_url https://access.redhat.com/errata/RHSA-2024:1306
reference_id RHSA-2024:1306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1306
36
reference_url https://access.redhat.com/errata/RHSA-2024:3319
reference_id RHSA-2024:3319
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3319
37
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/
reference_id T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/
38
reference_url https://usn.ubuntu.com/6286-1/
reference_id USN-6286-1
reference_type
scores
url https://usn.ubuntu.com/6286-1/
39
reference_url https://usn.ubuntu.com/6315-1/
reference_id USN-6315-1
reference_type
scores
url https://usn.ubuntu.com/6315-1/
40
reference_url https://usn.ubuntu.com/6316-1/
reference_id USN-6316-1
reference_type
scores
url https://usn.ubuntu.com/6316-1/
41
reference_url https://usn.ubuntu.com/6317-1/
reference_id USN-6317-1
reference_type
scores
url https://usn.ubuntu.com/6317-1/
42
reference_url https://usn.ubuntu.com/6318-1/
reference_id USN-6318-1
reference_type
scores
url https://usn.ubuntu.com/6318-1/
43
reference_url https://usn.ubuntu.com/6321-1/
reference_id USN-6321-1
reference_type
scores
url https://usn.ubuntu.com/6321-1/
44
reference_url https://usn.ubuntu.com/6324-1/
reference_id USN-6324-1
reference_type
scores
url https://usn.ubuntu.com/6324-1/
45
reference_url https://usn.ubuntu.com/6325-1/
reference_id USN-6325-1
reference_type
scores
url https://usn.ubuntu.com/6325-1/
46
reference_url https://usn.ubuntu.com/6328-1/
reference_id USN-6328-1
reference_type
scores
url https://usn.ubuntu.com/6328-1/
47
reference_url https://usn.ubuntu.com/6329-1/
reference_id USN-6329-1
reference_type
scores
url https://usn.ubuntu.com/6329-1/
48
reference_url https://usn.ubuntu.com/6330-1/
reference_id USN-6330-1
reference_type
scores
url https://usn.ubuntu.com/6330-1/
49
reference_url https://usn.ubuntu.com/6331-1/
reference_id USN-6331-1
reference_type
scores
url https://usn.ubuntu.com/6331-1/
50
reference_url https://usn.ubuntu.com/6332-1/
reference_id USN-6332-1
reference_type
scores
url https://usn.ubuntu.com/6332-1/
51
reference_url https://usn.ubuntu.com/6346-1/
reference_id USN-6346-1
reference_type
scores
url https://usn.ubuntu.com/6346-1/
52
reference_url https://usn.ubuntu.com/6348-1/
reference_id USN-6348-1
reference_type
scores
url https://usn.ubuntu.com/6348-1/
53
reference_url https://usn.ubuntu.com/6357-1/
reference_id USN-6357-1
reference_type
scores
url https://usn.ubuntu.com/6357-1/
54
reference_url https://usn.ubuntu.com/6388-1/
reference_id USN-6388-1
reference_type
scores
url https://usn.ubuntu.com/6388-1/
55
reference_url https://usn.ubuntu.com/6396-1/
reference_id USN-6396-1
reference_type
scores
url https://usn.ubuntu.com/6396-1/
56
reference_url https://usn.ubuntu.com/6396-2/
reference_id USN-6396-2
reference_type
scores
url https://usn.ubuntu.com/6396-2/
57
reference_url https://usn.ubuntu.com/6396-3/
reference_id USN-6396-3
reference_type
scores
url https://usn.ubuntu.com/6396-3/
58
reference_url https://usn.ubuntu.com/6397-1/
reference_id USN-6397-1
reference_type
scores
url https://usn.ubuntu.com/6397-1/
59
reference_url https://xenbits.xen.org/xsa/advisory-435.html
reference_id XSA-435
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/
url https://xenbits.xen.org/xsa/advisory-435.html
fixed_packages
aliases CVE-2022-40982, XSA-435
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-trxm-8mg3-4bbr
44
url VCID-ubr3-74hm-e7hy
vulnerability_id VCID-ubr3-74hm-e7hy
summary kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4207.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4207.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4207
reference_id
reference_type
scores
0
value 0.0003
scoring_system epss
scoring_elements 0.08541
published_at 2026-04-26T12:55:00Z
1
value 0.0003
scoring_system epss
scoring_elements 0.08414
published_at 2026-04-18T12:55:00Z
2
value 0.0003
scoring_system epss
scoring_elements 0.08574
published_at 2026-04-21T12:55:00Z
3
value 0.0003
scoring_system epss
scoring_elements 0.08587
published_at 2026-04-24T12:55:00Z
4
value 0.00043
scoring_system epss
scoring_elements 0.1333
published_at 2026-04-09T12:55:00Z
5
value 0.00043
scoring_system epss
scoring_elements 0.13298
published_at 2026-04-11T12:55:00Z
6
value 0.00043
scoring_system epss
scoring_elements 0.1326
published_at 2026-04-12T12:55:00Z
7
value 0.00043
scoring_system epss
scoring_elements 0.13212
published_at 2026-04-13T12:55:00Z
8
value 0.00043
scoring_system epss
scoring_elements 0.13118
published_at 2026-04-16T12:55:00Z
9
value 0.00043
scoring_system epss
scoring_elements 0.13338
published_at 2026-04-02T12:55:00Z
10
value 0.00043
scoring_system epss
scoring_elements 0.13402
published_at 2026-04-04T12:55:00Z
11
value 0.00043
scoring_system epss
scoring_elements 0.13198
published_at 2026-04-07T12:55:00Z
12
value 0.00043
scoring_system epss
scoring_elements 0.13279
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4207
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4207
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2225511
reference_id 2225511
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2225511
4
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
5
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
6
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
7
reference_url https://access.redhat.com/errata/RHSA-2023:7370
reference_id RHSA-2023:7370
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7370
8
reference_url https://access.redhat.com/errata/RHSA-2023:7379
reference_id RHSA-2023:7379
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7379
9
reference_url https://access.redhat.com/errata/RHSA-2023:7418
reference_id RHSA-2023:7418
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7418
10
reference_url https://access.redhat.com/errata/RHSA-2023:7419
reference_id RHSA-2023:7419
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7419
11
reference_url https://access.redhat.com/errata/RHSA-2023:7423
reference_id RHSA-2023:7423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7423
12
reference_url https://access.redhat.com/errata/RHSA-2023:7424
reference_id RHSA-2023:7424
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7424
13
reference_url https://access.redhat.com/errata/RHSA-2023:7539
reference_id RHSA-2023:7539
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7539
14
reference_url https://access.redhat.com/errata/RHSA-2023:7558
reference_id RHSA-2023:7558
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7558
15
reference_url https://access.redhat.com/errata/RHSA-2024:0261
