Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/87860?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/87860?format=api", "purl": "pkg:rpm/redhat/kernel@4.18.0-372.70.1?arch=el8_6", "type": "rpm", "namespace": "redhat", "name": "kernel", "version": "4.18.0-372.70.1", "qualifiers": { "arch": "el8_6" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78893?format=api", "vulnerability_id": "VCID-4nqf-ct5y-6uev", "summary": "kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42896.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42896.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42896", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.6201", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.61983", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62004", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.61994", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.61973", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62015", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62021", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62003", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62017", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.61916", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.61946", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.61966", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42896" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42896", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42896" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147364", "reference_id": "2147364", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147364" }, { "reference_url": "https://kernel.dance/#711f8c3fb3db61897080468586b970c87c61d9e4", "reference_id": "#711f8c3fb3db61897080468586b970c87c61d9e4", "reference_type": "", "scores": [ { "value": "8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:37:08Z/" } ], "url": "https://kernel.dance/#711f8c3fb3db61897080468586b970c87c61d9e4" }, { "reference_url": "https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4", "reference_id": "711f8c3fb3db61897080468586b970c87c61d9e4", "reference_type": "", "scores": [ { "value": "8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:37:08Z/" } ], "url": "https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://security.archlinux.org/AVG-2837", "reference_id": "AVG-2837", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2837" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2148", "reference_id": "RHSA-2023:2148", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2458", "reference_id": "RHSA-2023:2458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3461", "reference_id": "RHSA-2023:3461", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3461" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3462", "reference_id": "RHSA-2023:3462", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3462" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3517", "reference_id": "RHSA-2023:3517", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3517" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4137", "reference_id": "RHSA-2023:4137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4137" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4138", "reference_id": "RHSA-2023:4138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4138" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4230", "reference_id": "RHSA-2023:4230", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4230" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4517", "reference_id": "RHSA-2023:4517", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4517" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4531", "reference_id": "RHSA-2023:4531", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4531" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4541", "reference_id": "RHSA-2023:4541", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4541" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4789", "reference_id": "RHSA-2023:4789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4888", "reference_id": "RHSA-2023:4888", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4888" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5580", "reference_id": "RHSA-2023:5580", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5580" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5588", "reference_id": "RHSA-2023:5588", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5588" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5589", "reference_id": "RHSA-2023:5589", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5589" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0980", "reference_id": "RHSA-2024:0980", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0980" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1249", "reference_id": "RHSA-2024:1249", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1249" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1323", "reference_id": "RHSA-2024:1323", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1323" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1332", "reference_id": "RHSA-2024:1332", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1332" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1746", "reference_id": "RHSA-2024:1746", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1746" }, { "reference_url": "https://usn.ubuntu.com/5780-1/", "reference_id": "USN-5780-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5780-1/" }, { "reference_url": "https://usn.ubuntu.com/5783-1/", "reference_id": "USN-5783-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5783-1/" }, { "reference_url": "https://usn.ubuntu.com/5794-1/", "reference_id": "USN-5794-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5794-1/" }, { "reference_url": "https://usn.ubuntu.com/5802-1/", "reference_id": "USN-5802-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5802-1/" }, { "reference_url": "https://usn.ubuntu.com/5803-1/", "reference_id": "USN-5803-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5803-1/" }, { "reference_url": "https://usn.ubuntu.com/5804-1/", "reference_id": "USN-5804-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5804-1/" }, { "reference_url": "https://usn.ubuntu.com/5804-2/", "reference_id": "USN-5804-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5804-2/" }, { "reference_url": "https://usn.ubuntu.com/5808-1/", "reference_id": "USN-5808-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5808-1/" }, { "reference_url": "https://usn.ubuntu.com/5809-1/", "reference_id": "USN-5809-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5809-1/" }, { "reference_url": "https://usn.ubuntu.com/5813-1/", "reference_id": "USN-5813-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5813-1/" }, { "reference_url": "https://usn.ubuntu.com/5814-1/", "reference_id": "USN-5814-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5814-1/" }, { "reference_url": "https://usn.ubuntu.com/5829-1/", "reference_id": "USN-5829-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5829-1/" }, { "reference_url": "https://usn.ubuntu.com/5830-1/", "reference_id": "USN-5830-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5830-1/" }, { "reference_url": "https://usn.ubuntu.com/5831-1/", "reference_id": "USN-5831-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5831-1/" }, { "reference_url": "https://usn.ubuntu.com/5832-1/", "reference_id": "USN-5832-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5832-1/" }, { "reference_url": "https://usn.ubuntu.com/5860-1/", "reference_id": "USN-5860-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5860-1/" }, { "reference_url": "https://usn.ubuntu.com/5861-1/", "reference_id": "USN-5861-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5861-1/" }, { "reference_url": "https://usn.ubuntu.com/5863-1/", "reference_id": "USN-5863-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5863-1/" }, { "reference_url": "https://usn.ubuntu.com/5875-1/", "reference_id": "USN-5875-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5875-1/" }, { "reference_url": "https://usn.ubuntu.com/5877-1/", "reference_id": "USN-5877-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5877-1/" }, { "reference_url": "https://usn.ubuntu.com/5879-1/", "reference_id": "USN-5879-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5879-1/" }, { "reference_url": "https://usn.ubuntu.com/5914-1/", "reference_id": "USN-5914-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5914-1/" }, { "reference_url": "https://usn.ubuntu.com/5918-1/", "reference_id": "USN-5918-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5918-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-42896" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4nqf-ct5y-6uev" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78058?format=api", "vulnerability_id": "VCID-7jsu-xc3w-z3a2", "summary": "kernel: buffer overflow in ceph file net/ceph/messenger_v2.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-44466.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-44466.