Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/90956?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/90956?format=api", "purl": "pkg:rpm/redhat/kernel@5.14.0-70.85.1?arch=el9_0", "type": "rpm", "namespace": "redhat", "name": "kernel", "version": "5.14.0-70.85.1", "qualifiers": { "arch": "el9_0" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79543?format=api", "vulnerability_id": "VCID-3nwm-cb6f-vkbv", "summary": "kernel: null-ptr-deref vulnerabilities in sl_tx_timeout in drivers/net/slip", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41858.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41858.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-41858", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02761", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02926", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02855", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02843", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.029", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02873", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.0289", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02776", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02783", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02787", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02806", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02777", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02758", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02754", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02738", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.0275", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02861", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-41858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41858", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41858" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2144379", "reference_id": "2144379", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2144379" }, { "reference_url": "https://github.com/torvalds/linux/commit/ec4eb8a86ade4d22633e1da2a7d85a846b7d1798", "reference_id": "ec4eb8a86ade4d22633e1da2a7d85a846b7d1798", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-07T16:46:04Z/" } ], "url": "https://github.com/torvalds/linux/commit/ec4eb8a86ade4d22633e1da2a7d85a846b7d1798" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230223-0006/", "reference_id": "ntap-20230223-0006", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-07T16:46:04Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230223-0006/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0412", "reference_id": "RHSA-2024:0412", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0412" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0431", "reference_id": "RHSA-2024:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0432", "reference_id": "RHSA-2024:0432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0439", "reference_id": "RHSA-2024:0439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0439" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0448", "reference_id": "RHSA-2024:0448", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0448" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0461", "reference_id": "RHSA-2024:0461", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0461" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0881", "reference_id": "RHSA-2024:0881", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0881" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0897", "reference_id": "RHSA-2024:0897", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0897" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1268", "reference_id": "RHSA-2024:1268", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1268" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1269", "reference_id": "RHSA-2024:1269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1269" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1367", "reference_id": "RHSA-2024:1367", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1367" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1382", "reference_id": "RHSA-2024:1382", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1382" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1404", "reference_id": "RHSA-2024:1404", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1404" }, { "reference_url": "https://usn.ubuntu.com/5884-1/", "reference_id": "USN-5884-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5884-1/" }, { "reference_url": "https://usn.ubuntu.com/5926-1/", "reference_id": "USN-5926-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5926-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-41858" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3nwm-cb6f-vkbv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78981?format=api", "vulnerability_id": "VCID-6jc4-7c8b-4bhv", "summary": "kernel: use-after-free caused by invalid pointer hostname in fs/cifs/connect.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1195.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1195.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1195", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04075", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04309", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04263", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04245", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04272", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04093", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04108", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04113", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04132", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04116", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04102", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04076", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04058", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04069", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.0419", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04202", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04221", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1195" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/torvalds/linux/commit/153695d36ead0ccc4d0256953c751cabf673e621", "reference_id": "153695d36ead0ccc4d0256953c751cabf673e621", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:57Z/" } ], "url": "https://github.com/torvalds/linux/commit/153695d36ead0ccc4d0256953c751cabf673e621" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154171", "reference_id": "2154171", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154171" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2148", "reference_id": "RHSA-2023:2148", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2458", "reference_id": "RHSA-2023:2458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2736", "reference_id": "RHSA-2023:2736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951", "reference_id": "RHSA-2023:2951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0412", "reference_id": "RHSA-2024:0412", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0412" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0431", "reference_id": "RHSA-2024:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0432", "reference_id": "RHSA-2024:0432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0432" }, { "reference_url": "https://usn.ubuntu.com/5970-1/", "reference_id": "USN-5970-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5970-1/" }, { "reference_url": "https://usn.ubuntu.com/5979-1/", "reference_id": "USN-5979-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5979-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-1195" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6jc4-7c8b-4bhv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78131?format=api", "vulnerability_id": "VCID-b7em-hmb3-4yhp", "summary": "kernel: IGB driver inadequate buffer size for frames larger than MTU", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45871.