reference_id RHSA-2024:0261
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0261
16
reference_url https://access.redhat.com/errata/RHSA-2024:0262
reference_id RHSA-2024:0262
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0262
fixed_packages
aliases CVE-2023-4207
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ubr3-74hm-e7hy
45
url VCID-uc3a-36wc-n3bt
vulnerability_id VCID-uc3a-36wc-n3bt
summary kernel: smsusb: use-after-free caused by do_submit_urb()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4132.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4132.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4132
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.0154
published_at 2026-04-26T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01444
published_at 2026-04-13T12:55:00Z
2
value 0.00011
scoring_system epss
scoring_elements 0.01433
published_at 2026-04-16T12:55:00Z
3
value 0.00011
scoring_system epss
scoring_elements 0.01447
published_at 2026-04-18T12:55:00Z
4
value 0.00011
scoring_system epss
scoring_elements 0.01534
published_at 2026-04-21T12:55:00Z
5
value 0.00011
scoring_system epss
scoring_elements 0.01542
published_at 2026-04-24T12:55:00Z
6
value 0.00011
scoring_system epss
scoring_elements 0.01449
published_at 2026-04-07T12:55:00Z
7
value 0.00011
scoring_system epss
scoring_elements 0.01453
published_at 2026-04-08T12:55:00Z
8
value 0.00011
scoring_system epss
scoring_elements 0.01456
published_at 2026-04-09T12:55:00Z
9
value 0.00011
scoring_system epss
scoring_elements 0.0145
published_at 2026-04-11T12:55:00Z
10
value 0.00011
scoring_system epss
scoring_elements 0.01443
published_at 2026-04-12T12:55:00Z
11
value 0.00016
scoring_system epss
scoring_elements 0.03502
published_at 2026-04-02T12:55:00Z
12
value 0.00016
scoring_system epss
scoring_elements 0.03516
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4132
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
33
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2221707
reference_id 2221707
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:30:20Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2221707
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv
reference_id cpe:/a:redhat:enterprise_linux:8::nfv
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::nfv
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime
reference_id cpe:/a:redhat:enterprise_linux:8::realtime
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::realtime
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb
reference_id cpe:/a:redhat:rhel_eus:8.6::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb
reference_id cpe:/a:redhat:rhel_eus:8.8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
reference_id cpe:/o:redhat:rhel_eus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8
reference_id cpe:/o:redhat:rhev_hypervisor:4.4::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8
47
reference_url https://access.redhat.com/security/cve/CVE-2023-4132
reference_id CVE-2023-4132
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:30:20Z/
url https://access.redhat.com/security/cve/CVE-2023-4132
48
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:30:20Z/
url https://access.redhat.com/errata/RHSA-2023:6901
49
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:30:20Z/
url https://access.redhat.com/errata/RHSA-2023:7077
50
reference_url https://access.redhat.com/errata/RHSA-2024:0575
reference_id RHSA-2024:0575
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:30:20Z/
url https://access.redhat.com/errata/RHSA-2024:0575
51
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:30:20Z/
url https://access.redhat.com/errata/RHSA-2024:0724
52
reference_url https://usn.ubuntu.com/6416-1/
reference_id USN-6416-1
reference_type
scores
url https://usn.ubuntu.com/6416-1/
53
reference_url https://usn.ubuntu.com/6416-2/
reference_id USN-6416-2
reference_type
scores
url https://usn.ubuntu.com/6416-2/
54
reference_url https://usn.ubuntu.com/6416-3/
reference_id USN-6416-3
reference_type
scores
url https://usn.ubuntu.com/6416-3/
55
reference_url https://usn.ubuntu.com/6445-1/
reference_id USN-6445-1
reference_type
scores
url https://usn.ubuntu.com/6445-1/
56
reference_url https://usn.ubuntu.com/6445-2/
reference_id USN-6445-2
reference_type
scores
url https://usn.ubuntu.com/6445-2/
57
reference_url https://usn.ubuntu.com/6462-1/
reference_id USN-6462-1
reference_type
scores
url https://usn.ubuntu.com/6462-1/
58
reference_url https://usn.ubuntu.com/6462-2/
reference_id USN-6462-2
reference_type
scores
url https://usn.ubuntu.com/6462-2/
59
reference_url https://usn.ubuntu.com/6464-1/
reference_id USN-6464-1
reference_type
scores
url https://usn.ubuntu.com/6464-1/
60
reference_url https://usn.ubuntu.com/6466-1/
reference_id USN-6466-1
reference_type
scores
url https://usn.ubuntu.com/6466-1/
61
reference_url https://usn.ubuntu.com/6520-1/
reference_id USN-6520-1
reference_type
scores
url https://usn.ubuntu.com/6520-1/
62
reference_url https://usn.ubuntu.com/6701-1/
reference_id USN-6701-1
reference_type
scores
url https://usn.ubuntu.com/6701-1/
63
reference_url https://usn.ubuntu.com/6701-2/
reference_id USN-6701-2
reference_type
scores
url https://usn.ubuntu.com/6701-2/
64
reference_url https://usn.ubuntu.com/6701-3/
reference_id USN-6701-3
reference_type
scores
url https://usn.ubuntu.com/6701-3/
65
reference_url https://usn.ubuntu.com/6701-4/
reference_id USN-6701-4
reference_type
scores
url https://usn.ubuntu.com/6701-4/
fixed_packages
aliases CVE-2023-4132
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uc3a-36wc-n3bt
46
url VCID-uhue-acky-4ye7
vulnerability_id VCID-uhue-acky-4ye7
summary kernel: HID: check empty report_list in hid_validate_values()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1073.json
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1073.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1073
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.04954
published_at 2026-04-02T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.0499
published_at 2026-04-13T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.05009
published_at 2026-04-12T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.05027
published_at 2026-04-11T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.05047
published_at 2026-04-09T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.05031
published_at 2026-04-08T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.04976
published_at 2026-04-04T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.04998
