{"url":"http://public2.vulnerablecode.io/api/packages/87575?format=json","purl":"pkg:rpm/redhat/kernel-rt@5.14.0-284.48.1.rt14.333?arch=el9_2","type":"rpm","namespace":"redhat","name":"kernel-rt","version":"5.14.0-284.48.1.rt14.333","qualifiers":{"arch":"el9_2"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78053?format=json","vulnerability_id":"VCID-38ja-dsj5-qyfc","summary":"kernel: eBPF: insufficient stack type checks in dynptr","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39191.json","reference_id":"","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39191.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-39191","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01611","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02697","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02675","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02678","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02693","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0272","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02689","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.027","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03517","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03349","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03362","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03479","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03465","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03471","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-39191"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2226783","reference_id":"2226783","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-26T21:50:31Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2226783"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv","reference_id":"cpe:/a:redhat:enterprise_linux:9::nfv","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::nfv"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime","reference_id":"cpe:/a:redhat:enterprise_linux:9::realtime","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::realtime"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb","reference_id":"cpe:/a:redhat:rhel_eus:9.2::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv","reference_id":"cpe:/a:redhat:rhel_eus:9.2::nfv","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::nfv"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime","reference_id":"cpe:/a:redhat:rhel_eus:9.2::realtime","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::realtime"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:9::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos","reference_id":"cpe:/o:redhat:rhel_eus:9.2::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-39191","reference_id":"CVE-2023-39191","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-26T21:50:31Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-39191"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-26T21:50:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0381","reference_id":"RHSA-2024:0381","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-26T21:50:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0439","reference_id":"RHSA-2024:0439","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-26T21:50:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0448","reference_id":"RHSA-2024:0448","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-26T21:50:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0448"},{"reference_url":"https://www.zerodayinitiative.com/advisories/ZDI-CAN-19399/","reference_id":"ZDI-CAN-19399","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-26T21:50:31Z/"}],"url":"https://www.zerodayinitiative.com/advisories/ZDI-CAN-19399/"}],"fixed_packages":[],"aliases":["CVE-2023-39191"],"risk_score":3.7,"exploitability":"0.5","weighted_severity":"7.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-38ja-dsj5-qyfc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79543?format=json","vulnerability_id":"VCID-3nwm-cb6f-vkbv","summary":"kernel: null-ptr-deref vulnerabilities in sl_tx_timeout in drivers/net/slip","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41858.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41858.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-41858","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02761","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.029","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02738","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0275","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02861","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02855","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02843","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02776","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02783","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02787","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02806","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02777","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02758","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02754","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-41858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41858"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2144379","reference_id":"2144379","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2144379"},{"reference_url":"https://github.com/torvalds/linux/commit/ec4eb8a86ade4d22633e1da2a7d85a846b7d1798","reference_id":"ec4eb8a86ade4d22633e1da2a7d85a846b7d1798","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-07T16:46:04Z/"}],"url":"https://github.com/torvalds/linux/commit/ec4eb8a86ade4d22633e1da2a7d85a846b7d1798"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230223-0006/","reference_id":"ntap-20230223-0006","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-07T16:46:04Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230223-0006/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0431","reference_id":"RHSA-2024:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0432","reference_id":"RHSA-2024:0432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0439","reference_id":"RHSA-2024:0439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0448","reference_id":"RHSA-2024:0448","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0448"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0461","reference_id":"RHSA-2024:0461","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0461"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0881","reference_id":"RHSA-2024:0881","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0881"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0897","reference_id":"RHSA-2024:0897","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0897"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1268","reference_id":"RHSA-2024:1268","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1268"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1269","reference_id":"RHSA-2024:1269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1269"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1367","reference_id":"RHSA-2024:1367","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1367"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1382","reference_id":"RHSA-2024:1382","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1382"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1404"},{"reference_url":"https://usn.ubuntu.com/5884-1/","reference_id":"USN-5884-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5884-1/"},{"reference_url":"https://usn.ubuntu.com/5926-1/","reference_id":"USN-5926-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5926-1/"}],"fixed_packages":[],"aliases":["CVE-2022-41858"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3nwm-cb6f-vkbv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77992?format=json","vulnerability_id":"VCID-41ut-8u7g-fbhm","summary":"kernel: A heap out-of-bounds write when function perf_read_group is called and sibling_list is smaller than its child's sibling_list","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5717.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5717.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5717","reference_id":"","reference_type":"","scores":[{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45862","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45918","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45915","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45938","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45908","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45916","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45968","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45963","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00236","scoring_system":"epss","scoring_elements":"0.46514","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46931","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.4843","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48442","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48389","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48444","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5717"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2246945","reference_id":"2246945","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2246945"},{"reference_url":"https://kernel.dance/32671e3799ca2e4590773fd0e63aaa4229e50c06","reference_id":"32671e3799ca2e4590773fd0e63aaa4229e50c06","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:16Z/"}],"url":"https://kernel.dance/32671e3799ca2e4590773fd0e63aaa4229e50c06"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/events?id=32671e3799ca2e4590773fd0e63aaa4229e50c06","reference_id":"events?id=32671e3799ca2e4590773fd0e63aaa4229e50c06","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:16Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/events?id=32671e3799ca2e4590773fd0e63aaa4229e50c06"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html","reference_id":"msg00004.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:16Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:16Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0439","reference_id":"RHSA-2024:0439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0448","reference_id":"RHSA-2024:0448","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0448"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0881","reference_id":"RHSA-2024:0881","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0881"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0897","reference_id":"RHSA-2024:0897","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0897"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1248","reference_id":"RHSA-2024:1248","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1248"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1250","reference_id":"RHSA-2024:1250","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1250"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1306","reference_id":"RHSA-2024:1306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2094","reference_id":"RHSA-2024:2094","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2094"},{"reference_url":"https://usn.ubuntu.com/6494-1/","reference_id":"USN-6494-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6494-1/"},{"reference_url":"https://usn.ubuntu.com/6494-2/","reference_id":"USN-6494-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6494-2/"},{"reference_url":"https://usn.ubuntu.com/6497-1/","reference_id":"USN-6497-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6497-1/"},{"reference_url":"https://usn.ubuntu.com/6532-1/","reference_id":"USN-6532-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6532-1/"},{"reference_url":"https://usn.ubuntu.com/6534-1/","reference_id":"USN-6534-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6534-1/"},{"reference_url":"https://usn.ubuntu.com/6534-2/","reference_id":"USN-6534-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6534-2/"},{"reference_url":"https://usn.ubuntu.com/6534-3/","reference_id":"USN-6534-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6534-3/"},{"reference_url":"https://usn.ubuntu.com/6536-1/","reference_id":"USN-6536-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6536-1/"},{"reference_url":"https://usn.ubuntu.com/6537-1/","reference_id":"USN-6537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6537-1/"},{"reference_url":"https://usn.ubuntu.com/6548-1/","reference_id":"USN-6548-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6548-1/"},{"reference_url":"https://usn.ubuntu.com/6548-2/","reference_id":"USN-6548-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6548-2/"},{"reference_url":"https://usn.ubuntu.com/6548-3/","reference_id":"USN-6548-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6548-3/"},{"reference_url":"https://usn.ubuntu.com/6548-4/","reference_id":"USN-6548-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6548-4/"},{"reference_url":"https://usn.ubuntu.com/6548-5/","reference_id":"USN-6548-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6548-5/"},{"reference_url":"https://usn.ubuntu.com/6549-1/","reference_id":"USN-6549-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6549-1/"},{"reference_url":"https://usn.ubuntu.com/6549-2/","reference_id":"USN-6549-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6549-2/"},{"reference_url":"https://usn.ubuntu.com/6549-3/","reference_id":"USN-6549-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6549-3/"},{"reference_url":"https://usn.ubuntu.com/6549-4/","reference_id":"USN-6549-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6549-4/"},{"reference_url":"https://usn.ubuntu.com/6549-5/","reference_id":"USN-6549-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6549-5/"},{"reference_url":"https://usn.ubuntu.com/6573-1/","reference_id":"USN-6573-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6573-1/"},{"reference_url":"https://usn.ubuntu.com/6635-1/","reference_id":"USN-6635-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6635-1/"}],"fixed_packages":[],"aliases":["CVE-2023-5717"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-41ut-8u7g-fbhm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78097?format=json","vulnerability_id":"VCID-67cs-sdpc-t7f1","summary":"kernel: use after free in nft_immediate_deactivate","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4015.