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-44466", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.13171", "scoring_system": "epss", "scoring_elements": "0.94097", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.13171", "scoring_system": "epss", "scoring_elements": "0.94108", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.13171", "scoring_system": "epss", "scoring_elements": "0.94112", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.13171", "scoring_system": "epss", "scoring_elements": "0.94121", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.13171", "scoring_system": "epss", "scoring_elements": "0.94125", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.13171", "scoring_system": "epss", "scoring_elements": "0.9413", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.13171", "scoring_system": "epss", "scoring_elements": "0.94129", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.13171", "scoring_system": "epss", "scoring_elements": "0.94146", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.13171", "scoring_system": "epss", "scoring_elements": "0.94151", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.15852", "scoring_system": "epss", "scoring_elements": "0.94762", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.15852", "scoring_system": "epss", "scoring_elements": "0.94763", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-44466" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241342", "reference_id": "2241342", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241342" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4789", "reference_id": "RHSA-2023:4789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4801", "reference_id": "RHSA-2023:4801", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4801" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4962", "reference_id": "RHSA-2023:4962", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4962" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5069", "reference_id": "RHSA-2023:5069", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5069" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5244", "reference_id": "RHSA-2023:5244", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5244" }, { "reference_url": "https://usn.ubuntu.com/6416-1/", "reference_id": "USN-6416-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6416-1/" }, { "reference_url": "https://usn.ubuntu.com/6416-2/", "reference_id": "USN-6416-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6416-2/" }, { "reference_url": "https://usn.ubuntu.com/6416-3/", "reference_id": "USN-6416-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6416-3/" }, { "reference_url": "https://usn.ubuntu.com/6445-1/", "reference_id": "USN-6445-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6445-1/" }, { "reference_url": "https://usn.ubuntu.com/6445-2/", "reference_id": "USN-6445-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6445-2/" }, { "reference_url": "https://usn.ubuntu.com/6464-1/", "reference_id": "USN-6464-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6464-1/" }, { "reference_url": "https://usn.ubuntu.com/6466-1/", "reference_id": "USN-6466-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6466-1/" }, { "reference_url": "https://usn.ubuntu.com/6520-1/", "reference_id": "USN-6520-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6520-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-44466" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7jsu-xc3w-z3a2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78371?format=api", "vulnerability_id": "VCID-afph-5dqk-67cr", "summary": "kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35788.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35788.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-35788", "reference_id": "", "reference_type": "", "scores": [ { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.0082", "published_at": "2026-04-02T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00821", "published_at": "2026-04-04T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00822", "published_at": "2026-04-07T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00826", "published_at": "2026-04-08T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00823", "published_at": "2026-04-09T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00813", "published_at": "2026-04-11T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00905", "published_at": "2026-04-12T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00907", "published_at": "2026-04-13T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00903", "published_at": "2026-04-16T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00911", "published_at": "2026-04-18T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.0096", "published_at": "2026-04-29T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00964", "published_at": "2026-04-24T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00968", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-35788" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215768", "reference_id": "2215768", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215768" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4377", "reference_id": "RHSA-2023:4377", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4377" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4378", "reference_id": "RHSA-2023:4378", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4378" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4380", "reference_id": "RHSA-2023:4380", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4380" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4515", "reference_id": "RHSA-2023:4515", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4515" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4516", "reference_id": "RHSA-2023:4516", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4516" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4697", "reference_id": "RHSA-2023:4697", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4697" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4698", "reference_id": "RHSA-2023:4698", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4698" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4789", "reference_id": "RHSA-2023:4789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4815", "reference_id": "RHSA-2023:4815", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4815" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4817", "reference_id": "RHSA-2023:4817", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4817" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4819", "reference_id": "RHSA-2023:4819", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4819" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4821", "reference_id": "RHSA-2023:4821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4821" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4829", "reference_id": "RHSA-2023:4829", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4829" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4834", "reference_id": "RHSA-2023:4834", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4834" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4888", "reference_id": "RHSA-2023:4888", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4888" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4961", "reference_id": "RHSA-2023:4961", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4961" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4962", "reference_id": "RHSA-2023:4962", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4962" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4967", "reference_id": "RHSA-2023:4967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5221", "reference_id": "RHSA-2023:5221", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5221" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5244", "reference_id": "RHSA-2023:5244", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5244" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5255", "reference_id": "RHSA-2023:5255", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5255" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5575", "reference_id": "RHSA-2023:5575", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5575" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5603", "reference_id": "RHSA-2023:5603", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5603" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5604", "reference_id": "RHSA-2023:5604", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5604" }, { "reference_url": "https://usn.ubuntu.com/6192-1/", "reference_id": "USN-6192-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6192-1/" }, { "reference_url": "https://usn.ubuntu.com/6193-1/", "reference_id": "USN-6193-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6193-1/" }, { "reference_url": "https://usn.ubuntu.com/6194-1/", "reference_id": "USN-6194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6194-1/" }, { "reference_url": "https://usn.ubuntu.com/6205-1/", "reference_id": "USN-6205-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6205-1/" }, { "reference_url": "https://usn.ubuntu.com/6206-1/", "reference_id": "USN-6206-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6206-1/" }, { "reference_url": "https://usn.ubuntu.com/6212-1/", "reference_id": "USN-6212-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6212-1/" }, { "reference_url": "https://usn.ubuntu.com/6220-1/", "reference_id": "USN-6220-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6220-1/" }, { "reference_url": "https://usn.ubuntu.com/6223-1/", "reference_id": "USN-6223-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6223-1/" }, { "reference_url": "https://usn.ubuntu.com/6234-1/", "reference_id": "USN-6234-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6234-1/" }, { "reference_url": "https://usn.ubuntu.com/6235-1/", "reference_id": "USN-6235-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6235-1/" }, { "reference_url": "https://usn.ubuntu.com/6256-1/", "reference_id": "USN-6256-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6256-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-35788" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-afph-5dqk-67cr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66243?format=api", "vulnerability_id": "VCID-hnu1-1pzz-qqe6", "summary": "kernel: perf/x86/intel/uncore: Fix reference count leak in snr_uncore_mmio_map()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50615.