Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/87571?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/87571?format=api", "purl": "pkg:rpm/redhat/kernel@5.14.0-362.13.1?arch=el9_3", "type": "rpm", "namespace": "redhat", "name": "kernel", "version": "5.14.0-362.13.1", "qualifiers": { "arch": "el9_3" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78131?format=api", "vulnerability_id": "VCID-b7em-hmb3-4yhp", "summary": "kernel: IGB driver inadequate buffer size for frames larger than MTU", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45871.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45871.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-45871", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06835", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06883", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06868", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06922", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06953", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06951", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06944", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.0694", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06875", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06858", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.07001", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06989", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06992", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06957", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06977", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.07128", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-45871" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45871", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45871" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2244723", "reference_id": "2244723", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2244723" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7734", "reference_id": "RHSA-2023:7734", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7734" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7749", "reference_id": "RHSA-2023:7749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7749" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0378", "reference_id": "RHSA-2024:0378", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0378" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0381", "reference_id": "RHSA-2024:0381", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0381" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0386", "reference_id": "RHSA-2024:0386", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0386" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0412", "reference_id": "RHSA-2024:0412", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0412" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0431", "reference_id": "RHSA-2024:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0432", "reference_id": "RHSA-2024:0432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0439", "reference_id": "RHSA-2024:0439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0439" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0448", "reference_id": "RHSA-2024:0448", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0448" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0554", "reference_id": "RHSA-2024:0554", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0554" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0562", "reference_id": "RHSA-2024:0562", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0562" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0563", "reference_id": "RHSA-2024:0563", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0563" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0575", "reference_id": "RHSA-2024:0575", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0575" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0593", "reference_id": "RHSA-2024:0593", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0593" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0876", "reference_id": "RHSA-2024:0876", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0876" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0881", "reference_id": "RHSA-2024:0881", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0881" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0897", "reference_id": "RHSA-2024:0897", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0897" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0980", "reference_id": "RHSA-2024:0980", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0980" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0999", "reference_id": "RHSA-2024:0999", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0999" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1249", "reference_id": "RHSA-2024:1249", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1249" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1268", "reference_id": "RHSA-2024:1268", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1268" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1269", "reference_id": "RHSA-2024:1269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1269" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1278", "reference_id": "RHSA-2024:1278", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1278" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1323", "reference_id": "RHSA-2024:1323", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1323" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1332", "reference_id": "RHSA-2024:1332", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1332" }, { "reference_url": "https://usn.ubuntu.com/6494-1/", "reference_id": "USN-6494-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6494-1/" }, { "reference_url": "https://usn.ubuntu.com/6494-2/", "reference_id": "USN-6494-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6494-2/" }, { "reference_url": "https://usn.ubuntu.com/6495-1/", "reference_id": "USN-6495-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6495-1/" }, { "reference_url": "https://usn.ubuntu.com/6495-2/", "reference_id": "USN-6495-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6495-2/" }, { "reference_url": "https://usn.ubuntu.com/6496-1/", "reference_id": "USN-6496-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6496-1/" }, { "reference_url": "https://usn.ubuntu.com/6496-2/", "reference_id": "USN-6496-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6496-2/" }, { "reference_url": "https://usn.ubuntu.com/6502-1/", "reference_id": "USN-6502-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6502-1/" }, { "reference_url": "https://usn.ubuntu.com/6502-2/", "reference_id": "USN-6502-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6502-2/" }, { "reference_url": "https://usn.ubuntu.com/6502-3/", "reference_id": "USN-6502-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6502-3/" }, { "reference_url": "https://usn.ubuntu.com/6502-4/", "reference_id": "USN-6502-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6502-4/" }, { "reference_url": "https://usn.ubuntu.com/6516-1/", "reference_id": "USN-6516-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6516-1/" }, { "reference_url": "https://usn.ubuntu.com/6520-1/", "reference_id": "USN-6520-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6520-1/" }, { "reference_url": "https://usn.ubuntu.com/6532-1/", "reference_id": "USN-6532-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6532-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-45871" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b7em-hmb3-4yhp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4356?format=api", "vulnerability_id": "VCID-ejbt-betu-tuaw", "summary": "x86/AMD: Speculative Return Stack Overflow", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-20569.