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45871.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-45871", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06835", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06883", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06868", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06922", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06953", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06951", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06944", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.0694", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06875", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06858", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.07001", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06989", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06992", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06957", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06977", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.07128", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.07217", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-45871" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45871", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45871" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2244723", "reference_id": "2244723", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2244723" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7734", "reference_id": "RHSA-2023:7734", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7734" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7749", "reference_id": "RHSA-2023:7749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7749" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0378", "reference_id": "RHSA-2024:0378", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0378" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0381", "reference_id": "RHSA-2024:0381", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0381" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0386", "reference_id": "RHSA-2024:0386", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0386" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0412", "reference_id": "RHSA-2024:0412", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0412" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0431", "reference_id": "RHSA-2024:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0432", "reference_id": "RHSA-2024:0432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0439", "reference_id": "RHSA-2024:0439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0439" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0448", "reference_id": "RHSA-2024:0448", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0448" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0554", "reference_id": "RHSA-2024:0554", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0554" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0562", "reference_id": "RHSA-2024:0562", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0562" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0563", "reference_id": "RHSA-2024:0563", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0563" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0575", "reference_id": "RHSA-2024:0575", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0575" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0593", "reference_id": "RHSA-2024:0593", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0593" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0876", "reference_id": "RHSA-2024:0876", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0876" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0881", "reference_id": "RHSA-2024:0881", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0881" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0897", "reference_id": "RHSA-2024:0897", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0897" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0980", "reference_id": "RHSA-2024:0980", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0980" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0999", "reference_id": "RHSA-2024:0999", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0999" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1249", "reference_id": "RHSA-2024:1249", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1249" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1268", "reference_id": "RHSA-2024:1268", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1268" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1269", "reference_id": "RHSA-2024:1269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1269" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1278", "reference_id": "RHSA-2024:1278", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1278" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1323", "reference_id": "RHSA-2024:1323", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1323" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1332", "reference_id": "RHSA-2024:1332", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1332" }, { "reference_url": "https://usn.ubuntu.com/6494-1/", "reference_id": "USN-6494-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6494-1/" }, { "reference_url": "https://usn.ubuntu.com/6494-2/", "reference_id": "USN-6494-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6494-2/" }, { "reference_url": "https://usn.ubuntu.com/6495-1/", "reference_id": "USN-6495-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6495-1/" }, { "reference_url": "https://usn.ubuntu.com/6495-2/", "reference_id": "USN-6495-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6495-2/" }, { "reference_url": "https://usn.ubuntu.com/6496-1/", "reference_id": "USN-6496-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6496-1/" }, { "reference_url": "https://usn.ubuntu.com/6496-2/", "reference_id": "USN-6496-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6496-2/" }, { "reference_url": "https://usn.ubuntu.com/6502-1/", "reference_id": "USN-6502-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6502-1/" }, { "reference_url": "https://usn.ubuntu.com/6502-2/", "reference_id": "USN-6502-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6502-2/" }, { "reference_url": "https://usn.ubuntu.com/6502-3/", "reference_id": "USN-6502-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6502-3/" }, { "reference_url": "https://usn.ubuntu.com/6502-4/", "reference_id": "USN-6502-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6502-4/" }, { "reference_url": "https://usn.ubuntu.com/6516-1/", "reference_id": "USN-6516-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6516-1/" }, { "reference_url": "https://usn.ubuntu.com/6520-1/", "reference_id": "USN-6520-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6520-1/" }, { "reference_url": "https://usn.ubuntu.com/6532-1/", "reference_id": "USN-6532-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6532-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-45871" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b7em-hmb3-4yhp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78096?format=api", "vulnerability_id": "VCID-j4xv-b39v-kfdn", "summary": "kernel: use-after-free in netfilter: nf_tables", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3777.