published_at 2026-04-07T12:55:00Z
8
value 0.00022
scoring_system epss
scoring_elements 0.061
published_at 2026-04-26T12:55:00Z
9
value 0.00022
scoring_system epss
scoring_elements 0.05886
published_at 2026-04-16T12:55:00Z
10
value 0.00022
scoring_system epss
scoring_elements 0.05897
published_at 2026-04-18T12:55:00Z
11
value 0.00022
scoring_system epss
scoring_elements 0.06048
published_at 2026-04-21T12:55:00Z
12
value 0.00022
scoring_system epss
scoring_elements 0.0607
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1073
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1073
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://www.openwall.com/lists/oss-security/2023/11/05/2
reference_id 2
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:44Z/
url http://www.openwall.com/lists/oss-security/2023/11/05/2
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2173403
reference_id 2173403
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:44Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2173403
6
reference_url https://www.openwall.com/lists/osssecurity/2023/01/17/3
reference_id 3
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:44Z/
url https://www.openwall.com/lists/osssecurity/2023/01/17/3
7
reference_url http://www.openwall.com/lists/oss-security/2023/11/05/3
reference_id 3
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:44Z/
url http://www.openwall.com/lists/oss-security/2023/11/05/3
8
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/id=b12fece4c64857e5fab4290bf01b2e0317a88456
reference_id id=b12fece4c64857e5fab4290bf01b2e0317a88456
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:44Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/id=b12fece4c64857e5fab4290bf01b2e0317a88456
9
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:44Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
10
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:44Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
11
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
12
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
13
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
14
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
15
reference_url https://access.redhat.com/errata/RHSA-2024:0575
reference_id RHSA-2024:0575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0575
16
reference_url https://access.redhat.com/errata/RHSA-2024:0881
reference_id RHSA-2024:0881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0881
17
reference_url https://access.redhat.com/errata/RHSA-2024:0897
reference_id RHSA-2024:0897
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0897
18
reference_url https://usn.ubuntu.com/5978-1/
reference_id USN-5978-1
reference_type
scores
url https://usn.ubuntu.com/5978-1/
19
reference_url https://usn.ubuntu.com/6025-1/
reference_id USN-6025-1
reference_type
scores
url https://usn.ubuntu.com/6025-1/
20
reference_url https://usn.ubuntu.com/6027-1/
reference_id USN-6027-1
reference_type
scores
url https://usn.ubuntu.com/6027-1/
21
reference_url https://usn.ubuntu.com/6029-1/
reference_id USN-6029-1
reference_type
scores
url https://usn.ubuntu.com/6029-1/
22
reference_url https://usn.ubuntu.com/6030-1/
reference_id USN-6030-1
reference_type
scores
url https://usn.ubuntu.com/6030-1/
23
reference_url https://usn.ubuntu.com/6040-1/
reference_id USN-6040-1
reference_type
scores
url https://usn.ubuntu.com/6040-1/
24
reference_url https://usn.ubuntu.com/6057-1/
reference_id USN-6057-1
reference_type
scores
url https://usn.ubuntu.com/6057-1/
25
reference_url https://usn.ubuntu.com/6079-1/
reference_id USN-6079-1
reference_type
scores
url https://usn.ubuntu.com/6079-1/
26
reference_url https://usn.ubuntu.com/6091-1/
reference_id USN-6091-1
reference_type
scores
url https://usn.ubuntu.com/6091-1/
27
reference_url https://usn.ubuntu.com/6093-1/
reference_id USN-6093-1
reference_type
scores
url https://usn.ubuntu.com/6093-1/
28
reference_url https://usn.ubuntu.com/6096-1/
reference_id USN-6096-1
reference_type
scores
url https://usn.ubuntu.com/6096-1/
29
reference_url https://usn.ubuntu.com/6134-1/
reference_id USN-6134-1
reference_type
scores
url https://usn.ubuntu.com/6134-1/
30
reference_url https://usn.ubuntu.com/6149-1/
reference_id USN-6149-1
reference_type
scores
url https://usn.ubuntu.com/6149-1/
31
reference_url https://usn.ubuntu.com/6174-1/
reference_id USN-6174-1
reference_type
scores
url https://usn.ubuntu.com/6174-1/
32
reference_url https://usn.ubuntu.com/6222-1/
reference_id USN-6222-1
reference_type
scores
url https://usn.ubuntu.com/6222-1/
33
reference_url https://usn.ubuntu.com/6235-1/
reference_id USN-6235-1
reference_type
scores
url https://usn.ubuntu.com/6235-1/
34
reference_url https://usn.ubuntu.com/6256-1/
reference_id USN-6256-1
reference_type
scores
url https://usn.ubuntu.com/6256-1/
fixed_packages
aliases CVE-2023-1073
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uhue-acky-4ye7
47
url VCID-uswu-w3g7-9ybk
vulnerability_id VCID-uswu-w3g7-9ybk
summary kernel: dm1105: race condition leading to use-after-free in dm1105_remove.c()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35824.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35824.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-35824
reference_id
reference_type
scores
0
value 0.0001
scoring_system epss
scoring_elements 0.01133
published_at 2026-04-26T12:55:00Z
1
value 0.0001
scoring_system epss
scoring_elements 0.01055
published_at 2026-04-16T12:55:00Z
2
value 0.0001
scoring_system epss
scoring_elements 0.01064
published_at 2026-04-18T12:55:00Z
3
value 0.0001
scoring_system epss
scoring_elements 0.01128
published_at 2026-04-24T12:55:00Z
4
value 9e-05
scoring_system epss
scoring_elements 0.00953
published_at 2026-04-08T12:55:00Z
5
value 9e-05
scoring_system epss
scoring_elements 0.00945
published_at 2026-04-04T12:55:00Z
6
value 9e-05
scoring_system epss
scoring_elements 0.00934
published_at 2026-04-13T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.00933
published_at 2026-04-12T12:55:00Z
8
value 9e-05
scoring_system epss
scoring_elements 0.00937
published_at 2026-04-11T12:55:00Z
9
value 9e-05
scoring_system epss
scoring_elements 0.00949
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-35824
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35824
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lore.kernel.org/lkml/20230318081506.795147-1-zyytlz.wz%40163.com/
reference_id 20230318081506.795147-1-zyytlz.wz%40163.com
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:42Z/
url https://lore.kernel.org/lkml/20230318081506.795147-1-zyytlz.wz%40163.com/