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4015.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4015","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06966","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0701","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06998","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07001","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07579","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09627","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09635","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09605","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09589","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09479","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09503","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09578","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09541","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09591","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4015"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2237752","reference_id":"2237752","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2237752"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0439","reference_id":"RHSA-2024:0439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0448","reference_id":"RHSA-2024:0448","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0448"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0461","reference_id":"RHSA-2024:0461","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0461"},{"reference_url":"https://usn.ubuntu.com/6315-1/","reference_id":"USN-6315-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6315-1/"},{"reference_url":"https://usn.ubuntu.com/6316-1/","reference_id":"USN-6316-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6316-1/"},{"reference_url":"https://usn.ubuntu.com/6318-1/","reference_id":"USN-6318-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6318-1/"},{"reference_url":"https://usn.ubuntu.com/6321-1/","reference_id":"USN-6321-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6321-1/"},{"reference_url":"https://usn.ubuntu.com/6325-1/","reference_id":"USN-6325-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6325-1/"},{"reference_url":"https://usn.ubuntu.com/6328-1/","reference_id":"USN-6328-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6328-1/"},{"reference_url":"https://usn.ubuntu.com/6330-1/","reference_id":"USN-6330-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6330-1/"},{"reference_url":"https://usn.ubuntu.com/6332-1/","reference_id":"USN-6332-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6332-1/"},{"reference_url":"https://usn.ubuntu.com/6348-1/","reference_id":"USN-6348-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6348-1/"},{"reference_url":"https://usn.ubuntu.com/6385-1/","reference_id":"USN-6385-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6385-1/"}],"fixed_packages":[],"aliases":["CVE-2023-4015"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-67cs-sdpc-t7f1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78473?format=json","vulnerability_id":"VCID-ae5d-jmsc-9ba5","summary":"kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2163.json","reference_id":"","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2163.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2163","reference_id":"","reference_type":"","scores":[{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40695","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40719","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40723","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40646","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40696","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40702","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40685","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43274","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43405","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43339","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43272","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43196","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43357","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43416","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2163"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2163","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2163"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2240249","reference_id":"2240249","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2240249"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=71b547f561247897a0a14f3082730156c0533fed","reference_id":"?id=71b547f561247897a0a14f3082730156c0533fed","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-02-26T21:50:53Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=71b547f561247897a0a14f3082730156c0533fed"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7548","reference_id":"RHSA-2023:7548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7549","reference_id":"RHSA-2023:7549","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7549"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7554","reference_id":"RHSA-2023:7554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0376","reference_id":"RHSA-2024:0376","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0376"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0378","reference_id":"RHSA-2024:0378","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0378"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0381","reference_id":"RHSA-2024:0381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0402","reference_id":"RHSA-2024:0402","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0402"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0403","reference_id":"RHSA-2024:0403","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0403"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0439","reference_id":"RHSA-2024:0439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0448","reference_id":"RHSA-2024:0448","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0448"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0554","reference_id":"RHSA-2024:0554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0562","reference_id":"RHSA-2024:0562","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0562"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0563","reference_id":"RHSA-2024:0563","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0563"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0593","reference_id":"RHSA-2024:0593","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0593"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1250","reference_id":"RHSA-2024:1250","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1250"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1253","reference_id":"RHSA-2024:1253","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1253"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1306","reference_id":"RHSA-2024:1306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1306"},{"reference_url":"https://usn.ubuntu.com/6300-1/","reference_id":"USN-6300-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6300-1/"},{"reference_url":"https://usn.ubuntu.com/6311-1/","reference_id":"USN-6311-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6311-1/"},{"reference_url":"https://usn.ubuntu.com/6332-1/","reference_id":"USN-6332-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6332-1/"},{"reference_url":"https://usn.ubuntu.com/6340-1/","reference_id":"USN-6340-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6340-1/"},{"reference_url":"https://usn.ubuntu.com/6340-2/","reference_id":"USN-6340-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6340-2/"},{"reference_url":"https://usn.ubuntu.com/6347-1/","reference_id":"USN-6347-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6347-1/"},{"reference_url":"https://usn.ubuntu.com/6349-1/","reference_id":"USN-6349-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6349-1/"},{"reference_url":"https://usn.ubuntu.com/6357-1/","reference_id":"USN-6357-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6357-1/"},{"reference_url":"https://usn.ubuntu.com/6385-1/","reference_id":"USN-6385-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6385-1/"},{"reference_url":"https://usn.ubuntu.com/6397-1/","reference_id":"USN-6397-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6397-1/"}],"fixed_packages":[],"aliases":["CVE-2023-2163"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ae5d-jmsc-9ba5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79133?format=json","vulnerability_id":"VCID-ap5s-w9uk-zff3","summary":"kernel: nfp: use-after-free in area_cache_get()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3545.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3545.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3545","reference_id":"","reference_type":"","scores":[{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04298","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04102","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0411","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04232","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04244","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04263","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04114","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04133","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04149","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04181","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04195","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04174","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04157","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04131","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3545"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2161310","reference_id":"2161310","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2161310"},{"reference_url":"https://security.archlinux.org/AVG-2834","reference_id":"AVG-2834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2834"},{"reference_url":"https://security.archlinux.org/AVG-2835","reference_id":"AVG-2835","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2835"},{"reference_url":"https://security.archlinux.org/AVG-2836","reference_id":"AVG-2836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2836"},{"reference_url":"https://security.archlinux.org/AVG-2837","reference_id":"AVG-2837","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2837"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0439","reference_id":"RHSA-2024:0439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0448","reference_id":"RHSA-2024:0448","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0448"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0461","reference_id":"RHSA-2024:0461","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0461"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0881","reference_id":"RHSA-2024:0881","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0881"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0897","reference_id":"RHSA-2024:0897","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0897"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1250","reference_id":"RHSA-2024:1250","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1250"