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3777.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3777", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10717", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10514", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.1065", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12332", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12445", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12451", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12417", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12307", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18557", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18501", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18801", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18598", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18651", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18655", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18608", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18518", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18747", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3777" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3777", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3777" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237750", "reference_id": "2237750", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237750" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0431", "reference_id": "RHSA-2024:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0432", "reference_id": "RHSA-2024:0432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0439", "reference_id": "RHSA-2024:0439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0439" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0448", "reference_id": "RHSA-2024:0448", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0448" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0461", "reference_id": "RHSA-2024:0461", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0461" }, { "reference_url": "https://usn.ubuntu.com/6315-1/", "reference_id": "USN-6315-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6315-1/" }, { "reference_url": "https://usn.ubuntu.com/6316-1/", "reference_id": "USN-6316-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6316-1/" }, { "reference_url": "https://usn.ubuntu.com/6318-1/", "reference_id": "USN-6318-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6318-1/" }, { "reference_url": "https://usn.ubuntu.com/6321-1/", "reference_id": "USN-6321-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6321-1/" }, { "reference_url": "https://usn.ubuntu.com/6325-1/", "reference_id": "USN-6325-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6325-1/" }, { "reference_url": "https://usn.ubuntu.com/6328-1/", "reference_id": "USN-6328-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6328-1/" }, { "reference_url": "https://usn.ubuntu.com/6330-1/", "reference_id": "USN-6330-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6330-1/" }, { "reference_url": "https://usn.ubuntu.com/6332-1/", "reference_id": "USN-6332-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6332-1/" }, { "reference_url": "https://usn.ubuntu.com/6348-1/", "reference_id": "USN-6348-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6348-1/" }, { "reference_url": "https://usn.ubuntu.com/6385-1/", "reference_id": "USN-6385-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6385-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-3777" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j4xv-b39v-kfdn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78098?format=api", "vulnerability_id": "VCID-mxda-6yrb-ukgb", "summary": "kernel: net/sched: sch_hfsc UAF", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4623.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4623.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4623", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04512", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04229", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04264", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04235", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04244", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.0437", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04387", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04407", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04446", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04447", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04476", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04249", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04262", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04293", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04309", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.043", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04286", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4623" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237757", "reference_id": "2237757", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237757" }, { "reference_url": "https://kernel.dance/b3d26c5702c7d6c45456326e56d2ccf3f103e60f", "reference_id": "b3d26c5702c7d6c45456326e56d2ccf3f103e60f", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-26T21:52:35Z/" } ], "url": "https://kernel.dance/b3d26c5702c7d6c45456326e56d2ccf3f103e60f" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b3d26c5702c7d6c45456326e56d2ccf3f103e60f", "reference_id": "?id=b3d26c5702c7d6c45456326e56d2ccf3f103e60f", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-26T21:52:35Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b3d26c5702c7d6c45456326e56d2ccf3f103e60f" }, { "reference_url": "http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html", "reference_id": "Kernel-Live-Patch-Security-Notice-LSN-0099-1.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-26T21:52:35Z/" } ], "url": "http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html", "reference_id": "msg00004.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-26T21:52:35Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html", "reference_id": "msg00027.