Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/openstack-ironic-inspector@11.5.0-0.20230706175125.193aa0d?arch=el9
Typerpm
Namespaceredhat
Nameopenstack-ironic-inspector
Version11.5.0-0.20230706175125.193aa0d
Qualifiers
arch el9
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-7359-arkb-zkg6
vulnerability_id VCID-7359-arkb-zkg6
summary
Kubernetes mountable secrets policy bypass
Users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using ephemeral containers. The policy ensures pods running with a service account may only reference secrets specified in the service account’s secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the `kubernetes.io/enforce-mountable-secrets` annotation are used together with ephemeral containers.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2728.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2728.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2728
reference_id
reference_type
scores
0
value 0.04853
scoring_system epss
scoring_elements 0.89556
published_at 2026-04-18T12:55:00Z
1
value 0.04853
scoring_system epss
scoring_elements 0.89554
published_at 2026-04-21T12:55:00Z
2
value 0.04853
scoring_system epss
scoring_elements 0.89546
published_at 2026-04-12T12:55:00Z
3
value 0.04853
scoring_system epss
scoring_elements 0.89548
published_at 2026-04-11T12:55:00Z
4
value 0.04853
scoring_system epss
scoring_elements 0.89521
published_at 2026-04-07T12:55:00Z
5
value 0.04853
scoring_system epss
scoring_elements 0.89509
published_at 2026-04-02T12:55:00Z
6
value 0.04853
scoring_system epss
scoring_elements 0.89541
published_at 2026-04-13T12:55:00Z
7
value 0.04853
scoring_system epss
scoring_elements 0.89537
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2728
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2728
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/kubernetes/kubernetes
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes
5
reference_url https://github.com/kubernetes/kubernetes/issues/118640
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-25T17:02:56Z/
url https://github.com/kubernetes/kubernetes/issues/118640
6
reference_url https://github.com/kubernetes/kubernetes/pull/118356
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/118356
7
reference_url https://github.com/kubernetes/kubernetes/pull/118471
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/118471
8
reference_url https://github.com/kubernetes/kubernetes/pull/118473
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/118473
9
reference_url https://github.com/kubernetes/kubernetes/pull/118474
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/118474
10
reference_url https://github.com/kubernetes/kubernetes/pull/118512
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/118512
11
reference_url https://groups.google.com/g/kubernetes-security-announce/c/vPWYJ_L84m8
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-25T17:02:56Z/
url https://groups.google.com/g/kubernetes-security-announce/c/vPWYJ_L84m8
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-2728
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-2728
13
reference_url https://security.netapp.com/advisory/ntap-20230803-0004
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20230803-0004
14
reference_url http://www.openwall.com/lists/oss-security/2023/07/06/3
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-25T17:02:56Z/
url http://www.openwall.com/lists/oss-security/2023/07/06/3
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2211348
reference_id 2211348
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2211348
16
reference_url https://security.netapp.com/advisory/ntap-20230803-0004/
reference_id ntap-20230803-0004
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-25T17:02:56Z/
url https://security.netapp.com/advisory/ntap-20230803-0004/
17
reference_url https://access.redhat.com/errata/RHSA-2023:5009
reference_id RHSA-2023:5009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5009
fixed_packages
aliases CVE-2023-2728, GHSA-cgcv-5272-97pr
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7359-arkb-zkg6
1
url VCID-pqb1-j3ad-efam
vulnerability_id VCID-pqb1-j3ad-efam
summary
kube-apiserver vulnerable to policy bypass
Users may be able to launch containers using images that are restricted by ImagePolicyWebhook when using ephemeral containers. Kubernetes clusters are only affected if the ImagePolicyWebhook admission plugin is used together with ephemeral containers.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2727.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2727.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2727
reference_id
reference_type
scores
0
value 0.00191
scoring_system epss
scoring_elements 0.40892
published_at 2026-04-21T12:55:00Z
1
value 0.00191
scoring_system epss
scoring_elements 0.4097
published_at 2026-04-18T12:55:00Z
2
value 0.00191
scoring_system epss
scoring_elements 0.41
published_at 2026-04-16T12:55:00Z
3
value 0.00191
scoring_system epss
scoring_elements 0.40958
published_at 2026-04-13T12:55:00Z
4
value 0.00191
scoring_system epss
scoring_elements 0.40975
published_at 2026-04-12T12:55:00Z
5
value 0.00191
scoring_system epss
scoring_elements 0.4101
published_at 2026-04-11T12:55:00Z
6
value 0.00191
scoring_system epss
scoring_elements 0.41009
published_at 2026-04-04T12:55:00Z
7
value 0.00191
scoring_system epss
scoring_elements 0.40976
published_at 2026-04-02T12:55:00Z
8
value 0.00191
scoring_system epss
scoring_elements 0.40991
published_at 2026-04-09T12:55:00Z
9
value 0.00191
scoring_system epss
scoring_elements 0.40984
published_at 2026-04-08T12:55:00Z
10
value 0.00191
scoring_system epss
scoring_elements 0.40935
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2727
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2727
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/kubernetes/kubernetes
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes
5
reference_url https://github.com/kubernetes/kubernetes/issues/118640
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-25T17:43:56Z/
url https://github.com/kubernetes/kubernetes/issues/118640
6
reference_url https://github.com/kubernetes/kubernetes/pull/118356
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/118356
7
reference_url https://github.com/kubernetes/kubernetes/pull/118471
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/118471
8
reference_url https://github.com/kubernetes/kubernetes/pull/118473
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/118473
9
reference_url https://github.com/kubernetes/kubernetes/pull/118474
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/118474
10
reference_url https://github.com/kubernetes/kubernetes/pull/118512
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/118512
11
reference_url https://groups.google.com/g/kubernetes-security-announce/c/vPWYJ_L84m8
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-25T17:43:56Z/
url https://groups.google.com/g/kubernetes-security-announce/c/vPWYJ_L84m8
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-2727
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-2727
13
reference_url https://security.netapp.com/advisory/ntap-20230803-0004
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20230803-0004
14
reference_url http://www.openwall.com/lists/oss-security/2023/07/06/2
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-25T17:43:56Z/
url http://www.openwall.com/lists/oss-security/2023/07/06/2
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2211322
reference_id 2211322
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2211322
16
reference_url https://security.netapp.com/advisory/ntap-20230803-0004/
reference_id ntap-20230803-0004
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-25T17:43:56Z/
url https://security.netapp.com/advisory/ntap-20230803-0004/
17
reference_url https://access.redhat.com/errata/RHSA-2023:5009
reference_id RHSA-2023:5009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5009
fixed_packages
aliases CVE-2023-2727, GHSA-qc2g-gmh6-95p4
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pqb1-j3ad-efam
Fixing_vulnerabilities
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openstack-ironic-inspector@11.5.0-0.20230706175125.193aa0d%3Farch=el9