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1268","reference_id":"RHSA-2024:1268","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1268"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1269","reference_id":"RHSA-2024:1269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1269"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1306","reference_id":"RHSA-2024:1306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1367","reference_id":"RHSA-2024:1367","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1367"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1382","reference_id":"RHSA-2024:1382","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1382"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1404"},{"reference_url":"https://usn.ubuntu.com/5858-1/","reference_id":"USN-5858-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5858-1/"},{"reference_url":"https://usn.ubuntu.com/5859-1/","reference_id":"USN-5859-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5859-1/"},{"reference_url":"https://usn.ubuntu.com/5883-1/","reference_id":"USN-5883-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5883-1/"},{"reference_url":"https://usn.ubuntu.com/5911-1/","reference_id":"USN-5911-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5911-1/"},{"reference_url":"https://usn.ubuntu.com/5912-1/","reference_id":"USN-5912-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5912-1/"},{"reference_url":"https://usn.ubuntu.com/5917-1/","reference_id":"USN-5917-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5917-1/"},{"reference_url":"https://usn.ubuntu.com/5919-1/","reference_id":"USN-5919-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5919-1/"},{"reference_url":"https://usn.ubuntu.com/5920-1/","reference_id":"USN-5920-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5920-1/"},{"reference_url":"https://usn.ubuntu.com/5924-1/","reference_id":"USN-5924-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5924-1/"},{"reference_url":"https://usn.ubuntu.com/5925-1/","reference_id":"USN-5925-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5925-1/"},{"reference_url":"https://usn.ubuntu.com/5927-1/","reference_id":"USN-5927-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5927-1/"},{"reference_url":"https://usn.ubuntu.com/5929-1/","reference_id":"USN-5929-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5929-1/"},{"reference_url":"https://usn.ubuntu.com/5934-1/","reference_id":"USN-5934-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5934-1/"},{"reference_url":"https://usn.ubuntu.com/5935-1/","reference_id":"USN-5935-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5935-1/"},{"reference_url":"https://usn.ubuntu.com/5938-1/","reference_id":"USN-5938-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5938-1/"},{"reference_url":"https://usn.ubuntu.com/5939-1/","reference_id":"USN-5939-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5939-1/"},{"reference_url":"https://usn.ubuntu.com/5940-1/","reference_id":"USN-5940-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5940-1/"},{"reference_url":"https://usn.ubuntu.com/5941-1/","reference_id":"USN-5941-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5941-1/"},{"reference_url":"https://usn.ubuntu.com/5950-1/","reference_id":"USN-5950-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5950-1/"},{"reference_url":"https://usn.ubuntu.com/5951-1/","reference_id":"USN-5951-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5951-1/"},{"reference_url":"https://usn.ubuntu.com/5962-1/","reference_id":"USN-5962-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5962-1/"},{"reference_url":"https://usn.ubuntu.com/5975-1/","reference_id":"USN-5975-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5975-1/"},{"reference_url":"https://usn.ubuntu.com/6000-1/","reference_id":"USN-6000-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6000-1/"},{"reference_url":"https://usn.ubuntu.com/6007-1/","reference_id":"USN-6007-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6007-1/"}],"fixed_packages":[],"aliases":["CVE-2022-3545"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ap5s-w9uk-zff3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78131?format=json","vulnerability_id":"VCID-b7em-hmb3-4yhp","summary":"kernel: IGB driver inadequate buffer size for frames larger than MTU","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45871.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45871.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-45871","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06835","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06883","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06868","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06922","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06953","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06951","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06944","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0694","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06875","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06858","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07001","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06989","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06992","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06957","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-45871"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45871"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2244723","reference_id":"2244723","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2244723"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7734","reference_id":"RHSA-2023:7734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7749","reference_id":"RHSA-2023:7749","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7749"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0378","reference_id":"RHSA-2024:0378","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0378"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0381","reference_id":"RHSA-2024:0381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0386","reference_id":"RHSA-2024:0386","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0386"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0431","reference_id":"RHSA-2024:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0432","reference_id":"RHSA-2024:0432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0439","reference_id":"RHSA-2024:0439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0448","reference_id":"RHSA-2024:0448","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0448"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0554","reference_id":"RHSA-2024:0554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0562","reference_id":"RHSA-2024:0562","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0562"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0563","reference_id":"RHSA-2024:0563","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0563"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0593","reference_id":"RHSA-2024:0593","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0593"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0876","reference_id":"RHSA-2024:0876","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0876"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0881","reference_id":"RHSA-2024:0881","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0881"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0897","reference_id":"RHSA-2024:0897","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0897"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0980","reference_id":"RHSA-2024:0980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0980"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0999","reference_id":"RHSA-2024:0999","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0999"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1249","reference_id":"RHSA-2024:1249","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1249"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1268","reference_id":"RHSA-2024:1268","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1268"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1269","reference_id":"RHSA-2024:1269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1269"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1278","reference_id":"RHSA-2024:1278","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1278"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1323","reference_id":"RHSA-2024:1323","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1323"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1332","reference_id":"RHSA-2024:1332","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1332"},{"reference_url":"https://usn.ubuntu.com/6494-1/","reference_id":"USN-6494-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6494-1/"},{"reference_url":"https://usn.ubuntu.com/6494-2/","reference_id":"USN-6494-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6494-2/"},{"reference_url":"https://usn.ubuntu.com/6495-1/","reference_id":"USN-6495-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6495-1/"},{"reference_url":"https://usn.ubuntu.com/6495-2/","reference_id":"USN-6495-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6495-2/"},{"reference_url":"https://usn.ubuntu.com/6496-1/","reference_id":"USN-6496-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6496-1/"},{"reference_url":"https://usn.ubuntu.com/6496-2/","reference_id":"USN-6496-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6496-2/"},{"reference_url":"https://usn.ubuntu.com/6502-1/","reference_id":"USN-6502-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6502-1/"},{"reference_url":"https://usn.ubuntu.com/6502-2/","reference_id":"USN-6502-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6502-2/"},{"reference_url":"https://usn.ubuntu.com/6502-3/","reference_id":"USN-6502-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6502-3/"},{"reference_url":"https://usn.ubuntu.com/6502-4/","reference_id":"USN-6502-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6502-4/"},{"reference_url":"https://usn.ubuntu.com/6516-1/","reference_id":"USN-6516-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6516-1/"},{"reference_url":"https://usn.ubuntu.com/6520-1/","reference_id":"USN-6520-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6520-1/"},{"reference_url":"https://usn.ubuntu.com/6532-1/","reference_id":"USN-6532-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6532-1/"}],"fixed_packages":[],"aliases":["CVE-2023-45871"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b7em-hmb3-4yhp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4356?format=json","vulnerability_id":"VCID-ejbt-betu-tuaw","summary":"x86/AMD: Speculative Return Stack Overflow","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-20569.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-20569.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-20569","reference_id":"","reference_type":"","scores":[{"value":"0.00633","scoring_system":"epss","scoring_elements":"0.70296","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00633","scoring_system":"epss","scoring_elements":"0.70313","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00633","scoring_system":"epss","scoring_elements":"0.70291","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00633","scoring_system":"epss","scoring_elements":"0.70336","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00633","scoring_system":"epss","scoring_elements":"0.70351","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00633","scoring_system":"epss","scoring_elements":"0.70374","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00633","scoring_system":"epss","scoring_elements":"0.70359","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00633","scoring_system":"epss","scoring_elements":"0.70346","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00633","scoring_system":"epss","scoring_elements":"0.70389","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00633","scoring_system":"epss","scoring_elements":"0.70398","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01954","scoring_system":"epss","scoring_elements":"0.83536","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01954","scoring_system":"epss","scoring_elements":"0.83543","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02007","scoring_system":"epss","scoring_elements":"0.83764","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02007","scoring_system":"epss","scoring_elements":"0.83724","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-20569"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20569","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20569"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2207625","reference_id":"2207625","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2207625"