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2215836
reference_id 2215836
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2215836
6
reference_url https://lore.kernel.org/all/49bb0b6a-e669-d4e7-d742-a19d2763e947%40xs4all.nl/
reference_id 49bb0b6a-e669-d4e7-d742-a19d2763e947%40xs4all.nl
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:42Z/
url https://lore.kernel.org/all/49bb0b6a-e669-d4e7-d742-a19d2763e947%40xs4all.nl/
7
reference_url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2
reference_id ChangeLog-6.3.2
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:42Z/
url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2
8
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5abda7a16698d4d1f47af1168d8fa2c640116b4a
reference_id ?id=5abda7a16698d4d1f47af1168d8fa2c640116b4a
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:42Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5abda7a16698d4d1f47af1168d8fa2c640116b4a
9
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:42Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
10
reference_url https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
reference_id msg00030.html
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:42Z/
url https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
11
reference_url https://security.netapp.com/advisory/ntap-20230803-0002/
reference_id ntap-20230803-0002
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:42Z/
url https://security.netapp.com/advisory/ntap-20230803-0002/
12
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
13
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
14
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
15
reference_url https://access.redhat.com/errata/RHSA-2024:0575
reference_id RHSA-2024:0575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0575
16
reference_url https://usn.ubuntu.com/6283-1/
reference_id USN-6283-1
reference_type
scores
url https://usn.ubuntu.com/6283-1/
17
reference_url https://usn.ubuntu.com/6300-1/
reference_id USN-6300-1
reference_type
scores
url https://usn.ubuntu.com/6300-1/
18
reference_url https://usn.ubuntu.com/6311-1/
reference_id USN-6311-1
reference_type
scores
url https://usn.ubuntu.com/6311-1/
19
reference_url https://usn.ubuntu.com/6332-1/
reference_id USN-6332-1
reference_type
scores
url https://usn.ubuntu.com/6332-1/
20
reference_url https://usn.ubuntu.com/6340-1/
reference_id USN-6340-1
reference_type
scores
url https://usn.ubuntu.com/6340-1/
21
reference_url https://usn.ubuntu.com/6340-2/
reference_id USN-6340-2
reference_type
scores
url https://usn.ubuntu.com/6340-2/
22
reference_url https://usn.ubuntu.com/6347-1/
reference_id USN-6347-1
reference_type
scores
url https://usn.ubuntu.com/6347-1/
23
reference_url https://usn.ubuntu.com/6349-1/
reference_id USN-6349-1
reference_type
scores
url https://usn.ubuntu.com/6349-1/
24
reference_url https://usn.ubuntu.com/6357-1/
reference_id USN-6357-1
reference_type
scores
url https://usn.ubuntu.com/6357-1/
25
reference_url https://usn.ubuntu.com/6397-1/
reference_id USN-6397-1
reference_type
scores
url https://usn.ubuntu.com/6397-1/
fixed_packages
aliases CVE-2023-35824
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uswu-w3g7-9ybk
48
url VCID-wm98-kp5f-mudg
vulnerability_id VCID-wm98-kp5f-mudg
summary kernel: use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3640.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3640.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3640
reference_id
reference_type
scores
0
value 0.00028
scoring_system epss
scoring_elements 0.08007
published_at 2026-04-26T12:55:00Z
1
value 0.00028
scoring_system epss
scoring_elements 0.07946
published_at 2026-04-16T12:55:00Z
2
value 0.00028
scoring_system epss
scoring_elements 0.07932
published_at 2026-04-18T12:55:00Z
3
value 0.00028
scoring_system epss
scoring_elements 0.0809
published_at 2026-04-21T12:55:00Z
4
value 0.00028
scoring_system epss
scoring_elements 0.08042
published_at 2026-04-24T12:55:00Z
5
value 0.00029
scoring_system epss
scoring_elements 0.083
published_at 2026-04-09T12:55:00Z
6
value 0.00029
scoring_system epss
scoring_elements 0.08291
published_at 2026-04-11T12:55:00Z
7
value 0.00029
scoring_system epss
scoring_elements 0.08271
published_at 2026-04-12T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08252
published_at 2026-04-13T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.08281
published_at 2026-04-08T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08214
published_at 2026-04-02T12:55:00Z
11
value 0.00029
scoring_system epss
scoring_elements 0.08267
published_at 2026-04-04T12:55:00Z
12
value 0.00029
scoring_system epss
scoring_elements 0.08217
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3640
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3640
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2139610
reference_id 2139610
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2139610
5
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
6
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
7
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
8
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
9
reference_url https://access.redhat.com/errata/RHSA-2024:1877
reference_id RHSA-2024:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1877
10
reference_url https://access.redhat.com/errata/RHSA-2024:2621
reference_id RHSA-2024:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2621
11
reference_url https://access.redhat.com/errata/RHSA-2025:22910
reference_id RHSA-2025:22910
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22910
12
reference_url https://access.redhat.com/errata/RHSA-2025:22914
reference_id RHSA-2025:22914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22914
13
reference_url https://usn.ubuntu.com/5850-1/
reference_id USN-5850-1
reference_type
scores
url https://usn.ubuntu.com/5850-1/
14
reference_url https://usn.ubuntu.com/5851-1/
reference_id USN-5851-1
reference_type
scores
url https://usn.ubuntu.com/5851-1/
15
reference_url https://usn.ubuntu.com/5853-1/
reference_id USN-5853-1
reference_type
scores
url https://usn.ubuntu.com/5853-1/
16
reference_url https://usn.ubuntu.com/5860-1/
reference_id USN-5860-1
reference_type
scores
url https://usn.ubuntu.com/5860-1/
17
reference_url https://usn.ubuntu.com/5874-1/
reference_id USN-5874-1
reference_type
scores
url https://usn.ubuntu.com/5874-1/
18
reference_url https://usn.ubuntu.com/5875-1/
reference_id USN-5875-1
reference_type
scores
url https://usn.ubuntu.com/5875-1/
19