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-26T21:52:35Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0340", "reference_id": "RHSA-2024:0340", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0340" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0378", "reference_id": "RHSA-2024:0378", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0378" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0381", "reference_id": "RHSA-2024:0381", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0381" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0386", "reference_id": "RHSA-2024:0386", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0386" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0412", "reference_id": "RHSA-2024:0412", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0412" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0431", "reference_id": "RHSA-2024:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0432", "reference_id": "RHSA-2024:0432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0439", "reference_id": "RHSA-2024:0439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0439" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0448", "reference_id": "RHSA-2024:0448", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0448" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0461", "reference_id": "RHSA-2024:0461", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0461" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0554", "reference_id": "RHSA-2024:0554", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0554" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0562", "reference_id": "RHSA-2024:0562", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0562" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0563", "reference_id": "RHSA-2024:0563", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0563" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0575", "reference_id": "RHSA-2024:0575", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0575" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0593", "reference_id": "RHSA-2024:0593", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0593" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0876", "reference_id": "RHSA-2024:0876", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0876" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0881", "reference_id": "RHSA-2024:0881", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0881" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0897", "reference_id": "RHSA-2024:0897", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0897" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1268", "reference_id": "RHSA-2024:1268", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1268" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1269", "reference_id": "RHSA-2024:1269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1269" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1278", "reference_id": "RHSA-2024:1278", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1278" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1746", "reference_id": "RHSA-2024:1746", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1746" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1747", "reference_id": "RHSA-2024:1747", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1747" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1960", "reference_id": "RHSA-2024:1960", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1960" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2003", "reference_id": "RHSA-2024:2003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2004", "reference_id": "RHSA-2024:2004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2004" }, { "reference_url": "https://usn.ubuntu.com/6415-1/", "reference_id": "USN-6415-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6415-1/" }, { "reference_url": "https://usn.ubuntu.com/6439-1/", "reference_id": "USN-6439-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6439-1/" }, { "reference_url": "https://usn.ubuntu.com/6439-2/", "reference_id": "USN-6439-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6439-2/" }, { "reference_url": "https://usn.ubuntu.com/6440-1/", "reference_id": "USN-6440-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6440-1/" }, { "reference_url": "https://usn.ubuntu.com/6440-2/", "reference_id": "USN-6440-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6440-2/" }, { "reference_url": "https://usn.ubuntu.com/6440-3/", "reference_id": "USN-6440-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6440-3/" }, { "reference_url": "https://usn.ubuntu.com/6441-1/", "reference_id": "USN-6441-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6441-1/" }, { "reference_url": "https://usn.ubuntu.com/6441-2/", "reference_id": "USN-6441-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6441-2/" }, { "reference_url": "https://usn.ubuntu.com/6441-3/", "reference_id": "USN-6441-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6441-3/" }, { "reference_url": "https://usn.ubuntu.com/6442-1/", "reference_id": "USN-6442-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6442-1/" }, { "reference_url": "https://usn.ubuntu.com/6444-1/", "reference_id": "USN-6444-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6444-1/" }, { "reference_url": "https://usn.ubuntu.com/6444-2/", "reference_id": "USN-6444-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6444-2/" }, { "reference_url": "https://usn.ubuntu.com/6445-1/", "reference_id": "USN-6445-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6445-1/" }, { "reference_url": "https://usn.ubuntu.com/6445-2/", "reference_id": "USN-6445-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6445-2/" }, { "reference_url": "https://usn.ubuntu.com/6446-1/", "reference_id": "USN-6446-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6446-1/" }, { "reference_url": "https://usn.ubuntu.com/6446-2/", "reference_id": "USN-6446-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6446-2/" }, { "reference_url": "https://usn.ubuntu.com/6446-3/", "reference_id": "USN-6446-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6446-3/" }, { "reference_url": "https://usn.ubuntu.com/6460-1/", "reference_id": "USN-6460-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6460-1/" }, { "reference_url": "https://usn.ubuntu.com/6466-1/", "reference_id": "USN-6466-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6466-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-4623" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mxda-6yrb-ukgb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70679?format=api", "vulnerability_id": "VCID-nuaz-vadj-uyg8", "summary": "kernel: scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52974.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52974.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52974", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.01127", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.01129", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07967", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.08013", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07972", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.08032", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.08051", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.08034", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.08015", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07999", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07912", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07894", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.08056", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.0801", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07977", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07951", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14064", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52974" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52974", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52974" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.kernel.org/stable/c/0aaabdb900c7415caa2006ef580322f7eac5f6b6", "reference_id": "0aaabdb900c7415caa2006ef580322f7eac5f6b6", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-27T16:59:50Z/" } ], "url": "https://git.kernel.org/stable/c/0aaabdb900c7415caa2006ef580322f7eac5f6b6" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355469", "reference_id": "2355469", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355469" }, { "reference_url": "https://git.