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6595","reference_id":"RHSA-2023:6595","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6595"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7109","reference_id":"RHSA-2023:7109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7244","reference_id":"RHSA-2023:7244","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7244"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7401","reference_id":"RHSA-2023:7401","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7401"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7513","reference_id":"RHSA-2023:7513","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7513"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7749","reference_id":"RHSA-2023:7749","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7749"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7782","reference_id":"RHSA-2023:7782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0113","reference_id":"RHSA-2024:0113","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0113"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0134","reference_id":"RHSA-2024:0134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0433","reference_id":"RHSA-2024:0433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0439","reference_id":"RHSA-2024:0439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0448","reference_id":"RHSA-2024:0448","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0448"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0449","reference_id":"RHSA-2024:0449","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0449"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0561","reference_id":"RHSA-2024:0561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2005","reference_id":"RHSA-2024:2005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5255","reference_id":"RHSA-2024:5255","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5255"},{"reference_url":"https://usn.ubuntu.com/6319-1/","reference_id":"USN-6319-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6319-1/"},{"reference_url":"https://usn.ubuntu.com/6412-1/","reference_id":"USN-6412-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6412-1/"},{"reference_url":"https://usn.ubuntu.com/6415-1/","reference_id":"USN-6415-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6415-1/"},{"reference_url":"https://usn.ubuntu.com/6416-1/","reference_id":"USN-6416-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6416-1/"},{"reference_url":"https://usn.ubuntu.com/6416-2/","reference_id":"USN-6416-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6416-2/"},{"reference_url":"https://usn.ubuntu.com/6416-3/","reference_id":"USN-6416-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6416-3/"},{"reference_url":"https://usn.ubuntu.com/6445-1/","reference_id":"USN-6445-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6445-1/"},{"reference_url":"https://usn.ubuntu.com/6445-2/","reference_id":"USN-6445-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6445-2/"},{"reference_url":"https://usn.ubuntu.com/6466-1/","reference_id":"USN-6466-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6466-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-434.html","reference_id":"XSA-434","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-434.html"}],"fixed_packages":[],"aliases":["CVE-2023-20569","XSA-434"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ejbt-betu-tuaw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78181?format=json","vulnerability_id":"VCID-fhep-d1cx-kqh9","summary":"kernel: use-after-free in l2cap_sock_release in net/bluetooth/l2cap_sock.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40283.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40283.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-40283","reference_id":"","reference_type":"","scores":[{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01279","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01283","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01293","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01298","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01302","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01278","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.0128","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01272","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01285","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.0136","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01367","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01373","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01371","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-40283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231800","reference_id":"2231800","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231800"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0439","reference_id":"RHSA-2024:0439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0448","reference_id":"RHSA-2024:0448","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0448"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0461","reference_id":"RHSA-2024:0461","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0461"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0881","reference_id":"RHSA-2024:0881","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0881"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0897","reference_id":"RHSA-2024:0897","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0897"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1250","reference_id":"RHSA-2024:1250","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1250"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1268","reference_id":"RHSA-2024:1268","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1268"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1269","reference_id":"RHSA-2024:1269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1269"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1306","reference_id":"RHSA-2024:1306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1404"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2582","reference_id":"RHSA-2024:2582","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2582"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2585","reference_id":"RHSA-2024:2585","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2585"},{"reference_url":"https://usn.ubuntu.com/6343-1/","reference_id":"USN-6343-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6343-1/"},{"reference_url":"https://usn.ubuntu.com/6383-1/","reference_id":"USN-6383-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6383-1/"},{"reference_url":"https://usn.ubuntu.com/6385-1/","reference_id":"USN-6385-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6385-1/"},{"reference_url":"https://usn.ubuntu.com/6386-1/","reference_id":"USN-6386-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6386-1/"},{"reference_url":"https://usn.ubuntu.com/6386-2/","reference_id":"USN-6386-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6386-2/"},{"reference_url":"https://usn.ubuntu.com/6386-3/","reference_id":"USN-6386-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6386-3/"},{"reference_url":"https://usn.ubuntu.com/6387-1/","reference_id":"USN-6387-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6387-1/"},{"reference_url":"https://usn.ubuntu.com/6387-2/","reference_id":"USN-6387-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6387-2/"},{"reference_url":"https://usn.ubuntu.com/6388-1/","reference_id":"USN-6388-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6388-1/"},{"reference_url":"https://usn.ubuntu.com/6396-1/","reference_id":"USN-6396-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6396-1/"},{"reference_url":"https://usn.ubuntu.com/6396-2/","reference_id":"USN-6396-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6396-2/"},{"reference_url":"https://usn.ubuntu.com/6396-3/","reference_id":"USN-6396-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6396-3/"},{"reference_url":"https://usn.ubuntu.com/6466-1/","reference_id":"USN-6466-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6466-1/"}],"fixed_packages":[],"aliases":["CVE-2023-40283"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fhep-d1cx-kqh9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78099?format=json","vulnerability_id":"VCID-gpry-jhh3-byed","summary":"kernel: use after free in unix_stream_sendpage","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4622.json","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4622.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4622","reference_id":"","reference_type":"","scores":[{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13259","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13378","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13382","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13363","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14066","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17557","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17708","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17663","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17612","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19524","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19657","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19604","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19751","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19803","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4622"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2237760","reference_id":"2237760","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2237760"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0089","reference_id":"RHSA-2024:0089","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0089"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0113","reference_id":"RHSA-2024:0113","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0113"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0134","reference_id":"RHSA-2024:0134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0340","reference_id":"RHSA-2024:0340","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0340"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0376","reference_id":"RHSA-2024:0376","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0376"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0378","reference_id":"RHSA-2024:0378","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0378"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0381","reference_id":"RHSA-2024:0381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0402","reference_id":"RHSA-2024:0402","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0402"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0403","reference_id":"RHSA-2024:0403","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0403"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0439","reference_id":"RHSA-2024:0439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0448","reference_id":"RHSA-2024:0448","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0448"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0461","reference_id":"RHSA-2024:0461","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0461"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0554","reference_id":"RHSA-2024:0554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0562","reference_id":"RHSA-2024:0562","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0562"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0563","reference_id":"RHSA-2024:0563","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0563"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0593","reference_id":"RHSA-2024:0593","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0593"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1250","reference_id":"RHSA-2024:1250","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1250"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1253","reference_id":"RHSA-2024:1253","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1253"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1306","reference_id":"RHSA-2024:1306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1960","reference_id":"RHSA-2024:1960","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1960"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2003","reference_id":"RHSA-2024:2003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2004","reference_id":"RHSA-2024:2004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5261","reference_id":"RHSA-2024:5261","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5261"},{"reference_url":"https://usn.ubuntu.com/6415-1/","reference_id":"USN-6415-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6415-1/"},{"reference_url":"https://usn.ubuntu.com/6439-1/","reference_id":"USN-6439-