reference_url https://usn.ubuntu.com/5876-1/
reference_id USN-5876-1
reference_type
scores
url https://usn.ubuntu.com/5876-1/
20
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
21
reference_url https://usn.ubuntu.com/5878-1/
reference_id USN-5878-1
reference_type
scores
url https://usn.ubuntu.com/5878-1/
22
reference_url https://usn.ubuntu.com/5879-1/
reference_id USN-5879-1
reference_type
scores
url https://usn.ubuntu.com/5879-1/
23
reference_url https://usn.ubuntu.com/5883-1/
reference_id USN-5883-1
reference_type
scores
url https://usn.ubuntu.com/5883-1/
24
reference_url https://usn.ubuntu.com/5909-1/
reference_id USN-5909-1
reference_type
scores
url https://usn.ubuntu.com/5909-1/
25
reference_url https://usn.ubuntu.com/5918-1/
reference_id USN-5918-1
reference_type
scores
url https://usn.ubuntu.com/5918-1/
26
reference_url https://usn.ubuntu.com/5919-1/
reference_id USN-5919-1
reference_type
scores
url https://usn.ubuntu.com/5919-1/
27
reference_url https://usn.ubuntu.com/5920-1/
reference_id USN-5920-1
reference_type
scores
url https://usn.ubuntu.com/5920-1/
28
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
29
reference_url https://usn.ubuntu.com/5925-1/
reference_id USN-5925-1
reference_type
scores
url https://usn.ubuntu.com/5925-1/
30
reference_url https://usn.ubuntu.com/5927-1/
reference_id USN-5927-1
reference_type
scores
url https://usn.ubuntu.com/5927-1/
31
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
32
reference_url https://usn.ubuntu.com/6007-1/
reference_id USN-6007-1
reference_type
scores
url https://usn.ubuntu.com/6007-1/
33
reference_url https://usn.ubuntu.com/7607-1/
reference_id USN-7607-1
reference_type
scores
url https://usn.ubuntu.com/7607-1/
34
reference_url https://usn.ubuntu.com/7607-2/
reference_id USN-7607-2
reference_type
scores
url https://usn.ubuntu.com/7607-2/
35
reference_url https://usn.ubuntu.com/7607-3/
reference_id USN-7607-3
reference_type
scores
url https://usn.ubuntu.com/7607-3/
fixed_packages
aliases CVE-2022-3640
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wm98-kp5f-mudg
49
url VCID-wxfm-2u2z-euad
vulnerability_id VCID-wxfm-2u2z-euad
summary kernel: double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28388.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28388.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-28388
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01846
published_at 2026-04-26T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01781
published_at 2026-04-02T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01794
published_at 2026-04-07T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01797
published_at 2026-04-08T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.0181
published_at 2026-04-09T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01803
published_at 2026-04-11T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01793
published_at 2026-04-12T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.0179
published_at 2026-04-13T12:55:00Z
8
value 0.00012
scoring_system epss
scoring_elements 0.01779
published_at 2026-04-16T12:55:00Z
9
value 0.00012
scoring_system epss
scoring_elements 0.01777
published_at 2026-04-18T12:55:00Z
10
value 0.00012
scoring_system epss
scoring_elements 0.0186
published_at 2026-04-21T12:55:00Z
11
value 0.00012
scoring_system epss
scoring_elements 0.0185
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-28388
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
42
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
43
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2073091
reference_id 2073091
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2073091
44
reference_url https://github.com/torvalds/linux/commit/3d3925ff6433f98992685a9679613a2cc97f3ce2
reference_id 3d3925ff6433f98992685a9679613a2cc97f3ce2
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/
url https://github.com/torvalds/linux/commit/3d3925ff6433f98992685a9679613a2cc97f3ce2
45
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW/
reference_id 6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW/
46
reference_url https://security.archlinux.org/AVG-2698
reference_id AVG-2698
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2698
47
reference_url https://security.archlinux.org/AVG-2699
reference_id AVG-2699
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2699
48
reference_url https://security.archlinux.org/AVG-2700
reference_id AVG-2700
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2700
49
reference_url https://security.archlinux.org/AVG-2701
reference_id AVG-2701
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2701
50
reference_url https://www.debian.org/security/2022/dsa-5127
reference_id dsa-5127
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/
url https://www.debian.org/security/2022/dsa-5127
51
reference_url https://www.debian.org/security/2022/dsa-5173
reference_id dsa-5173
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/
url https://www.debian.org/security/2022/dsa-5173
52
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6/
reference_id LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6/
53
reference_url https://security.netapp.com/advisory/ntap-20220513-0001/
reference_id ntap-20220513-0001
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/
url https://security.netapp.com/advisory/ntap-20220513-0001/
54
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
55
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
56
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
57
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
58
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
59
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
60
reference_url https://usn.ubuntu.com/5416-1/
reference_id USN-5416-1
reference_type
scores
url https://usn.ubuntu.com/5416-1/
61
reference_url https://usn.ubuntu.com/5469-1/
reference_id USN-5469-1
reference_type
scores
url https://usn.ubuntu.com/5469-1/
62
reference_url https://usn.ubuntu.com/5493-1/
reference_id USN-5493-1
reference_type
scores
url https://usn.ubuntu.com/5493-1/
63
reference_url https://usn.ubuntu.com/5493-2/
reference_id USN-5493-2
reference_type
scores
url https://usn.ubuntu.com/5493-2/
64
reference_url https://usn.ubuntu.com/5505-1/
reference_id USN-5505-1
reference_type
scores
url https://usn.ubuntu.com/5505-1/
65
reference_url https://usn.ubuntu.com/5513-1/
reference_id USN-5513-1
reference_type
scores
url https://usn.ubuntu.com/5513-1/
66
reference_url https://usn.ubuntu.com/5539-1/
reference_id USN-5539-1
reference_type
scores