kernel.org/stable/c/496af9d3682ed4c28fb734342a09e6cc0c056ea4", "reference_id": "496af9d3682ed4c28fb734342a09e6cc0c056ea4", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-27T16:59:50Z/" } ], "url": "https://git.kernel.org/stable/c/496af9d3682ed4c28fb734342a09e6cc0c056ea4" }, { "reference_url": "https://git.kernel.org/stable/c/61e43ebfd243bcbad11be26bd921723027b77441", "reference_id": "61e43ebfd243bcbad11be26bd921723027b77441", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-27T16:59:50Z/" } ], "url": "https://git.kernel.org/stable/c/61e43ebfd243bcbad11be26bd921723027b77441" }, { "reference_url": "https://git.kernel.org/stable/c/6abd4698f4c8a78e7bbfc421205c060c199554a0", "reference_id": "6abd4698f4c8a78e7bbfc421205c060c199554a0", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-27T16:59:50Z/" } ], "url": "https://git.kernel.org/stable/c/6abd4698f4c8a78e7bbfc421205c060c199554a0" }, { "reference_url": "https://git.kernel.org/stable/c/9758ffe1c07b86aefd7ca8e40d9a461293427ca0", "reference_id": "9758ffe1c07b86aefd7ca8e40d9a461293427ca0", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-27T16:59:50Z/" } ], "url": "https://git.kernel.org/stable/c/9758ffe1c07b86aefd7ca8e40d9a461293427ca0" }, { "reference_url": "https://git.kernel.org/stable/c/d4d765f4761f9e3a2d62992f825aeee593bcb6b9", "reference_id": "d4d765f4761f9e3a2d62992f825aeee593bcb6b9", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-27T16:59:50Z/" } ], "url": "https://git.kernel.org/stable/c/d4d765f4761f9e3a2d62992f825aeee593bcb6b9" }, { "reference_url": "https://git.kernel.org/stable/c/f484a794e4ee2a9ce61f52a78e810ac45f3fe3b3", "reference_id": "f484a794e4ee2a9ce61f52a78e810ac45f3fe3b3", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-27T16:59:50Z/" } ], "url": "https://git.kernel.org/stable/c/f484a794e4ee2a9ce61f52a78e810ac45f3fe3b3" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0431", "reference_id": "RHSA-2024:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0432", "reference_id": "RHSA-2024:0432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0575", "reference_id": "RHSA-2024:0575", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0575" } ], "fixed_packages": [], "aliases": [ "CVE-2023-52974" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nuaz-vadj-uyg8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70725?format=api", "vulnerability_id": "VCID-ppf4-65p3-f7gq", "summary": "kernel: scsi: iscsi_tcp: Fix UAF during logout when accessing the shost ipaddress", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52975.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52975.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52975", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.06168", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.06103", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.1914", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19041", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19049", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19002", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.1895", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18904", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18917", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18928", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18819", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18798", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18753", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19192", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18908", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18988", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.36541", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52975" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52975", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52975" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.kernel.org/stable/c/0af745fddefbd56198f4f35eb309215ee5f9e21e", "reference_id": "0af745fddefbd56198f4f35eb309215ee5f9e21e", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-27T16:59:46Z/" } ], "url": "https://git.kernel.org/stable/c/0af745fddefbd56198f4f35eb309215ee5f9e21e" }, { "reference_url": "https://git.kernel.org/stable/c/17b738590b97fb3fc287289971d1519ff9b875a1", "reference_id": "17b738590b97fb3fc287289971d1519ff9b875a1", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-27T16:59:46Z/" } ], "url": "https://git.kernel.org/stable/c/17b738590b97fb3fc287289971d1519ff9b875a1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355519", "reference_id": "2355519", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355519" }, { "reference_url": "https://git.kernel.org/stable/c/6f1d64b13097e85abda0f91b5638000afc5f9a06", "reference_id": "6f1d64b13097e85abda0f91b5638000afc5f9a06", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-27T16:59:46Z/" } ], "url": "https://git.kernel.org/stable/c/6f1d64b13097e85abda0f91b5638000afc5f9a06" }, { "reference_url": "https://git.kernel.org/stable/c/8859687f5b242c0b057461df0a9ff51d5500783b", "reference_id": "8859687f5b242c0b057461df0a9ff51d5500783b", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-27T16:59:46Z/" } ], "url": "https://git.kernel.org/stable/c/8859687f5b242c0b057461df0a9ff51d5500783b" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0431", "reference_id": "RHSA-2024:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0432", "reference_id": "RHSA-2024:0432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0575", "reference_id": "RHSA-2024:0575", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0575" }, { "reference_url": "https://usn.ubuntu.com/7684-1/", "reference_id": "USN-7684-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7684-1/" }, { "reference_url": "https://usn.ubuntu.com/7684-2/", "reference_id": "USN-7684-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7684-2/" }, { "reference_url": "https://usn.ubuntu.com/7684-3/", "reference_id": "USN-7684-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7684-3/" }, { "reference_url": "https://usn.ubuntu.com/7685-1/", "reference_id": "USN-7685-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7685-1/" }, { "reference_url": "https://usn.ubuntu.com/7685-2/", "reference_id": "USN-7685-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7685-2/" }, { "reference_url": "https://usn.ubuntu.com/7685-3/", "reference_id": "USN-7685-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7685-3/" }, { "reference_url": "https://usn.ubuntu.com/7685-4/", "reference_id": "USN-7685-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7685-4/" }, { "reference_url": "https://usn.ubuntu.com/7685-5/", "reference_id": "USN-7685-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7685-5/" }, { "reference_url": "https://usn.ubuntu.com/7701-1/", "reference_id": "USN-7701-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7701-1/" }, { "reference_url": "https://usn.ubuntu.com/7701-2/", "reference_id": "USN-7701-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7701-2/" }, { "reference_url": "https://usn.ubuntu.com/7701-3/", "reference_id": "USN-7701-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7701-3/" }, { "reference_url": "https://usn.ubuntu.com/7819-1/", "reference_id": "USN-7819-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7819-1/" }, { "reference_url": "https://usn.ubuntu.com/7819-2/", "reference_id": "USN-7819-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7819-2/" }, { "reference_url": "https://usn.ubuntu.com/7832-1/", "reference_id": "USN-7832-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7832-1/" }, { "reference_url": "https://usn.ubuntu.com/7911-1/", "reference_id": "USN-7911-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7911-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-52975" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ppf4-65p3-f7gq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78027?format=api", "vulnerability_id": "VCID-s15g-xfaf-pqck", "summary": "kernel: use after free in nvmet_tcp_free_crypto in NVMe", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5178.