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50615.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50615", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07573", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07494", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07533", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07514", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10119", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10098", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10231", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10211", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10199", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10146", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10275", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10305", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10265", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10246", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50615" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50615", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50615" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419866", "reference_id": "2419866", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419866" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2458", "reference_id": "RHSA-2023:2458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951", "reference_id": "RHSA-2023:2951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4789", "reference_id": "RHSA-2023:4789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4789" } ], "fixed_packages": [], "aliases": [ "CVE-2022-50615" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hnu1-1pzz-qqe6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78509?format=api", "vulnerability_id": "VCID-mdjx-3kwa-r7bj", "summary": "Kernel: bluetooth: Unauthorized management command execution", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2002.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2002.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2002", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00595", "scoring_system": "epss", "scoring_elements": "0.69275", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00595", "scoring_system": "epss", "scoring_elements": "0.69292", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00595", "scoring_system": "epss", "scoring_elements": "0.69272", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00595", "scoring_system": "epss", "scoring_elements": "0.69322", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00595", "scoring_system": "epss", "scoring_elements": "0.69339", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00595", "scoring_system": "epss", "scoring_elements": "0.69361", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00595", "scoring_system": "epss", "scoring_elements": "0.69346", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00595", "scoring_system": "epss", "scoring_elements": "0.69318", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00595", "scoring_system": "epss", "scoring_elements": "0.69356", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00595", "scoring_system": "epss", "scoring_elements": "0.69366", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00612", "scoring_system": "epss", "scoring_elements": "0.69909", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00612", "scoring_system": "epss", "scoring_elements": "0.69845", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00612", "scoring_system": "epss", "scoring_elements": "0.69897", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00612", "scoring_system": "epss", "scoring_elements": "0.69906", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187308", "reference_id": "2187308", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187308" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3708", "reference_id": "RHSA-2023:3708", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3708" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3723", "reference_id": "RHSA-2023:3723", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3723" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4137", "reference_id": "RHSA-2023:4137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4137" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4138", "reference_id": "RHSA-2023:4138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4138" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4789", "reference_id": "RHSA-2023:4789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4961", "reference_id": "RHSA-2023:4961", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4961" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4962", "reference_id": "RHSA-2023:4962", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4962" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5244", "reference_id": "RHSA-2023:5244", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5244" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5255", "reference_id": "RHSA-2023:5255", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5255" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1746", "reference_id": "RHSA-2024:1746", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1746" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2003", "reference_id": "RHSA-2024:2003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2004", "reference_id": "RHSA-2024:2004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4098", "reference_id": "RHSA-2024:4098", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4098" }, { "reference_url": "https://usn.ubuntu.com/6173-1/", "reference_id": "USN-6173-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6173-1/" }, { "reference_url": "https://usn.ubuntu.com/6283-1/", "reference_id": "USN-6283-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6283-1/" }, { "reference_url": "https://usn.ubuntu.com/6300-1/", "reference_id": "USN-6300-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6300-1/" }, { "reference_url": "https://usn.ubuntu.com/6311-1/", "reference_id": "USN-6311-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6311-1/" }, { "reference_url": "https://usn.ubuntu.com/6332-1/", "reference_id": "USN-6332-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6332-1/" }, { "reference_url": "https://usn.ubuntu.com/6340-1/", "reference_id": "USN-6340-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6340-1/" }, { "reference_url": "https://usn.ubuntu.com/6340-2/", "reference_id": "USN-6340-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6340-2/" }, { "reference_url": "https://usn.ubuntu.com/6347-1/", "reference_id": "USN-6347-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6347-1/" }, { "reference_url": "https://usn.ubuntu.com/6349-1/", "reference_id": "USN-6349-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6349-1/" }, { "reference_url": "https://usn.ubuntu.com/6357-1/", "reference_id": "USN-6357-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6357-1/" }, { "reference_url": "https://usn.ubuntu.com/6385-1/", "reference_id": "USN-6385-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6385-1/" }, { "reference_url": "https://usn.ubuntu.com/6397-1/", "reference_id": "USN-6397-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6397-1/" }, { "reference_url": "https://usn.ubuntu.com/6701-1/", "reference_id": "USN-6701-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6701-1/" }, { "reference_url": "https://usn.ubuntu.com/6701-2/", "reference_id": "USN-6701-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6701-2/" }, { "reference_url": "https://usn.ubuntu.com/6701-3/", "reference_id": "USN-6701-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6701-3/" }, { "reference_url": "https://usn.ubuntu.com/6701-4/", "reference_id": "USN-6701-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6701-4/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-2002" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mdjx-3kwa-r7bj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78355?format=api", "vulnerability_id": "VCID-mza3-5d1d-byfs", "summary": "kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3390.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3390.