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-20569.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-20569", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00633", "scoring_system": "epss", "scoring_elements": "0.70296", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00633", "scoring_system": "epss", "scoring_elements": "0.70313", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00633", "scoring_system": "epss", "scoring_elements": "0.70291", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00633", "scoring_system": "epss", "scoring_elements": "0.70336", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00633", "scoring_system": "epss", "scoring_elements": "0.70351", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00633", "scoring_system": "epss", "scoring_elements": "0.70374", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00633", "scoring_system": "epss", "scoring_elements": "0.70359", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00633", "scoring_system": "epss", "scoring_elements": "0.70346", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00633", "scoring_system": "epss", "scoring_elements": "0.70389", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00633", "scoring_system": "epss", "scoring_elements": "0.70398", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01954", "scoring_system": "epss", "scoring_elements": "0.83543", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01954", "scoring_system": "epss", "scoring_elements": "0.83536", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02007", "scoring_system": "epss", "scoring_elements": "0.83786", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.02007", "scoring_system": "epss", "scoring_elements": "0.83807", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.02007", "scoring_system": "epss", "scoring_elements": "0.83764", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02007", "scoring_system": "epss", "scoring_elements": "0.83724", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-20569" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20569", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20569" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2207625", "reference_id": "2207625", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2207625" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6595", "reference_id": "RHSA-2023:6595", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6595" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7109", "reference_id": "RHSA-2023:7109", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7109" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7244", "reference_id": "RHSA-2023:7244", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7244" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7401", "reference_id": "RHSA-2023:7401", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7401" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7513", "reference_id": "RHSA-2023:7513", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7513" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7749", "reference_id": "RHSA-2023:7749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7749" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7782", "reference_id": "RHSA-2023:7782", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0113", "reference_id": "RHSA-2024:0113", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0113" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0134", "reference_id": "RHSA-2024:0134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0433", "reference_id": "RHSA-2024:0433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0439", "reference_id": "RHSA-2024:0439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0439" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0448", "reference_id": "RHSA-2024:0448", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0448" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0449", "reference_id": "RHSA-2024:0449", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0449" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0561", "reference_id": "RHSA-2024:0561", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0561" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0724", "reference_id": "RHSA-2024:0724", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0724" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2005", "reference_id": "RHSA-2024:2005", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2005" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5255", "reference_id": "RHSA-2024:5255", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5255" }, { "reference_url": "https://usn.ubuntu.com/6319-1/", "reference_id": "USN-6319-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6319-1/" }, { "reference_url": "https://usn.ubuntu.com/6412-1/", "reference_id": "USN-6412-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6412-1/" }, { "reference_url": "https://usn.ubuntu.com/6415-1/", "reference_id": "USN-6415-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6415-1/" }, { "reference_url": "https://usn.ubuntu.com/6416-1/", "reference_id": "USN-6416-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6416-1/" }, { "reference_url": "https://usn.ubuntu.com/6416-2/", "reference_id": "USN-6416-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6416-2/" }, { "reference_url": "https://usn.ubuntu.com/6416-3/", "reference_id": "USN-6416-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6416-3/" }, { "reference_url": "https://usn.ubuntu.com/6445-1/", "reference_id": "USN-6445-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6445-1/" }, { "reference_url": "https://usn.ubuntu.com/6445-2/", "reference_id": "USN-6445-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6445-2/" }, { "reference_url": "https://usn.ubuntu.com/6466-1/", "reference_id": "USN-6466-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6466-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-434.html", "reference_id": "XSA-434", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-434.html" } ], "fixed_packages": [], "aliases": [ "CVE-2023-20569", "XSA-434" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ejbt-betu-tuaw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65559?format=api", "vulnerability_id": "VCID-ejyg-b2cr-73gc", "summary": "kernel: x86/sev: Make enc_dec_hypercall() accept a size instead of npages", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53996.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53996.