url https://usn.ubuntu.com/5539-1/
67
reference_url https://usn.ubuntu.com/5541-1/
reference_id USN-5541-1
reference_type
scores
url https://usn.ubuntu.com/5541-1/
68
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT/
reference_id XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT/
fixed_packages
aliases CVE-2022-28388
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wxfm-2u2z-euad
50
url VCID-wzfs-19ss-5fav
vulnerability_id VCID-wzfs-19ss-5fav
summary kernel: A possible deadlock in dm_get_inactive_table in dm- ioctl.c leads to dos
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2269.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2269.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2269
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05924
published_at 2026-04-26T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.06045
published_at 2026-04-21T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.06066
published_at 2026-04-24T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06373
published_at 2026-04-07T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06421
published_at 2026-04-08T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06464
published_at 2026-04-09T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06457
published_at 2026-04-11T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06451
published_at 2026-04-12T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06441
published_at 2026-04-13T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06382
published_at 2026-04-16T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06392
published_at 2026-04-18T12:55:00Z
11
value 0.00024
scoring_system epss
scoring_elements 0.06352
published_at 2026-04-02T12:55:00Z
12
value 0.00024
scoring_system epss
scoring_elements 0.06384
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2269
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
33
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2189388
reference_id 2189388
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2189388
35
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
36
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
37
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
38
reference_url https://usn.ubuntu.com/6173-1/
reference_id USN-6173-1
reference_type
scores
url https://usn.ubuntu.com/6173-1/
39
reference_url https://usn.ubuntu.com/6283-1/
reference_id USN-6283-1
reference_type
scores
url https://usn.ubuntu.com/6283-1/
40
reference_url https://usn.ubuntu.com/6300-1/
reference_id USN-6300-1
reference_type
scores
url https://usn.ubuntu.com/6300-1/
41
reference_url https://usn.ubuntu.com/6309-1/
reference_id USN-6309-1
reference_type
scores
url https://usn.ubuntu.com/6309-1/
42
reference_url https://usn.ubuntu.com/6311-1/
reference_id USN-6311-1
reference_type
scores
url https://usn.ubuntu.com/6311-1/
43
reference_url https://usn.ubuntu.com/6327-1/
reference_id USN-6327-1
reference_type
scores
url https://usn.ubuntu.com/6327-1/
44
reference_url https://usn.ubuntu.com/6332-1/
reference_id USN-6332-1
reference_type
scores
url https://usn.ubuntu.com/6332-1/
45
reference_url https://usn.ubuntu.com/6340-1/
reference_id USN-6340-1
reference_type
scores
url https://usn.ubuntu.com/6340-1/
46
reference_url https://usn.ubuntu.com/6340-2/
reference_id USN-6340-2
reference_type
scores
url https://usn.ubuntu.com/6340-2/
47
reference_url https://usn.ubuntu.com/6342-1/
reference_id USN-6342-1
reference_type
scores
url https://usn.ubuntu.com/6342-1/
48
reference_url https://usn.ubuntu.com/6342-2/
reference_id USN-6342-2
reference_type
scores
url https://usn.ubuntu.com/6342-2/
49
reference_url https://usn.ubuntu.com/6347-1/
reference_id USN-6347-1
reference_type
scores
url https://usn.ubuntu.com/6347-1/
50
reference_url https://usn.ubuntu.com/6349-1/
reference_id USN-6349-1
reference_type
scores
url https://usn.ubuntu.com/6349-1/
51
reference_url https://usn.ubuntu.com/6357-1/
reference_id USN-6357-1
reference_type
scores
url https://usn.ubuntu.com/6357-1/
52
reference_url https://usn.ubuntu.com/6385-1/
reference_id USN-6385-1
reference_type
scores
url https://usn.ubuntu.com/6385-1/
53
reference_url https://usn.ubuntu.com/6397-1/
reference_id USN-6397-1
reference_type
scores
url https://usn.ubuntu.com/6397-1/
fixed_packages
aliases CVE-2023-2269
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wzfs-19ss-5fav
51
url VCID-yrxe-ak75-qfhh
vulnerability_id VCID-yrxe-ak75-qfhh
summary kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4206.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4206.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4206
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.19493
published_at 2026-04-26T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19598
published_at 2026-04-18T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19612
published_at 2026-04-21T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19505
published_at 2026-04-24T12:55:00Z
4
value 0.00077
scoring_system epss
scoring_elements 0.23005
published_at 2026-04-09T12:55:00Z
5
value 0.00077
scoring_system epss
scoring_elements 0.23024
published_at 2026-04-11T12:55:00Z
6
value 0.00077
scoring_system epss
scoring_elements 0.22987
published_at 2026-04-12T12:55:00Z
7
value 0.00077
scoring_system epss
scoring_elements 0.22931
published_at 2026-04-13T12:55:00Z
8
value 0.00077
scoring_system epss
scoring_elements 0.22946
published_at 2026-04-16T12:55:00Z
9
value 0.00077
scoring_system epss
scoring_elements 0.23047
published_at 2026-04-02T12:55:00Z
10
value 0.00077
scoring_system epss
scoring_elements 0.23091
published_at 2026-04-04T12:55:00Z
11
value 0.00077
scoring_system epss
scoring_elements 0.2288
published_at 2026-04-07T12:55:00Z
12
value 0.00077
scoring_system epss
scoring_elements 0.22953
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4206
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4206
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2225511
reference_id 2225511
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2225511
4
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
5
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
6
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
7
reference_url https://access.redhat.com/errata/RHSA-2023:7370
reference_id RHSA-2023:7370
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7370
8
reference_url https://access.redhat.com/errata/RHSA-2023:7379
reference_id RHSA-2023:7379
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7379
9
reference_url https://access.redhat.com/errata/RHSA-2023:7418