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6439-1/"},{"reference_url":"https://usn.ubuntu.com/6439-2/","reference_id":"USN-6439-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6439-2/"},{"reference_url":"https://usn.ubuntu.com/6440-1/","reference_id":"USN-6440-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6440-1/"},{"reference_url":"https://usn.ubuntu.com/6440-2/","reference_id":"USN-6440-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6440-2/"},{"reference_url":"https://usn.ubuntu.com/6440-3/","reference_id":"USN-6440-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6440-3/"},{"reference_url":"https://usn.ubuntu.com/6441-1/","reference_id":"USN-6441-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6441-1/"},{"reference_url":"https://usn.ubuntu.com/6441-2/","reference_id":"USN-6441-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6441-2/"},{"reference_url":"https://usn.ubuntu.com/6441-3/","reference_id":"USN-6441-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6441-3/"},{"reference_url":"https://usn.ubuntu.com/6442-1/","reference_id":"USN-6442-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6442-1/"},{"reference_url":"https://usn.ubuntu.com/6444-1/","reference_id":"USN-6444-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6444-1/"},{"reference_url":"https://usn.ubuntu.com/6444-2/","reference_id":"USN-6444-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6444-2/"},{"reference_url":"https://usn.ubuntu.com/6445-1/","reference_id":"USN-6445-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6445-1/"},{"reference_url":"https://usn.ubuntu.com/6445-2/","reference_id":"USN-6445-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6445-2/"},{"reference_url":"https://usn.ubuntu.com/6446-1/","reference_id":"USN-6446-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6446-1/"},{"reference_url":"https://usn.ubuntu.com/6446-2/","reference_id":"USN-6446-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6446-2/"},{"reference_url":"https://usn.ubuntu.com/6446-3/","reference_id":"USN-6446-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6446-3/"},{"reference_url":"https://usn.ubuntu.com/6466-1/","reference_id":"USN-6466-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6466-1/"}],"fixed_packages":[],"aliases":["CVE-2023-4622"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gpry-jhh3-byed"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78984?format=json","vulnerability_id":"VCID-hxjx-3the-x3ff","summary":"kernel: use-after-free in smb2_is_status_io_timeout()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1192.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1192.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1192","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07254","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07188","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07194","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07189","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07315","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07274","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07282","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07233","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07212","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07266","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07293","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07289","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07275","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07265","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1192"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1192","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1192"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2154178","reference_id":"2154178","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-26T21:48:41Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2154178"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-1192","reference_id":"CVE-2023-1192","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-26T21:48:41Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-1192"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d527f51331cace562393a8038d870b3e9916686f","reference_id":"?id=d527f51331cace562393a8038d870b3e9916686f","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-26T21:48:41Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d527f51331cace562393a8038d870b3e9916686f"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7539","reference_id":"RHSA-2023:7539","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7539"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7548","reference_id":"RHSA-2023:7548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7549","reference_id":"RHSA-2023:7549","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7549"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7749","reference_id":"RHSA-2023:7749","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7749"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0439","reference_id":"RHSA-2024:0439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0448","reference_id":"RHSA-2024:0448","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0448"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0562","reference_id":"RHSA-2024:0562","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0562"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0563","reference_id":"RHSA-2024:0563","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0563"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1250","reference_id":"RHSA-2024:1250","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1250"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1306","reference_id":"RHSA-2024:1306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2006","reference_id":"RHSA-2024:2006","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2008","reference_id":"RHSA-2024:2008","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2008"}],"fixed_packages":[],"aliases":["CVE-2023-1192"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hxjx-3the-x3ff"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78525?format=json","vulnerability_id":"VCID-j2y7-nwcd-5qh7","summary":"kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong con2fb_map assignment","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38409.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38409.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38409","reference_id":"","reference_type":"","scores":[{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00387","published_at":"2026-04-04T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00386","published_at":"2026-04-29T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00362","published_at":"2026-04-16T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.0039","published_at":"2026-04-26T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00389","published_at":"2026-04-24T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00376","published_at":"2026-04-07T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00373","published_at":"2026-04-09T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00372","published_at":"2026-04-11T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00368","published_at":"2026-04-12T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00367","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38409"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2230042","reference_id":"2230042","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2230042"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.12","reference_id":"ChangeLog-6.2.12","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:58:04Z/"}],"url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.12"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=fffb0b52d5258554c645c966c6cbef7de50b851d","reference_id":"commit?id=fffb0b52d5258554c645c966c6cbef7de50b851d","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:58:04Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=fffb0b52d5258554c645c966c6cbef7de50b851d"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7539","reference_id":"RHSA-2023:7539","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7539"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0439","reference_id":"RHSA-2024:0439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0448","reference_id":"RHSA-2024:0448","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0448"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0461","reference_id":"RHSA-2024:0461","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0461"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0562","reference_id":"RHSA-2024:0562","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0562"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0563","reference_id":"RHSA-2024:0563","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0563"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1249","reference_id":"RHSA-2024:1249","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1249"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1250","reference_id":"RHSA-2024:1250","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1250"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1268","reference_id":"RHSA-2024:1268","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1268"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1269","reference_id":"RHSA-2024:1269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1269"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1306","reference_id":"RHSA-2024:1306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1332","reference_id":"RHSA-2024:1332","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1332"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2950","reference_id":"RHSA-2024:2950","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2950"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3138","reference_id":"RHSA-2024:3138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3138"}],"fixed_packages":[],"aliases":["CVE-2023-38409"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j2y7-nwcd-5qh7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78096?format=json","vulnerability_id":"VCID-j4xv-b39v-kfdn","summary":"kernel: use-after-free in netfilter: nf_tables","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3777.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3777.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3777","reference_id":"","reference_type":"","scores":[{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12307","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12332","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12445","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12451","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12417","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18651","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18655","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18608","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18557","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18501","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18598","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18747","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18801","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18518","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3777"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3777","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3777"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2237750","reference_id":"2237750","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2237750"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0431","reference_id":"RHSA-2024:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0432","reference_id":"RHSA-2024:0432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0439","reference_id":"RHSA-2024:0439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0448","reference_id":"RHSA-2024:0448","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0448"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0461","reference_id":"RHSA-2024:0461","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0461"},{"reference_url":"https://usn.ubuntu.com/6315-1/","reference_id":"USN-6315-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6315-1/"},{"reference_url":"https://usn.ubuntu.com/6316-1/","reference_id":"USN-6316-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6316-1/"},{"reference_url":"https://usn.ubuntu.com/6318-1/","reference_id":"USN-6318-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6318-1/"},{"reference_url":"https://usn.ubuntu.com/6321-1/","reference_id":"USN-6321-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6321-1/"},{"reference_url":"https://usn.ubuntu.com/6325-1/","reference_id":"USN-6325-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6325-1/"},{"reference_url":"https://usn.ubuntu.com/6328-1/","reference_id":"USN-6328-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6328-1/"},{"reference_url":"https://usn.ubuntu.com/6330-1/","reference_id":"USN-6330-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6330-1/"},{"reference_url":"https://usn.ubuntu.com/6332-1/","reference_id":"USN-6332-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6332-1/"},{"reference_url":"https://usn.ubuntu.com/6348-1/","reference_id":"USN-6348-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6348-1/"},{"reference_url":"https://usn.ubuntu.com/6385-1/","reference_id":"USN-6385-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6385-1/"}],"fixed_packages":[],"aliases":["CVE-2023-3777"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j4xv-b39v-kfdn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78098?format=json","vulnerability_id":"VCID-mxda-6yrb-ukgb","summary":"kernel: net/sched: sch_hfsc UAF","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4623.