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3390", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26574", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26618", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26403", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26472", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26521", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26528", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26482", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26424", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.2643", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26401", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26364", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27635", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27821", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27709", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3390" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20593", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3390", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3390" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3610", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3610" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213260", "reference_id": "2213260", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213260" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4789", "reference_id": "RHSA-2023:4789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4888", "reference_id": "RHSA-2023:4888", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4888" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4961", "reference_id": "RHSA-2023:4961", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4961" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4962", "reference_id": "RHSA-2023:4962", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4962" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4967", "reference_id": "RHSA-2023:4967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5069", "reference_id": "RHSA-2023:5069", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5069" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5091", "reference_id": "RHSA-2023:5091", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5091" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5093", "reference_id": "RHSA-2023:5093", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5093" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5221", "reference_id": "RHSA-2023:5221", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5221" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5235", "reference_id": "RHSA-2023:5235", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5235" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5238", "reference_id": "RHSA-2023:5238", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5238" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5244", "reference_id": "RHSA-2023:5244", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5244" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5255", "reference_id": "RHSA-2023:5255", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5255" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1250", "reference_id": "RHSA-2024:1250", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1250" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1253", "reference_id": "RHSA-2024:1253", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1253" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1268", "reference_id": "RHSA-2024:1268", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1268" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1269", "reference_id": "RHSA-2024:1269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1269" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1278", "reference_id": "RHSA-2024:1278", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1278" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1306", "reference_id": "RHSA-2024:1306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1306" }, { "reference_url": "https://usn.ubuntu.com/6246-1/", "reference_id": "USN-6246-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6246-1/" }, { "reference_url": "https://usn.ubuntu.com/6250-1/", "reference_id": "USN-6250-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6250-1/" }, { "reference_url": "https://usn.ubuntu.com/6251-1/", "reference_id": "USN-6251-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6251-1/" }, { "reference_url": "https://usn.ubuntu.com/6252-1/", "reference_id": "USN-6252-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6252-1/" }, { "reference_url": "https://usn.ubuntu.com/6254-1/", "reference_id": "USN-6254-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6254-1/" }, { "reference_url": "https://usn.ubuntu.com/6255-1/", "reference_id": "USN-6255-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6255-1/" }, { "reference_url": "https://usn.ubuntu.com/6260-1/", "reference_id": "USN-6260-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6260-1/" }, { "reference_url": "https://usn.ubuntu.com/6261-1/", "reference_id": "USN-6261-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6261-1/" }, { "reference_url": "https://usn.ubuntu.com/6285-1/", "reference_id": "USN-6285-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6285-1/" }, { "reference_url": "https://usn.ubuntu.com/6385-1/", "reference_id": "USN-6385-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6385-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-3390" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mza3-5d1d-byfs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67806?format=api", "vulnerability_id": "VCID-nukc-v8yh-wqdc", "summary": "kernel: perf/x86/intel/uncore: Fix reference count leak in hswep_has_limit_sbox()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50318.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50318.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50318", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02965", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02973", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02975", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02951", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04154", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04166", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04185", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04226", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04067", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04056", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.0403", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04019", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04031", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50318" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395235", "reference_id": "2395235", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395235" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2458", "reference_id": "RHSA-2023:2458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951", "reference_id": "RHSA-2023:2951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4789", "reference_id": "RHSA-2023:4789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583", "reference_id": "RHSA-2023:6583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7077", "reference_id": "RHSA-2023:7077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2394", "reference_id": "RHSA-2024:2394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2394" } ], "fixed_packages": [], "aliases": [ "CVE-2022-50318" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nukc-v8yh-wqdc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78593?format=api", "vulnerability_id": "VCID-p3kq-83eq-kba4", "summary": "kernel: tls: race condition in do_tls_getsockopt may lead to use-after-free or NULL pointer dereference", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28466.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28466.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28466", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.0562", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05878", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.0569", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05684", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05638", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.0565", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05798", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05831", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05867", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.0566", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05653", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05691", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05718", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05697", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28466" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28466", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28466" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179000", "reference_id": "2179000", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179000" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962", "reference_id": "commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:51Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html", "reference_id": "msg00005.html", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