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53996", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.0316", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.0317", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03173", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03178", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03203", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03162", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03136", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03122", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03098", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03105", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03225", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05422", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05387", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05386", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05377", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53996" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424944", "reference_id": "2424944", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2424944" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7749", "reference_id": "RHSA-2023:7749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7749" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0575", "reference_id": "RHSA-2024:0575", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0575" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3138", "reference_id": "RHSA-2024:3138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3138" } ], "fixed_packages": [], "aliases": [ "CVE-2023-53996" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ejyg-b2cr-73gc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67029?format=api", "vulnerability_id": "VCID-fm9q-u17m-dqbu", "summary": "kernel: ice: Don't tx before switchdev is fully configured", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53657.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53657.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53657", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01826", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01838", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.0184", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01843", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01857", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01844", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01829", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01824", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.0188", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01876", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01915", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01807", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01806", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01887", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02262", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02266", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53657" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402281", "reference_id": "2402281", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402281" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7557", "reference_id": "RHSA-2023:7557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7749", "reference_id": "RHSA-2023:7749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7749" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2394", "reference_id": "RHSA-2024:2394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3138", "reference_id": "RHSA-2024:3138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3138" } ], "fixed_packages": [], "aliases": [ "CVE-2023-53657" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fm9q-u17m-dqbu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65264?format=api", "vulnerability_id": "VCID-hctp-1qet-vqdp", "summary": "kernel: keys: Fix linking a duplicate key to a keyring's assoc_array", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54170.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-54170.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54170", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10911", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10975", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.108", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10876", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10929", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.1093", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10897", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10747", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10834", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10793", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10874", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10734", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14443", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14308", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-54170" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54170", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54170" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426038", "reference_id": "2426038", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426038" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7749", "reference_id": "RHSA-2023:7749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7749" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2394", "reference_id": "RHSA-2024:2394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3618", "reference_id": "RHSA-2024:3618", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3618" } ], "fixed_packages": [], "aliases": [ "CVE-2023-54170" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hctp-1qet-vqdp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78984?format=api", "vulnerability_id": "VCID-hxjx-3the-x3ff", "summary": "kernel: use-after-free in smb2_is_status_io_timeout()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1192.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1192.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1192", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.0742", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07188", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07189", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07315", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07274", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07282", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07254", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07233", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07212", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07266", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07293", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07289", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07275", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07265", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07194", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1192" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1192", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1192" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154178", "reference_id": "2154178", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-26T21:48:41Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154178" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8", "reference_id": "cpe:/o:redhat:enterprise_linux:8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9", "reference_id": "cpe:/o:redhat:enterprise_linux:9", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2023-1192", "reference_id": "CVE-2023-1192", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-26T21:48:41Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2023-1192" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d527f51331cace562393a8038d870b3e9916686f", "reference_id": "?id=d527f51331cace562393a8038d870b3e9916686f", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-26T21:48:41Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d527f51331cace562393a8038d870b3e9916686f" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7539", "reference_id": "RHSA-2023:7539", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7539" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7548", "reference_id": "RHSA-2023:7548", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7548" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7549", "reference_id": "RHSA-2023:7549", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7549" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7749", "reference_id": "RHSA-2023:7749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7749" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0412", "reference_id": "RHSA-2024:0412", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0412" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0439", "reference_id": "RHSA-2024:0439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0439" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0448", "reference_id": "RHSA-2024:0448", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0448" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0562", "reference_id": "RHSA-2024:0562", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0562" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0563", "reference_id": "RHSA-2024:0563", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0563" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1250", "reference_id": "RHSA-2024:1250", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1250" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1306", "reference_id": "RHSA-2024:1306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2006", "reference_id": "RHSA-2024:2006", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2006" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2008", "reference_id": "RHSA-2024:2008", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2008" } ], "fixed_packages": [], "aliases": [ "CVE-2023-1192" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hxjx-3the-x3ff" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78049?format=api", "vulnerability_id": "VCID-sqn8-7syw-e7gb", "summary": "kernel: use-after-free vulnerability in the smb client component", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5345.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5345.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5345", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.0717", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06979", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.07011", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.07015", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.07005", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06998", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06937", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06921", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.07056", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.0704", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.07043", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.07022", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.0689", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.0694", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06924", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5345" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242172", "reference_id": "2242172", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242172" }, { "reference_url": "https://kernel.dance/e6e43b8aa7cd3c3af686caf0c2e11819a886d705", "reference_id": "e6e43b8aa7cd3c3af686caf0c2e11819a886d705", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-26T21:50:50Z/" } ], "url": "https://kernel.dance/e6e43b8aa7cd3c3af686caf0c2e11819a886d705" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GISYSL3F6WIEVGHJGLC2MFNTUXHPTKQH/", "reference_id": "GISYSL3F6WIEVGHJGLC2MFNTUXHPTKQH", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-26T21:50:50Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GISYSL3F6WIEVGHJGLC2MFNTUXHPTKQH/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GPMICQ2HVZO5UAM5KPXHAZKA2U3ZDOO6/", "reference_id": "GPMICQ2HVZO5UAM5KPXHAZKA2U3ZDOO6", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-26T21:50:50Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GPMICQ2HVZO5UAM5KPXHAZKA2U3ZDOO6/" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e6e43b8aa7cd3c3af686caf0c2e11819a886d705", "reference_id": "?id=e6e43b8aa7cd3c3af686caf0c2e11819a886d705", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-26T21:50:50Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e6e43b8aa7cd3c3af686caf0c2e11819a886d705" }, { "reference_url": "http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html", "reference_id": "Kernel-Live-Patch-Security-Notice-LSN-0100-1.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-26T21:50:50Z/" } ], "url": "http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7734", "reference_id": "RHSA-2023:7734", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7734" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7749", "reference_id": "RHSA-2023:7749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7749" }, { "reference_url": "https://usn.ubuntu.com/6461-1/", "reference_id": "USN-6461-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6461-1/" }, { "reference_url": "https://usn.ubuntu.com/6502-1/", "reference_id": "USN-6502-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6502-1/" }, { "reference_url": "https://usn.ubuntu.com/6502-2/", "reference_id": "USN-6502-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6502-2/" }, { "reference_url": "https://usn.ubuntu.com/6502-3/", "reference_id": "USN-6502-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6502-3/" }, { "reference_url": "https://usn.ubuntu.com/6502-4/", "reference_id": "USN-6502-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6502-4/" }, { "reference_url": "https://usn.ubuntu.com/6503-1/", "reference_id": "USN-6503-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6503-1/" }, { "reference_url": "https://usn.ubuntu.com/6520-1/", "reference_id": "USN-6520-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6520-1/" }, { "reference_url": "https://usn.ubuntu.com/6537-1/", "reference_id": "USN-6537-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6537-1/" }, { "reference_url": "https://usn.ubuntu.com/6572-1/", "reference_id": "USN-6572-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6572-1/" }, { "reference_url": "https://usn.ubuntu.com/6607-1/", "reference_id": "USN-6607-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6607-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V5PDNWPKAP3WL5RQZ4RIDS6MG32OHH5R/", "reference_id": "V5PDNWPKAP3WL5RQZ4RIDS6MG32OHH5R", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-26T21:50:50Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V5PDNWPKAP3WL5RQZ4RIDS6MG32OHH5R/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-5345" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sqn8-7syw-e7gb" } ], "fixing_vulnerabilities": [], "risk_score": "3.5", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@5.14.0-362.13.1%3Farch=el9_3" }