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4623.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4623","reference_id":"","reference_type":"","scores":[{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04446","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04229","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04309","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.043","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04286","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04264","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04235","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04244","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0437","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04387","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04407","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04249","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04262","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04293","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4623"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2237757","reference_id":"2237757","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2237757"},{"reference_url":"https://kernel.dance/b3d26c5702c7d6c45456326e56d2ccf3f103e60f","reference_id":"b3d26c5702c7d6c45456326e56d2ccf3f103e60f","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-26T21:52:35Z/"}],"url":"https://kernel.dance/b3d26c5702c7d6c45456326e56d2ccf3f103e60f"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b3d26c5702c7d6c45456326e56d2ccf3f103e60f","reference_id":"?id=b3d26c5702c7d6c45456326e56d2ccf3f103e60f","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-26T21:52:35Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b3d26c5702c7d6c45456326e56d2ccf3f103e60f"},{"reference_url":"http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html","reference_id":"Kernel-Live-Patch-Security-Notice-LSN-0099-1.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-26T21:52:35Z/"}],"url":"http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html","reference_id":"msg00004.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-26T21:52:35Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","reference_id":"msg00027.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-26T21:52:35Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0340","reference_id":"RHSA-2024:0340","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0340"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0378","reference_id":"RHSA-2024:0378","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0378"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0381","reference_id":"RHSA-2024:0381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0386","reference_id":"RHSA-2024:0386","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0386"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0431","reference_id":"RHSA-2024:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0432","reference_id":"RHSA-2024:0432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0439","reference_id":"RHSA-2024:0439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0448","reference_id":"RHSA-2024:0448","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0448"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0461","reference_id":"RHSA-2024:0461","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0461"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0554","reference_id":"RHSA-2024:0554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0562","reference_id":"RHSA-2024:0562","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0562"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0563","reference_id":"RHSA-2024:0563","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0563"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0593","reference_id":"RHSA-2024:0593","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0593"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0876","reference_id":"RHSA-2024:0876","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0876"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0881","reference_id":"RHSA-2024:0881","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0881"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0897","reference_id":"RHSA-2024:0897","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0897"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1268","reference_id":"RHSA-2024:1268","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1268"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1269","reference_id":"RHSA-2024:1269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1269"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1278","reference_id":"RHSA-2024:1278","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1278"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1746","reference_id":"RHSA-2024:1746","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1746"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1747","reference_id":"RHSA-2024:1747","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1747"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1960","reference_id":"RHSA-2024:1960","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1960"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2003","reference_id":"RHSA-2024:2003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2004","reference_id":"RHSA-2024:2004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2004"},{"reference_url":"https://usn.ubuntu.com/6415-1/","reference_id":"USN-6415-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6415-1/"},{"reference_url":"https://usn.ubuntu.com/6439-1/","reference_id":"USN-6439-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6439-1/"},{"reference_url":"https://usn.ubuntu.com/6439-2/","reference_id":"USN-6439-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6439-2/"},{"reference_url":"https://usn.ubuntu.com/6440-1/","reference_id":"USN-6440-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6440-1/"},{"reference_url":"https://usn.ubuntu.com/6440-2/","reference_id":"USN-6440-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6440-2/"},{"reference_url":"https://usn.ubuntu.com/6440-3/","reference_id":"USN-6440-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6440-3/"},{"reference_url":"https://usn.ubuntu.com/6441-1/","reference_id":"USN-6441-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6441-1/"},{"reference_url":"https://usn.ubuntu.com/6441-2/","reference_id":"USN-6441-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6441-2/"},{"reference_url":"https://usn.ubuntu.com/6441-3/","reference_id":"USN-6441-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6441-3/"},{"reference_url":"https://usn.ubuntu.com/6442-1/","reference_id":"USN-6442-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6442-1/"},{"reference_url":"https://usn.ubuntu.com/6444-1/","reference_id":"USN-6444-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6444-1/"},{"reference_url":"https://usn.ubuntu.com/6444-2/","reference_id":"USN-6444-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6444-2/"},{"reference_url":"https://usn.ubuntu.com/6445-1/","reference_id":"USN-6445-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6445-1/"},{"reference_url":"https://usn.ubuntu.com/6445-2/","reference_id":"USN-6445-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6445-2/"},{"reference_url":"https://usn.ubuntu.com/6446-1/","reference_id":"USN-6446-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6446-1/"},{"reference_url":"https://usn.ubuntu.com/6446-2/","reference_id":"USN-6446-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6446-2/"},{"reference_url":"https://usn.ubuntu.com/6446-3/","reference_id":"USN-6446-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6446-3/"},{"reference_url":"https://usn.ubuntu.com/6460-1/","reference_id":"USN-6460-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6460-1/"},{"reference_url":"https://usn.ubuntu.com/6466-1/","reference_id":"USN-6466-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6466-1/"}],"fixed_packages":[],"aliases":["CVE-2023-4623"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mxda-6yrb-ukgb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65300?format=json","vulnerability_id":"VCID-rp4r-rkvb-pfe3","summary":"kernel: objtool: Fix SEGFAULT","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50879.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50879.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50879","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10793","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10911","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10975","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.108","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10876","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10929","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1093","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10897","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10874","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10734","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10747","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10834","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-50879"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50879","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50879"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426076","reference_id":"2426076","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426076"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0439","reference_id":"RHSA-2024:0439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0448","reference_id":"RHSA-2024:0448","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0448"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2394","reference_id":"RHSA-2024:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2394"}],"fixed_packages":[],"aliases":["CVE-2022-50879"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rp4r-rkvb-pfe3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78830?format=json","vulnerability_id":"VCID-sdkh-c3yd-g3ak","summary":"kernel: Slab-out-of-bound read in compare_netdev_and_ip","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2176.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2176.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2176","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02897","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0337","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02913","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02921","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02923","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02948","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02917","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0289","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0287","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0288","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03535","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03549","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03542","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2176"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187931","reference_id":"2187931","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187931"},{"reference_url":"https://www.spinics.net/lists/linux-rdma/msg114749.html","reference_id":"msg114749.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:34Z/"}],"url":"https://www.spinics.net/lists/linux-rdma/msg114749.