:51Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230427-0006/", "reference_id": "ntap-20230427-0006", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:51Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230427-0006/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3708", "reference_id": "RHSA-2023:3708", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3708" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3723", "reference_id": "RHSA-2023:3723", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3723" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3819", "reference_id": "RHSA-2023:3819", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3819" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3847", "reference_id": "RHSA-2023:3847", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3847" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4789", "reference_id": "RHSA-2023:4789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4801", "reference_id": "RHSA-2023:4801", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4801" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4814", "reference_id": "RHSA-2023:4814", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4814" }, { "reference_url": "https://usn.ubuntu.com/6033-1/", "reference_id": "USN-6033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6033-1/" }, { "reference_url": "https://usn.ubuntu.com/6175-1/", "reference_id": "USN-6175-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6175-1/" }, { "reference_url": "https://usn.ubuntu.com/6186-1/", "reference_id": "USN-6186-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6186-1/" }, { "reference_url": "https://usn.ubuntu.com/6284-1/", "reference_id": "USN-6284-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6284-1/" }, { "reference_url": "https://usn.ubuntu.com/6300-1/", "reference_id": "USN-6300-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6300-1/" }, { "reference_url": "https://usn.ubuntu.com/6301-1/", "reference_id": "USN-6301-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6301-1/" }, { "reference_url": "https://usn.ubuntu.com/6311-1/", "reference_id": "USN-6311-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6311-1/" }, { "reference_url": "https://usn.ubuntu.com/6312-1/", "reference_id": "USN-6312-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6312-1/" }, { "reference_url": "https://usn.ubuntu.com/6314-1/", "reference_id": "USN-6314-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6314-1/" }, { "reference_url": "https://usn.ubuntu.com/6331-1/", "reference_id": "USN-6331-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6331-1/" }, { "reference_url": "https://usn.ubuntu.com/6332-1/", "reference_id": "USN-6332-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6332-1/" }, { "reference_url": "https://usn.ubuntu.com/6337-1/", "reference_id": "USN-6337-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6337-1/" }, { "reference_url": "https://usn.ubuntu.com/6347-1/", "reference_id": "USN-6347-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6347-1/" }, { "reference_url": "https://usn.ubuntu.com/6385-1/", "reference_id": "USN-6385-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6385-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-28466" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p3kq-83eq-kba4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78470?format=api", "vulnerability_id": "VCID-qyu7-kx5f-8qek", "summary": "kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1829.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1829.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1829", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44129", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44152", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44083", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44134", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44137", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44153", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.4412", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45965", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45958", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.46013", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.46017", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00254", "scoring_system": "epss", "scoring_elements": "0.48686", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00254", "scoring_system": "epss", "scoring_elements": "0.48727", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00254", "scoring_system": "epss", "scoring_elements": "0.48736", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1829" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1829", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1829" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2188470", "reference_id": "2188470", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2188470" }, { "reference_url": "https://kernel.dance/#8c710f75256bb3cf05ac7b1672c82b92c43f3d28", "reference_id": "#8c710f75256bb3cf05ac7b1672c82b92c43f3d28", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-07T15:50:09Z/" } ], "url": "https://kernel.dance/#8c710f75256bb3cf05ac7b1672c82b92c43f3d28" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c710f75256bb3cf05ac7b1672c82b92c43f3d28", "reference_id": "?id=8c710f75256bb3cf05ac7b1672c82b92c43f3d28", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-07T15:50:09Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c710f75256bb3cf05ac7b1672c82b92c43f3d28" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html", "reference_id": "msg00005.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-07T15:50:09Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html", "reference_id": "msg00006.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-07T15:50:09Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230601-0001/", "reference_id": "ntap-20230601-0001", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-07T15:50:09Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230601-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4515", "reference_id": "RHSA-2023:4515", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4515" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4516", "reference_id": "RHSA-2023:4516", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4516" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4517", "reference_id": "RHSA-2023:4517", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4517" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4531", "reference_id": "RHSA-2023:4531", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4531" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4541", "reference_id": "RHSA-2023:4541", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4541" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4789", "reference_id": "RHSA-2023:4789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4888", "reference_id": "RHSA-2023:4888", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4888" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4961", "reference_id": "RHSA-2023:4961", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4961" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4962", "reference_id": "RHSA-2023:4962", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4962" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4967", "reference_id": "RHSA-2023:4967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7417", "reference_id": "RHSA-2023:7417", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7417" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7431", "reference_id": "RHSA-2023:7431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7434", "reference_id": "RHSA-2023:7434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7434" }, { "reference_url": "https://usn.ubuntu.com/6033-1/", "reference_id": "USN-6033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6033-1/" }, { "reference_url": "https://usn.ubuntu.com/6043-1/", "reference_id": "USN-6043-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6043-1/" }, { "reference_url": "https://usn.ubuntu.com/6044-1/", "reference_id": "USN-6044-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6044-1/" }, { "reference_url": "https://usn.ubuntu.com/6045-1/", "reference_id": "USN-6045-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6045-1/" }, { "reference_url": "https://usn.ubuntu.com/6047-1/", "reference_id": "USN-6047-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6047-1/" }, { "reference_url": "https://usn.ubuntu.com/6051-1/", "reference_id": "USN-6051-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6051-1/" }, { "reference_url": "https://usn.ubuntu.com/6052-1/", "reference_id": "USN-6052-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6052-1/" }, { "reference_url": "https://usn.ubuntu.com/6058-1/", "reference_id": "USN-6058-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6058-1/" }, { "reference_url": "https://usn.ubuntu.com/6069-1/", "reference_id": "USN-6069-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6069-1/" }, { "reference_url": "https://usn.ubuntu.com/6070-1/", "reference_id": "USN-6070-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6070-1/" }, { "reference_url": "https://usn.ubuntu.com/6071-1/", "reference_id": "USN-6071-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6071-1/" }, { "reference_url": "https://usn.ubuntu.com/6072-1/", "reference_id": "USN-6072-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6072-1/" }, { "reference_url": "https://usn.ubuntu.com/6093-1/", "reference_id": "USN-6093-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6093-1/" }, { "reference_url": "https://usn.ubuntu.com/6107-1/", "reference_id": "USN-6107-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6107-1/" }, { "reference_url": "https://usn.ubuntu.com/6133-1/", "reference_id": "USN-6133-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6133-1/" }, { "reference_url": "https://usn.ubuntu.com/6134-1/", "reference_id": "USN-6134-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6134-1/" }, { "reference_url": "https://usn.ubuntu.com/6222-1/", "reference_id": "USN-6222-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6222-1/" }, { "reference_url": "https://usn.ubuntu.com/6256-1/", "reference_id": "USN-6256-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6256-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-1829" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qyu7-kx5f-8qek" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4355?format=api", "vulnerability_id": "VCID-rrkb-m7jz-1fgj", "summary": "x86/AMD: Zenbleed", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-20593.