Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/ovn23.09@23.09.0-37?arch=el9fdp
Typerpm
Namespaceredhat
Nameovn23.09
Version23.09.0-37
Qualifiers
arch el9fdp
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-7359-arkb-zkg6
vulnerability_id VCID-7359-arkb-zkg6
summary
Kubernetes mountable secrets policy bypass
Users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using ephemeral containers. The policy ensures pods running with a service account may only reference secrets specified in the service account’s secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the `kubernetes.io/enforce-mountable-secrets` annotation are used together with ephemeral containers.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2728.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2728.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2728
reference_id
reference_type
scores
0
value 0.04853
scoring_system epss
scoring_elements 0.89556
published_at 2026-04-18T12:55:00Z
1
value 0.04853
scoring_system epss
scoring_elements 0.89554
published_at 2026-04-21T12:55:00Z
2
value 0.04853
scoring_system epss
scoring_elements 0.89546
published_at 2026-04-12T12:55:00Z
3
value 0.04853
scoring_system epss
scoring_elements 0.89548
published_at 2026-04-11T12:55:00Z
4
value 0.04853
scoring_system epss
scoring_elements 0.89521
published_at 2026-04-07T12:55:00Z
5
value 0.04853
scoring_system epss
scoring_elements 0.89509
published_at 2026-04-02T12:55:00Z
6
value 0.04853
scoring_system epss
scoring_elements 0.89541
published_at 2026-04-13T12:55:00Z
7
value 0.04853
scoring_system epss
scoring_elements 0.89537
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2728
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2728
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/kubernetes/kubernetes
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes
5
reference_url https://github.com/kubernetes/kubernetes/issues/118640
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-25T17:02:56Z/
url https://github.com/kubernetes/kubernetes/issues/118640
6
reference_url https://github.com/kubernetes/kubernetes/pull/118356
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/118356
7
reference_url https://github.com/kubernetes/kubernetes/pull/118471
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/118471
8
reference_url https://github.com/kubernetes/kubernetes/pull/118473
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/118473
9
reference_url https://github.com/kubernetes/kubernetes/pull/118474
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/118474
10
reference_url https://github.com/kubernetes/kubernetes/pull/118512
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/118512
11
reference_url https://groups.google.com/g/kubernetes-security-announce/c/vPWYJ_L84m8
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-25T17:02:56Z/
url https://groups.google.com/g/kubernetes-security-announce/c/vPWYJ_L84m8
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-2728
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-2728
13
reference_url https://security.netapp.com/advisory/ntap-20230803-0004
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20230803-0004
14
reference_url http://www.openwall.com/lists/oss-security/2023/07/06/3
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-25T17:02:56Z/
url http://www.openwall.com/lists/oss-security/2023/07/06/3
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2211348
reference_id 2211348
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2211348
16
reference_url https://security.netapp.com/advisory/ntap-20230803-0004/
reference_id ntap-20230803-0004
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-25T17:02:56Z/
url https://security.netapp.com/advisory/ntap-20230803-0004/
17
reference_url https://access.redhat.com/errata/RHSA-2023:5009
reference_id RHSA-2023:5009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5009
fixed_packages
aliases CVE-2023-2728, GHSA-cgcv-5272-97pr
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7359-arkb-zkg6
1
url VCID-pqb1-j3ad-efam
vulnerability_id VCID-pqb1-j3ad-efam
summary
kube-apiserver vulnerable to policy bypass
Users may be able to launch containers using images that are restricted by ImagePolicyWebhook when using ephemeral containers. Kubernetes clusters are only affected if the ImagePolicyWebhook admission plugin is used together with ephemeral containers.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2727.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2727.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2727
reference_id
reference_type
scores
0
value 0.00191
scoring_system epss
scoring_elements 0.40892
published_at 2026-04-21T12:55:00Z
1
value 0.00191
scoring_system epss
scoring_elements 0.4097
published_at 2026-04-18T12:55:00Z
2
value 0.00191
scoring_system epss
scoring_elements 0.41
published_at 2026-04-16T12:55:00Z
3
value 0.00191
scoring_system epss
scoring_elements 0.40958
published_at 2026-04-13T12:55:00Z
4
value 0.00191
scoring_system epss
scoring_elements 0.40975
published_at 2026-04-12T12:55:00Z
5
value 0.00191
scoring_system epss
scoring_elements 0.4101
published_at 2026-04-11T12:55:00Z
6
value 0.00191
scoring_system epss
scoring_elements 0.41009
published_at 2026-04-04T12:55:00Z
7
value 0.00191
scoring_system epss
scoring_elements 0.40976
published_at 2026-04-02T12:55:00Z
8
value 0.00191
scoring_system epss
scoring_elements 0.40991
published_at 2026-04-09T12:55:00Z
9
value 0.00191
scoring_system epss
scoring_elements 0.40984
published_at 2026-04-08T12:55:00Z
10
value 0.00191
scoring_system epss
scoring_elements 0.40935
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2727
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2727
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/kubernetes/kubernetes
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes
5
reference_url https://github.com/kubernetes/kubernetes/issues/118640
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-25T17:43:56Z/
url https://github.com/kubernetes/kubernetes/issues/118640
6
reference_url https://github.com/kubernetes/kubernetes/pull/118356
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/118356
7
reference_url https://github.com/kubernetes/kubernetes/pull/118471