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230609-0005/","reference_id":"ntap-20230609-0005","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:34Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230609-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0439","reference_id":"RHSA-2024:0439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0448","reference_id":"RHSA-2024:0448","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0448"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0461","reference_id":"RHSA-2024:0461","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0461"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0881","reference_id":"RHSA-2024:0881","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0881"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0897","reference_id":"RHSA-2024:0897","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0897"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1250","reference_id":"RHSA-2024:1250","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1250"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1306","reference_id":"RHSA-2024:1306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1367","reference_id":"RHSA-2024:1367","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1367"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1382","reference_id":"RHSA-2024:1382","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1382"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1404"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3528","reference_id":"RHSA-2024:3528","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3528"},{"reference_url":"https://usn.ubuntu.com/6194-1/","reference_id":"USN-6194-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6194-1/"},{"reference_url":"https://usn.ubuntu.com/6224-1/","reference_id":"USN-6224-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6224-1/"},{"reference_url":"https://usn.ubuntu.com/6228-1/","reference_id":"USN-6228-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6228-1/"},{"reference_url":"https://usn.ubuntu.com/6235-1/","reference_id":"USN-6235-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6235-1/"}],"fixed_packages":[],"aliases":["CVE-2023-2176"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sdkh-c3yd-g3ak"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78839?format=json","vulnerability_id":"VCID-shtf-mwha-z7cd","summary":"kernel: NULL pointer dereference in can_rcv_filter","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2166.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2166.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2166","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03283","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03426","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0339","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03379","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03381","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03294","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03303","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03309","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0333","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03287","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03259","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03238","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03213","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03223","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2166"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187813","reference_id":"2187813","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187813"},{"reference_url":"https://lore.kernel.org/lkml/CAO4mrfcV_07hbj8NUuZrA8FH-kaRsrFy-2metecpTuE5kKHn5w%40mail.gmail.com/","reference_id":"CAO4mrfcV_07hbj8NUuZrA8FH-kaRsrFy-2metecpTuE5kKHn5w%40mail.gmail.com","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-05T15:12:07Z/"}],"url":"https://lore.kernel.org/lkml/CAO4mrfcV_07hbj8NUuZrA8FH-kaRsrFy-2metecpTuE5kKHn5w%40mail.gmail.com/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0439","reference_id":"RHSA-2024:0439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0448","reference_id":"RHSA-2024:0448","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0448"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0461","reference_id":"RHSA-2024:0461","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0461"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0881","reference_id":"RHSA-2024:0881","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0881"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0897","reference_id":"RHSA-2024:0897","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0897"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1250","reference_id":"RHSA-2024:1250","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1250"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1306","reference_id":"RHSA-2024:1306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1367","reference_id":"RHSA-2024:1367","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1367"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1382","reference_id":"RHSA-2024:1382","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1382"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1404","reference_id":"RHSA-2024:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1404"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3528","reference_id":"RHSA-2024:3528","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3528"}],"fixed_packages":[],"aliases":["CVE-2023-2166"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-shtf-mwha-z7cd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70647?format=json","vulnerability_id":"VCID-sv6b-1fxf-2ygx","summary":"kernel: vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52973.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52973.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-52973","reference_id":"","reference_type":"","scores":[{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07882","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07839","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07922","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07936","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07953","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07964","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07944","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07929","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07886","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13168","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.1321","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13291","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13298","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.1327","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-52973"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52973","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52973"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/226fae124b2dac217ea5436060d623ff3385bc34","reference_id":"226fae124b2dac217ea5436060d623ff3385bc34","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-27T16:59:54Z/"}],"url":"https://git.kernel.org/stable/c/226fae124b2dac217ea5436060d623ff3385bc34"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355433","reference_id":"2355433","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355433"},{"reference_url":"https://git.kernel.org/stable/c/55515d7d8743b71b80bfe68e89eb9d92630626ab","reference_id":"55515d7d8743b71b80bfe68e89eb9d92630626ab","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-27T16:59:54Z/"}],"url":"https://git.kernel.org/stable/c/55515d7d8743b71b80bfe68e89eb9d92630626ab"},{"reference_url":"https://git.kernel.org/stable/c/6332f52f44b9776568bf3c0b714ddfb0bb175e78","reference_id":"6332f52f44b9776568bf3c0b714ddfb0bb175e78","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-27T16:59:54Z/"}],"url":"https://git.kernel.org/stable/c/6332f52f44b9776568bf3c0b714ddfb0bb175e78"},{"reference_url":"https://git.kernel.org/stable/c/8506f16aae9daf354e3732bcfd447e2a97f023df","reference_id":"8506f16aae9daf354e3732bcfd447e2a97f023df","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-27T16:59:54Z/"}],"url":"https://git.kernel.org/stable/c/8506f16aae9daf354e3732bcfd447e2a97f023df"},{"reference_url":"https://git.kernel.org/stable/c/af79ea9a2443016f64d8fd8d72020cc874f0e066","reference_id":"af79ea9a2443016f64d8fd8d72020cc874f0e066","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-27T16:59:54Z/"}],"url":"https://git.kernel.org/stable/c/af79ea9a2443016f64d8fd8d72020cc874f0e066"},{"reference_url":"https://git.kernel.org/stable/c/d0332cbf53dad06a22189cc341391237f4ea6d9f","reference_id":"d0332cbf53dad06a22189cc341391237f4ea6d9f","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-27T16:59:54Z/"}],"url":"https://git.kernel.org/stable/c/d0332cbf53dad06a22189cc341391237f4ea6d9f"},{"reference_url":"https://git.kernel.org/stable/c/fc9e27f3ba083534b8bbf72ab0f5c810ffdc7d18","reference_id":"fc9e27f3ba083534b8bbf72ab0f5c810ffdc7d18","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-27T16:59:54Z/"}],"url":"https://git.kernel.org/stable/c/fc9e27f3ba083534b8bbf72ab0f5c810ffdc7d18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0439","reference_id":"RHSA-2024:0439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0448","reference_id":"RHSA-2024:0448","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0448"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2394","reference_id":"RHSA-2024:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3138","reference_id":"RHSA-2024:3138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3138"}],"fixed_packages":[],"aliases":["CVE-2023-52973"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sv6b-1fxf-2ygx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77908?format=json","vulnerability_id":"VCID-vhwk-ynks-vye3","summary":"kernel: NULL pointer dereference in dpll_pin_parent_pin_set() in drivers/dpll/dpll_netlink.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6679.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6679.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6679","reference_id":"","reference_type":"","scores":[{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02015","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02027","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02023","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02025","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02042","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0201","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02006","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01985","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01986","published_at":"2026-04-18T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00969","published_at":"2026-04-29T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.0097","published_at":"2026-04-21T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00972","published_at":"2026-04-24T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00977","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6679"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2253986","reference_id":"2253986","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2253986"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0439","reference_id":"RHSA-2024:0439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0448","reference_id":"RHSA-2024:0448","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0448"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0461","reference_id":"RHSA-2024:0461","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0461"}],"fixed_packages":[],"aliases":["CVE-2023-6679"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vhwk-ynks-vye3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78733?format=json","vulnerability_id":"VCID-ww12-xnsy-gyfm","summary":"kernel: UAF during login when accessing the shost ipaddress","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2162.json","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2162.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2162","reference_id":"","reference_type":"","scores":[{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00828","published_at":"2026-04-04T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00869","published_at":"2026-04-26T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00831","published_at":"2026-04-09T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.0082","published_at":"2026-04-11T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00814","published_at":"2026-04-12T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00815","published_at":"2026-04-16T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00819","published_at":"2026-04-18T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00864","published_at":"2026-04-21T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00866","published_at":"2026-04-29T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00829","published_at":"2026-04-07T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00834","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2162"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2162","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2162"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187773","reference_id":"2187773","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187773"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:12Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:12Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"},{"reference_url":"https://www.spinics.net/lists/linux-scsi/msg181542.html","reference_id":"msg181542.