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-20593.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-20593", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05876", "scoring_system": "epss", "scoring_elements": "0.90578", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05876", "scoring_system": "epss", "scoring_elements": "0.90598", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.05876", "scoring_system": "epss", "scoring_elements": "0.90572", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05876", "scoring_system": "epss", "scoring_elements": "0.9059", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05876", "scoring_system": "epss", "scoring_elements": "0.90602", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.06027", "scoring_system": "epss", "scoring_elements": "0.90735", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0632", "scoring_system": "epss", "scoring_elements": "0.90937", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0632", "scoring_system": "epss", "scoring_elements": "0.90928", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0632", "scoring_system": "epss", "scoring_elements": "0.90965", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0632", "scoring_system": "epss", "scoring_elements": "0.90959", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0632", "scoring_system": "epss", "scoring_elements": "0.90948", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-20593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20593", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3390", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3390" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3610", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3610" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/07/25/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/07/25/1" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/07/26/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/07/26/1" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041863", "reference_id": "1041863", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041863" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/22/11", "reference_id": "11", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/09/22/11" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/07/25/12", "reference_id": "12", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/07/25/12" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/07/25/13", "reference_id": "13", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/07/25/13" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/07/25/14", "reference_id": "14", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/07/25/14" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/07/25/15", "reference_id": "15", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/07/25/15" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/07/25/16", "reference_id": "16", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/07/25/16" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/07/25/17", "reference_id": "17", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/07/25/17" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/07/31/2", "reference_id": "2", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/07/31/2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2217845", "reference_id": "2217845", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2217845" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/07/24/3", "reference_id": "3", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/07/24/3" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/08/16/4", "reference_id": "4", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/08/16/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/25/4", "reference_id": "4", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/09/25/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/07/25/5", "reference_id": "5", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/07/25/5" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/08/16/5", "reference_id": "5", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/08/16/5" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/07/25/6", "reference_id": "6", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/07/25/6" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/08/08/6", "reference_id": "6", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/08/08/6" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/08/08/7", "reference_id": "7", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/08/08/7" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/25/7", "reference_id": "7", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/09/25/7" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/08/08/8", "reference_id": "8", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/08/08/8" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/22/9", "reference_id": "9", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/09/22/9" }, { "reference_url": "http://xenbits.xen.org/xsa/advisory-433.html", "reference_id": "advisory-433.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/" } ], "url": "http://xenbits.xen.org/xsa/advisory-433.html" }, { "reference_url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7008", "reference_id": "AMD-SB-7008", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/" } ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7008" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP6WQO3CDPLE5O635N7TAL5KCZ6HZ4FE/", "reference_id": "CP6WQO3CDPLE5O635N7TAL5KCZ6HZ4FE", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP6WQO3CDPLE5O635N7TAL5KCZ6HZ4FE/" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5459", "reference_id": "dsa-5459", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5459" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5461", "reference_id": "dsa-5461", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5461" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5462", "reference_id": "dsa-5462", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5462" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/", "reference_id": "HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html", "reference_id": "msg00001.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html", "reference_id": "msg00030.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00033.html", "reference_id": "msg00033.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00033.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240531-0004/", "reference_id": "ntap-20240531-0004", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240531-0004/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4696", "reference_id": "RHSA-2023:4696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4696" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4699", "reference_id": "RHSA-2023:4699", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4699" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4789", "reference_id": "RHSA-2023:4789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4819", "reference_id": "RHSA-2023:4819", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4819" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4821", "reference_id": "RHSA-2023:4821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4821" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5068", "reference_id": "RHSA-2023:5068", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5068" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5069", "reference_id": "RHSA-2023:5069", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5069" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5091", "reference_id": "RHSA-2023:5091", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5091" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5244", "reference_id": "RHSA-2023:5244", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5244" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