reference_id RHSA-2023:7418
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7418
10
reference_url https://access.redhat.com/errata/RHSA-2023:7419
reference_id RHSA-2023:7419
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7419
11
reference_url https://access.redhat.com/errata/RHSA-2023:7423
reference_id RHSA-2023:7423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7423
12
reference_url https://access.redhat.com/errata/RHSA-2023:7424
reference_id RHSA-2023:7424
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7424
13
reference_url https://access.redhat.com/errata/RHSA-2023:7539
reference_id RHSA-2023:7539
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7539
14
reference_url https://access.redhat.com/errata/RHSA-2023:7558
reference_id RHSA-2023:7558
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7558
15
reference_url https://access.redhat.com/errata/RHSA-2024:0261
reference_id RHSA-2024:0261
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0261
16
reference_url https://access.redhat.com/errata/RHSA-2024:0262
reference_id RHSA-2024:0262
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0262
fixed_packages
aliases CVE-2023-4206
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yrxe-ak75-qfhh
52
url VCID-zbbv-tgna-hybm
vulnerability_id VCID-zbbv-tgna-hybm
summary kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4208.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4208.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4208
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08383
published_at 2026-04-26T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.0829
published_at 2026-04-18T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.08448
published_at 2026-04-21T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.08418
published_at 2026-04-24T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10524
published_at 2026-04-07T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.10657
published_at 2026-04-09T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.1067
published_at 2026-04-11T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10638
published_at 2026-04-12T12:55:00Z
8
value 0.00036
scoring_system epss
scoring_elements 0.10614
published_at 2026-04-13T12:55:00Z
9
value 0.00036
scoring_system epss
scoring_elements 0.1048
published_at 2026-04-16T12:55:00Z
10
value 0.00036
scoring_system epss
scoring_elements 0.10597
published_at 2026-04-08T12:55:00Z
11
value 0.00036
scoring_system epss
scoring_elements 0.10598
published_at 2026-04-02T12:55:00Z
12
value 0.00036
scoring_system epss
scoring_elements 0.1066
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4208
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4208
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2225511
reference_id 2225511
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2225511
5
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
6
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
7
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
8
reference_url https://access.redhat.com/errata/RHSA-2023:7370
reference_id RHSA-2023:7370
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7370
9
reference_url https://access.redhat.com/errata/RHSA-2023:7379
reference_id RHSA-2023:7379
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7379
10
reference_url https://access.redhat.com/errata/RHSA-2023:7418
reference_id RHSA-2023:7418
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7418
11
reference_url https://access.redhat.com/errata/RHSA-2023:7419
reference_id RHSA-2023:7419
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7419
12
reference_url https://access.redhat.com/errata/RHSA-2023:7423
reference_id RHSA-2023:7423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7423
13
reference_url https://access.redhat.com/errata/RHSA-2023:7424
reference_id RHSA-2023:7424
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7424
14
reference_url https://access.redhat.com/errata/RHSA-2023:7539
reference_id RHSA-2023:7539
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7539
15
reference_url https://access.redhat.com/errata/RHSA-2023:7558
reference_id RHSA-2023:7558
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7558
16
reference_url https://access.redhat.com/errata/RHSA-2024:0261
reference_id RHSA-2024:0261
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0261
17
reference_url https://access.redhat.com/errata/RHSA-2024:0262
reference_id RHSA-2024:0262
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0262
fixed_packages
aliases CVE-2023-4208
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zbbv-tgna-hybm
53
url VCID-zuk7-eezk-mufb
vulnerability_id VCID-zuk7-eezk-mufb
summary kernel: out-of-bounds write in qfq_change_class function
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-31436.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-31436.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-31436
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10327
published_at 2026-04-21T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10302
published_at 2026-04-26T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10308
published_at 2026-04-24T12:55:00Z
3
value 0.00038
scoring_system epss
scoring_elements 0.1148
published_at 2026-04-02T12:55:00Z
4
value 0.00038
scoring_system epss
scoring_elements 0.11539
published_at 2026-04-04T12:55:00Z
5
value 0.00038
scoring_system epss
scoring_elements 0.11322
published_at 2026-04-07T12:55:00Z
6
value 0.00038
scoring_system epss
scoring_elements 0.11405
published_at 2026-04-08T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.11463
published_at 2026-04-09T12:55:00Z
8
value 0.00038
scoring_system epss
scoring_elements 0.1147
published_at 2026-04-11T12:55:00Z
9
value 0.00038
scoring_system epss
scoring_elements 0.11437
published_at 2026-04-12T12:55:00Z
10
value 0.00038
scoring_system epss
scoring_elements 0.11408
published_at 2026-04-13T12:55:00Z
11
value 0.00038
scoring_system epss
scoring_elements 0.11271
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-31436
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0386
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0386
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31436
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31436
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32233
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32233
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2192671
reference_id 2192671
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2192671
7