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/118471
8
reference_url https://github.com/kubernetes/kubernetes/pull/118473
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/118473
9
reference_url https://github.com/kubernetes/kubernetes/pull/118474
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/118474
10
reference_url https://github.com/kubernetes/kubernetes/pull/118512
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/118512
11
reference_url https://groups.google.com/g/kubernetes-security-announce/c/vPWYJ_L84m8
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-25T17:43:56Z/
url https://groups.google.com/g/kubernetes-security-announce/c/vPWYJ_L84m8
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-2727
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-2727
13
reference_url https://security.netapp.com/advisory/ntap-20230803-0004
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20230803-0004
14
reference_url http://www.openwall.com/lists/oss-security/2023/07/06/2
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-25T17:43:56Z/
url http://www.openwall.com/lists/oss-security/2023/07/06/2
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2211322
reference_id 2211322
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2211322
16
reference_url https://security.netapp.com/advisory/ntap-20230803-0004/
reference_id ntap-20230803-0004
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-25T17:43:56Z/
url https://security.netapp.com/advisory/ntap-20230803-0004/
17
reference_url https://access.redhat.com/errata/RHSA-2023:5009
reference_id RHSA-2023:5009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5009
fixed_packages
aliases CVE-2023-2727, GHSA-qc2g-gmh6-95p4
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pqb1-j3ad-efam
2
url VCID-yu8r-jpxf-h3ay
vulnerability_id VCID-yu8r-jpxf-h3ay
summary ovn: service monitor MAC flow is not rate limited
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3153.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3153.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3153
reference_id
reference_type
scores
0
value 0.00069
scoring_system epss
scoring_elements 0.21205
published_at 2026-04-21T12:55:00Z
1
value 0.00069
scoring_system epss
scoring_elements 0.2136
published_at 2026-04-02T12:55:00Z
2
value 0.00069
scoring_system epss
scoring_elements 0.21415
published_at 2026-04-04T12:55:00Z
3
value 0.00069
scoring_system epss
scoring_elements 0.21166
published_at 2026-04-07T12:55:00Z
4
value 0.00069
scoring_system epss
scoring_elements 0.21246
published_at 2026-04-08T12:55:00Z
5
value 0.00069
scoring_system epss
scoring_elements 0.21308
published_at 2026-04-09T12:55:00Z
6
value 0.00069
scoring_system epss
scoring_elements 0.21318
published_at 2026-04-11T12:55:00Z
7
value 0.00069
scoring_system epss
scoring_elements 0.21277
published_at 2026-04-12T12:55:00Z
8
value 0.00069
scoring_system epss
scoring_elements 0.21223
published_at 2026-04-13T12:55:00Z
9
value 0.00069
scoring_system epss
scoring_elements 0.21217
published_at 2026-04-16T12:55:00Z
10
value 0.00069
scoring_system epss
scoring_elements 0.21227
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3153
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://mail.openvswitch.org/pipermail/ovs-announce/2023-August/000327.html
reference_id 000327.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-19T14:24:33Z/
url https://mail.openvswitch.org/pipermail/ovs-announce/2023-August/000327.html
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043598
reference_id 1043598
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043598
5
reference_url https://github.com/ovn-org/ovn/issues/198
reference_id 198
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-19T14:24:33Z/
url https://github.com/ovn-org/ovn/issues/198
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2213279
reference_id 2213279
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-19T14:24:33Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2213279
7
reference_url https://mail.openvswitch.org/pipermail/ovs-dev/2023-August/407553.html
reference_id 407553.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-19T14:24:33Z/
url https://mail.openvswitch.org/pipermail/ovs-dev/2023-August/407553.html
8
reference_url https://github.com/ovn-org/ovn/commit/9a3f7ed905e525ebdcb14541e775211cbb0203bd
reference_id 9a3f7ed905e525ebdcb14541e775211cbb0203bd
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-19T14:24:33Z/
url https://github.com/ovn-org/ovn/commit/9a3f7ed905e525ebdcb14541e775211cbb0203bd
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openstack:13
reference_id cpe:/a:redhat:openstack:13
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openstack:13
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::fastdatapath
reference_id cpe:/o:redhat:enterprise_linux:7::fastdatapath
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::fastdatapath
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::fastdatapath
reference_id cpe:/o:redhat:enterprise_linux:8::fastdatapath
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::fastdatapath
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::fastdatapath
reference_id cpe:/o:redhat:enterprise_linux:9::fastdatapath
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::fastdatapath
14
reference_url https://access.redhat.com/security/cve/CVE-2023-3153
reference_id CVE-2023-3153
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-19T14:24:33Z/
url https://access.redhat.com/security/cve/CVE-2023-3153
15
reference_url https://access.redhat.com/errata/RHSA-2023:5009
reference_id RHSA-2023:5009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5009
16
reference_url https://access.redhat.com/errata/RHSA-2023:5672
reference_id RHSA-2023:5672
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5672
17
reference_url https://access.redhat.com/errata/RHSA-2023:6274
reference_id RHSA-2023:6274
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6274
fixed_packages
aliases CVE-2023-3153
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yu8r-jpxf-h3ay
Fixing_vulnerabilities
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ovn23.09@23.09.0-37%3Farch=el9fdp