5245", "reference_id": "RHSA-2023:5245", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5245" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5255", "reference_id": "RHSA-2023:5255", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5255" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5419", "reference_id": "RHSA-2023:5419", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5419" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5591", "reference_id": "RHSA-2023:5591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5607", "reference_id": "RHSA-2023:5607", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5607" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7244", "reference_id": "RHSA-2023:7244", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7244" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7382", "reference_id": "RHSA-2023:7382", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7382" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7389", "reference_id": "RHSA-2023:7389", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7389" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7401", "reference_id": "RHSA-2023:7401", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7401" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7513", "reference_id": "RHSA-2023:7513", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7513" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7551", "reference_id": "RHSA-2023:7551", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7551" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7557", "reference_id": "RHSA-2023:7557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7665", "reference_id": "RHSA-2023:7665", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7665" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7782", "reference_id": "RHSA-2023:7782", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0402", "reference_id": "RHSA-2024:0402", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0402" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0403", "reference_id": "RHSA-2024:0403", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0403" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0561", "reference_id": "RHSA-2024:0561", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0561" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD2G74BXS2SWOE3FIQJ6X76S3A7PDGML/", "reference_id": "SD2G74BXS2SWOE3FIQJ6X76S3A7PDGML", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD2G74BXS2SWOE3FIQJ6X76S3A7PDGML/" }, { "reference_url": "https://usn.ubuntu.com/6244-1/", "reference_id": "USN-6244-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6244-1/" }, { "reference_url": "https://usn.ubuntu.com/6315-1/", "reference_id": "USN-6315-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6315-1/" }, { "reference_url": "https://usn.ubuntu.com/6316-1/", "reference_id": "USN-6316-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6316-1/" }, { "reference_url": "https://usn.ubuntu.com/6317-1/", "reference_id": "USN-6317-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6317-1/" }, { "reference_url": "https://usn.ubuntu.com/6318-1/", "reference_id": "USN-6318-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6318-1/" }, { "reference_url": "https://usn.ubuntu.com/6321-1/", "reference_id": "USN-6321-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6321-1/" }, { "reference_url": "https://usn.ubuntu.com/6324-1/", "reference_id": "USN-6324-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6324-1/" }, { "reference_url": "https://usn.ubuntu.com/6325-1/", "reference_id": "USN-6325-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6325-1/" }, { "reference_url": "https://usn.ubuntu.com/6328-1/", "reference_id": "USN-6328-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6328-1/" }, { "reference_url": "https://usn.ubuntu.com/6329-1/", "reference_id": "USN-6329-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6329-1/" }, { "reference_url": "https://usn.ubuntu.com/6330-1/", "reference_id": "USN-6330-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6330-1/" }, { "reference_url": "https://usn.ubuntu.com/6331-1/", "reference_id": "USN-6331-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6331-1/" }, { "reference_url": "https://usn.ubuntu.com/6332-1/", "reference_id": "USN-6332-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6332-1/" }, { "reference_url": "https://usn.ubuntu.com/6342-1/", "reference_id": "USN-6342-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6342-1/" }, { "reference_url": "https://usn.ubuntu.com/6342-2/", "reference_id": "USN-6342-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6342-2/" }, { "reference_url": "https://usn.ubuntu.com/6346-1/", "reference_id": "USN-6346-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6346-1/" }, { "reference_url": "https://usn.ubuntu.com/6348-1/", "reference_id": "USN-6348-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6348-1/" }, { "reference_url": "https://usn.ubuntu.com/6357-1/", "reference_id": "USN-6357-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6357-1/" }, { "reference_url": "https://usn.ubuntu.com/6385-1/", "reference_id": "USN-6385-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6385-1/" }, { "reference_url": "https://usn.ubuntu.com/6397-1/", "reference_id": "USN-6397-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6397-1/" }, { "reference_url": "https://usn.ubuntu.com/6532-1/", "reference_id": "USN-6532-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6532-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-433.html", "reference_id": "XSA-433", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-433.html" }, { "reference_url": "https://cmpxchg8b.com/zenbleed.html", "reference_id": "zenbleed.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T16:07:50Z/" } ], "url": "https://cmpxchg8b.com/zenbleed.html" } ], "fixed_packages": [], "aliases": [ "CVE-2023-20593", "XSA-433" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rrkb-m7jz-1fgj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78523?format=api", "vulnerability_id": "VCID-t7q4-3b72-u3a5", "summary": "kernel: OOB access in the Linux kernel's XFS subsystem", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2124.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2124.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2124", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05463", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.0554", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05578", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05601", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05574", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05555", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05504", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05513", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05562", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05505", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.06131", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.06163", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.06171", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187439", "reference_id": "2187439", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187439" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3708", "reference_id": "RHSA-2023:3708", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3708" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3723", "reference_id": "RHSA-2023:3723", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3723" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4137", "reference_id": "RHSA-2023:4137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4137" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4138", "reference_id": "RHSA-2023:4138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4138" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4515", "reference_id": "RHSA-2023:4515", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4515" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4517", "reference_id": "RHSA-2023:4517", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4517" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4541", "reference_id": "RHSA-2023:4541", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4541" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4789", "reference_id": "RHSA-2023:4789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4815", "reference_id": "RHSA-2023:4815", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4815" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4817", "reference_id": "RHSA-2023:4817", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4817" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4961", "reference_id": "RHSA-2023:4961", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4961" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4962", "reference_id": "RHSA-2023:4962", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4962" }, { "reference_url": "https://usn.ubuntu.com/6206-1/", "reference_id": "USN-6206-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6206-1/" }, { "reference_url": "https://usn.ubuntu.com/6224-1/", "reference_id": "USN-6224-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6224-1/" }, { "reference_url": "https://usn.ubuntu.com/6228-1/", "reference