reference_url https://github.com/torvalds/linux/commit/3037933448f60f9acb705997eae62013ecb81e0d
reference_id 3037933448f60f9acb705997eae62013ecb81e0d
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:52Z/
url https://github.com/torvalds/linux/commit/3037933448f60f9acb705997eae62013ecb81e0d
8
reference_url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.13
reference_id ChangeLog-6.2.13
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:52Z/
url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.13
9
reference_url https://www.debian.org/security/2023/dsa-5402
reference_id dsa-5402
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:52Z/
url https://www.debian.org/security/2023/dsa-5402
10
reference_url http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html
reference_id Kernel-Live-Patch-Security-Notice-LSN-0095-1.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:52Z/
url http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html
11
reference_url http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html
reference_id Kernel-Live-Patch-Security-Notice-LSN-0096-1.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:52Z/
url http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html
12
reference_url http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
reference_id Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:52Z/
url http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
13
reference_url https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:52Z/
url https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html
14
reference_url https://www.spinics.net/lists/stable-commits/msg294885.html
reference_id msg294885.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:52Z/
url https://www.spinics.net/lists/stable-commits/msg294885.html
15
reference_url https://security.netapp.com/advisory/ntap-20230609-0001/
reference_id ntap-20230609-0001
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:15:52Z/
url https://security.netapp.com/advisory/ntap-20230609-0001/
16
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
17
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
18
reference_url https://access.redhat.com/errata/RHSA-2023:7423
reference_id RHSA-2023:7423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7423
19
reference_url https://access.redhat.com/errata/RHSA-2023:7424
reference_id RHSA-2023:7424
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7424
20
reference_url https://access.redhat.com/errata/RHSA-2024:0261
reference_id RHSA-2024:0261
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0261
21
reference_url https://access.redhat.com/errata/RHSA-2024:0262
reference_id RHSA-2024:0262
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0262
22
reference_url https://access.redhat.com/errata/RHSA-2024:0378
reference_id RHSA-2024:0378
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0378
23
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
24
reference_url https://access.redhat.com/errata/RHSA-2024:0554
reference_id RHSA-2024:0554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0554
25
reference_url https://access.redhat.com/errata/RHSA-2024:0575
reference_id RHSA-2024:0575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0575
26
reference_url https://access.redhat.com/errata/RHSA-2024:1268
reference_id RHSA-2024:1268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1268
27
reference_url https://access.redhat.com/errata/RHSA-2024:1269
reference_id RHSA-2024:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1269
28
reference_url https://access.redhat.com/errata/RHSA-2024:1278
reference_id RHSA-2024:1278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1278
29
reference_url https://access.redhat.com/errata/RHSA-2024:1323
reference_id RHSA-2024:1323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1323
30
reference_url https://access.redhat.com/errata/RHSA-2024:1367
reference_id RHSA-2024:1367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1367
31
reference_url https://access.redhat.com/errata/RHSA-2024:1377
reference_id RHSA-2024:1377
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1377
32
reference_url https://access.redhat.com/errata/RHSA-2024:1382
reference_id RHSA-2024:1382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1382
33
reference_url https://access.redhat.com/errata/RHSA-2024:1831
reference_id RHSA-2024:1831
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1831
34
reference_url https://usn.ubuntu.com/6127-1/
reference_id USN-6127-1
reference_type
scores
url https://usn.ubuntu.com/6127-1/
35
reference_url https://usn.ubuntu.com/6130-1/
reference_id USN-6130-1
reference_type
scores
url https://usn.ubuntu.com/6130-1/
36
reference_url https://usn.ubuntu.com/6131-1/
reference_id USN-6131-1
reference_type
scores
url https://usn.ubuntu.com/6131-1/
37
reference_url https://usn.ubuntu.com/6132-1/
reference_id USN-6132-1
reference_type
scores
url https://usn.ubuntu.com/6132-1/
38
reference_url https://usn.ubuntu.com/6135-1/
reference_id USN-6135-1
reference_type
scores
url https://usn.ubuntu.com/6135-1/
39
reference_url https://usn.ubuntu.com/6149-1/
reference_id USN-6149-1
reference_type
scores
url https://usn.ubuntu.com/6149-1/
40
reference_url https://usn.ubuntu.com/6150-1/
reference_id USN-6150-1
reference_type
scores
url https://usn.ubuntu.com/6150-1/
41
reference_url https://usn.ubuntu.com/6162-1/
reference_id USN-6162-1
reference_type
scores
url https://usn.ubuntu.com/6162-1/
42
reference_url https://usn.ubuntu.com/6173-1/
reference_id USN-6173-1
reference_type
scores
url https://usn.ubuntu.com/6173-1/
43
reference_url https://usn.ubuntu.com/6175-1/
reference_id USN-6175-1
reference_type
scores
url https://usn.ubuntu.com/6175-1/
44
reference_url https://usn.ubuntu.com/6186-1/
reference_id USN-6186-1
reference_type
scores
url https://usn.ubuntu.com/6186-1/
45
reference_url https://usn.ubuntu.com/6222-1/
reference_id USN-6222-1
reference_type
scores
url https://usn.ubuntu.com/6222-1/
46
reference_url https://usn.ubuntu.com/6256-1/
reference_id USN-6256-1
reference_type
scores
url https://usn.ubuntu.com/6256-1/
47
reference_url https://usn.ubuntu.com/6385-1/
reference_id USN-6385-1
reference_type
scores
url https://usn.ubuntu.com/6385-1/
48
reference_url https://usn.ubuntu.com/6460-1/
reference_id USN-6460-1
reference_type
scores
url https://usn.ubuntu.com/6460-1/
fixed_packages
aliases CVE-2023-31436
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zuk7-eezk-mufb
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@4.18.0-513.5.1.rt7.307%3Farch=el8_9