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:12Z/"}],"url":"https://www.spinics.net/lists/linux-scsi/msg181542.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0113","reference_id":"RHSA-2024:0113","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0113"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0134","reference_id":"RHSA-2024:0134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0402","reference_id":"RHSA-2024:0402","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0402"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0403","reference_id":"RHSA-2024:0403","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0403"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0431","reference_id":"RHSA-2024:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0432","reference_id":"RHSA-2024:0432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0439","reference_id":"RHSA-2024:0439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0448","reference_id":"RHSA-2024:0448","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0448"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0562","reference_id":"RHSA-2024:0562","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0562"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0563","reference_id":"RHSA-2024:0563","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0563"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://usn.ubuntu.com/6079-1/","reference_id":"USN-6079-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6079-1/"},{"reference_url":"https://usn.ubuntu.com/6080-1/","reference_id":"USN-6080-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6080-1/"},{"reference_url":"https://usn.ubuntu.com/6081-1/","reference_id":"USN-6081-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6081-1/"},{"reference_url":"https://usn.ubuntu.com/6084-1/","reference_id":"USN-6084-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6084-1/"},{"reference_url":"https://usn.ubuntu.com/6085-1/","reference_id":"USN-6085-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6085-1/"},{"reference_url":"https://usn.ubuntu.com/6090-1/","reference_id":"USN-6090-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6090-1/"},{"reference_url":"https://usn.ubuntu.com/6091-1/","reference_id":"USN-6091-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6091-1/"},{"reference_url":"https://usn.ubuntu.com/6092-1/","reference_id":"USN-6092-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6092-1/"},{"reference_url":"https://usn.ubuntu.com/6094-1/","reference_id":"USN-6094-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6094-1/"},{"reference_url":"https://usn.ubuntu.com/6095-1/","reference_id":"USN-6095-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6095-1/"},{"reference_url":"https://usn.ubuntu.com/6096-1/","reference_id":"USN-6096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6096-1/"},{"reference_url":"https://usn.ubuntu.com/6109-1/","reference_id":"USN-6109-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6109-1/"},{"reference_url":"https://usn.ubuntu.com/6118-1/","reference_id":"USN-6118-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6118-1/"},{"reference_url":"https://usn.ubuntu.com/6132-1/","reference_id":"USN-6132-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6132-1/"},{"reference_url":"https://usn.ubuntu.com/6133-1/","reference_id":"USN-6133-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6133-1/"},{"reference_url":"https://usn.ubuntu.com/6134-1/","reference_id":"USN-6134-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6134-1/"},{"reference_url":"https://usn.ubuntu.com/6222-1/","reference_id":"USN-6222-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6222-1/"},{"reference_url":"https://usn.ubuntu.com/6254-1/","reference_id":"USN-6254-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6254-1/"},{"reference_url":"https://usn.ubuntu.com/6256-1/","reference_id":"USN-6256-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6256-1/"},{"reference_url":"https://usn.ubuntu.com/6385-1/","reference_id":"USN-6385-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6385-1/"}],"fixed_packages":[],"aliases":["CVE-2023-2162"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ww12-xnsy-gyfm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77980?format=json","vulnerability_id":"VCID-zcxw-xq7k-tkhx","summary":"kernel: SEV-ES local priv escalation","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46813.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46813.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-46813","reference_id":"","reference_type":"","scores":[{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.5277","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52743","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.55966","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56004","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56056","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56059","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.5607","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56051","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56033","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56069","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56072","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56044","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.55971","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.55991","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-46813"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2246944","reference_id":"2246944","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2246944"},{"reference_url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.9","reference_id":"ChangeLog-6.5.9","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:17Z/"}],"url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.9"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=63e44bc52047f182601e7817da969a105aa1f721","reference_id":"?id=63e44bc52047f182601e7817da969a105aa1f721","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:17Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=63e44bc52047f182601e7817da969a105aa1f721"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a37cd2a59d0cb270b1bba568fd3a3b8668b9d3ba","reference_id":"?id=a37cd2a59d0cb270b1bba568fd3a3b8668b9d3ba","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:17Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a37cd2a59d0cb270b1bba568fd3a3b8668b9d3ba"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b9cb9c45583b911e0db71d09caa6b56469eb2bdf","reference_id":"?id=b9cb9c45583b911e0db71d09caa6b56469eb2bdf","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:17Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b9cb9c45583b911e0db71d09caa6b56469eb2bdf"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:17Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0431","reference_id":"RHSA-2024:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0432","reference_id":"RHSA-2024:0432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0439","reference_id":"RHSA-2024:0439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0448","reference_id":"RHSA-2024:0448","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0448"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0461","reference_id":"RHSA-2024:0461","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0461"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0724","reference_id":"RHSA-2024:0724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0881","reference_id":"RHSA-2024:0881","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0881"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0897","reference_id":"RHSA-2024:0897","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0897"},{"reference_url":"https://bugzilla.suse.com/show_bug.cgi?id=1212649","reference_id":"show_bug.cgi?id=1212649","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:17Z/"}],"url":"https://bugzilla.suse.com/show_bug.cgi?id=1212649"},{"reference_url":"https://usn.ubuntu.com/6533-1/","reference_id":"USN-6533-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6533-1/"},{"reference_url":"https://usn.ubuntu.com/6624-1/","reference_id":"USN-6624-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6624-1/"},{"reference_url":"https://usn.ubuntu.com/6626-1/","reference_id":"USN-6626-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6626-1/"},{"reference_url":"https://usn.ubuntu.com/6626-2/","reference_id":"USN-6626-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6626-2/"},{"reference_url":"https://usn.ubuntu.com/6626-3/","reference_id":"USN-6626-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6626-3/"},{"reference_url":"https://usn.ubuntu.com/6628-1/","reference_id":"USN-6628-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6628-1/"},{"reference_url":"https://usn.ubuntu.com/6628-2/","reference_id":"USN-6628-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6628-2/"},{"reference_url":"https://usn.ubuntu.com/6652-1/","reference_id":"USN-6652-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6652-1/"}],"fixed_packages":[],"aliases":["CVE-2023-46813"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zcxw-xq7k-tkhx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78762?format=json","vulnerability_id":"VCID-zph7-5zjb-quae","summary":"kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3567.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3567.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3567","reference_id":"","reference_type":"","scores":[{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00709","published_at":"2026-04-07T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00705","published_at":"2026-04-04T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00708","published_at":"2026-04-08T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00699","published_at":"2026-04-09T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00698","published_at":"2026-04-11T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00693","published_at":"2026-04-12T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00692","published_at":"2026-04-18T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00686","published_at":"2026-04-16T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00734","published_at":"2026-04-21T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00736","published_at":"2026-04-29T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00737","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3567"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3567","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3567"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2221463","reference_id":"2221463","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2221463"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0431","reference_id":"RHSA-2024:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0432","reference_id":"RHSA-2024:0432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0439","reference_id":"RHSA-2024:0439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0448","reference_id":"RHSA-2024:0448","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0448"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0575","reference_id":"RHSA-2024:0575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2394","reference_id":"RHSA-2024:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2950","reference_id":"RHSA-2024:2950","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2950"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3138","reference_id":"RHSA-2024:3138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3138"},{"reference_url":"https://usn.ubuntu.com/6309-1/","reference_id":"USN-6309-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6309-1/"},{"reference_url":"https://usn.ubuntu.com/6327-1/","reference_id":"USN-6327-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6327-1/"},{"reference_url":"https://usn.ubuntu.com/6341-1/","reference_id":"USN-6341-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6341-1/"}],"fixed_packages":[],"aliases":["CVE-2023-3567"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zph7-5zjb-quae"}],"fixing_vulnerabilities":[],"risk_score":"4.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@5.14.0-284.48.1.rt14.333%3Farch=el9_2"}