_id": "USN-6228-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6228-1/" }, { "reference_url": "https://usn.ubuntu.com/6231-1/", "reference_id": "USN-6231-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6231-1/" }, { "reference_url": "https://usn.ubuntu.com/6235-1/", "reference_id": "USN-6235-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6235-1/" }, { "reference_url": "https://usn.ubuntu.com/6252-1/", "reference_id": "USN-6252-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6252-1/" }, { "reference_url": "https://usn.ubuntu.com/6254-1/", "reference_id": "USN-6254-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6254-1/" }, { "reference_url": "https://usn.ubuntu.com/6284-1/", "reference_id": "USN-6284-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6284-1/" }, { "reference_url": "https://usn.ubuntu.com/6300-1/", "reference_id": "USN-6300-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6300-1/" }, { "reference_url": "https://usn.ubuntu.com/6301-1/", "reference_id": "USN-6301-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6301-1/" }, { "reference_url": "https://usn.ubuntu.com/6311-1/", "reference_id": "USN-6311-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6311-1/" }, { "reference_url": "https://usn.ubuntu.com/6312-1/", "reference_id": "USN-6312-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6312-1/" }, { "reference_url": "https://usn.ubuntu.com/6314-1/", "reference_id": "USN-6314-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6314-1/" }, { "reference_url": "https://usn.ubuntu.com/6331-1/", "reference_id": "USN-6331-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6331-1/" }, { "reference_url": "https://usn.ubuntu.com/6332-1/", "reference_id": "USN-6332-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6332-1/" }, { "reference_url": "https://usn.ubuntu.com/6337-1/", "reference_id": "USN-6337-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6337-1/" }, { "reference_url": "https://usn.ubuntu.com/6347-1/", "reference_id": "USN-6347-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6347-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-2124" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t7q4-3b72-u3a5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79544?format=api", "vulnerability_id": "VCID-u8bs-4aab-z3fu", "summary": "kernel: save/restore speculative MSRs during S3 suspend/resume", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1637.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1637.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1637", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.0201", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02018", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.0202", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02016", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02035", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02003", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.01999", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02891", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03006", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02994", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03044", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.0288", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.0301", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1637" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1637", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1637" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2181891", "reference_id": "2181891", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2181891" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e2a1256b17b16f9b9adf1b6fea56819e7b68e463", "reference_id": "?id=e2a1256b17b16f9b9adf1b6fea56819e7b68e463", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-19T21:05:36Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e2a1256b17b16f9b9adf1b6fea56819e7b68e463" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4789", "reference_id": "RHSA-2023:4789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5069", "reference_id": "RHSA-2023:5069", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5069" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5091", "reference_id": "RHSA-2023:5091", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5091" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5244", "reference_id": "RHSA-2023:5244", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5244" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5255", "reference_id": "RHSA-2023:5255", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5255" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5628", "reference_id": "RHSA-2023:5628", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5628" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5794", "reference_id": "RHSA-2023:5794", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5794" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=27398", "reference_id": "show_bug.cgi?id=27398", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-19T21:05:36Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=27398" } ], "fixed_packages": [], "aliases": [ "CVE-2023-1637" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u8bs-4aab-z3fu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80668?format=api", "vulnerability_id": "VCID-xp56-daaq-r7fg", "summary": "kernel: when setting font with malicious data by ioctl PIO_FONT, kernel will write memory out of bounds", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33656.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33656.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33656", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08573", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.086", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08652", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.0857", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08644", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08668", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08666", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08643", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.0863", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.0852", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08507", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08659", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08671", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08626", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08627", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33656" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108696", "reference_id": "2108696", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108696" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2736", "reference_id": "RHSA-2023:2736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951", "reference_id": "RHSA-2023:2951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4789", "reference_id": "RHSA-2023:4789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4789" }, { "reference_url": "https://usn.ubuntu.com/5580-1/", "reference_id": "USN-5580-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5580-1/" }, { "reference_url": "https://usn.ubuntu.com/5589-1/", "reference_id": "USN-5589-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5589-1/" }, { "reference_url": "https://usn.ubuntu.com/5591-1/", "reference_id": "USN-5591-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5591-1/" }, { "reference_url": "https://usn.ubuntu.com/5591-2/", "reference_id": "USN-5591-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5591-2/" }, { "reference_url": "https://usn.ubuntu.com/5591-3/", "reference_id": "USN-5591-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5591-3/" }, { "reference_url": "https://usn.ubuntu.com/5591-4/", "reference_id": "USN-5591-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5591-4/" }, { "reference_url": "https://usn.ubuntu.com/5592-1/", "reference_id": "USN-5592-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5592-1/" }, { "reference_url": "https://usn.ubuntu.com/5595-1/", "reference_id": "USN-5595-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5595-1/" }, { "reference_url": "https://usn.ubuntu.com/5597-1/", "reference_id": "USN-5597-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5597-1/" }, { "reference_url": "https://usn.ubuntu.com/5598-1/", "reference_id": "USN-5598-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5598-1/" }, { "reference_url": "https://usn.ubuntu.com/5600-1/", "reference_id": "USN-5600-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5600-1/" }, { "reference_url": "https://usn.ubuntu.com/5603-1/", "reference_id": "USN-5603-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5603-1/" }, { "reference_url": "https://usn.ubuntu.com/5605-1/", "reference_id": "USN-5605-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5605-1/" }, { "reference_url": "https://usn.ubuntu.com/5650-1/", "reference_id": "USN-5650-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5650-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-33656" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xp56-daaq-r7fg" } ], "fixing_vulnerabilities": [], "risk_score": "4.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-372.70.1%3Farch=el8_6" }