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5178.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5178", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08634", "scoring_system": "epss", "scoring_elements": "0.92486", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.08634", "scoring_system": "epss", "scoring_elements": "0.92466", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.08634", "scoring_system": "epss", "scoring_elements": "0.92476", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.08634", "scoring_system": "epss", "scoring_elements": "0.92417", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08634", "scoring_system": "epss", "scoring_elements": "0.9242", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.08634", "scoring_system": "epss", "scoring_elements": "0.92432", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08634", "scoring_system": "epss", "scoring_elements": "0.92437", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.08634", "scoring_system": "epss", "scoring_elements": "0.92443", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08634", "scoring_system": "epss", "scoring_elements": "0.92445", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08634", "scoring_system": "epss", "scoring_elements": "0.92454", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.08634", "scoring_system": "epss", "scoring_elements": "0.92453", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.08634", "scoring_system": "epss", "scoring_elements": "0.92456", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.08634", "scoring_system": "epss", "scoring_elements": "0.92459", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.08634", "scoring_system": "epss", "scoring_elements": "0.9246", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.08634", "scoring_system": "epss", "scoring_elements": "0.92455", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.09291", "scoring_system": "epss", "scoring_elements": "0.92718", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5178" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241924", "reference_id": "2241924", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241924" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7370", "reference_id": "RHSA-2023:7370", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7370" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7379", "reference_id": "RHSA-2023:7379", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7379" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7418", "reference_id": "RHSA-2023:7418", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7418" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7548", "reference_id": "RHSA-2023:7548", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7548" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7549", "reference_id": "RHSA-2023:7549", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7549" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7551", "reference_id": "RHSA-2023:7551", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7551" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7554", "reference_id": "RHSA-2023:7554", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7554" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7557", "reference_id": "RHSA-2023:7557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7559", "reference_id": "RHSA-2023:7559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0340", "reference_id": "RHSA-2024:0340", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0340" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0378", "reference_id": "RHSA-2024:0378", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0378" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0386", "reference_id": "RHSA-2024:0386", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0386" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0412", "reference_id": "RHSA-2024:0412", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0412" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0431", "reference_id": "RHSA-2024:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0432", "reference_id": "RHSA-2024:0432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0461", "reference_id": "RHSA-2024:0461", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0461" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0554", "reference_id": "RHSA-2024:0554", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0554" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0575", "reference_id": "RHSA-2024:0575", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0575" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1268", "reference_id": "RHSA-2024:1268", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1268" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1269", "reference_id": "RHSA-2024:1269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1269" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1278", "reference_id": "RHSA-2024:1278", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1278" }, { "reference_url": "https://usn.ubuntu.com/6497-1/", "reference_id": "USN-6497-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6497-1/" }, { "reference_url": "https://usn.ubuntu.com/6534-1/", "reference_id": "USN-6534-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6534-1/" }, { "reference_url": "https://usn.ubuntu.com/6534-2/", "reference_id": "USN-6534-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6534-2/" }, { "reference_url": "https://usn.ubuntu.com/6534-3/", "reference_id": "USN-6534-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6534-3/" }, { "reference_url": "https://usn.ubuntu.com/6536-1/", "reference_id": "USN-6536-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6536-1/" }, { "reference_url": "https://usn.ubuntu.com/6537-1/", "reference_id": "USN-6537-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6537-1/" }, { "reference_url": "https://usn.ubuntu.com/6548-1/", "reference_id": "USN-6548-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6548-1/" }, { "reference_url": "https://usn.ubuntu.com/6548-2/", "reference_id": "USN-6548-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6548-2/" }, { "reference_url": "https://usn.ubuntu.com/6548-3/", "reference_id": "USN-6548-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6548-3/" }, { "reference_url": "https://usn.ubuntu.com/6548-4/", "reference_id": "USN-6548-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6548-4/" }, { "reference_url": "https://usn.ubuntu.com/6548-5/", "reference_id": "USN-6548-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6548-5/" }, { "reference_url": "https://usn.ubuntu.com/6549-1/", "reference_id": "USN-6549-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6549-1/" }, { "reference_url": "https://usn.ubuntu.com/6549-2/", "reference_id": "USN-6549-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6549-2/" }, { "reference_url": "https://usn.ubuntu.com/6549-3/", "reference_id": "USN-6549-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6549-3/" }, { "reference_url": "https://usn.ubuntu.com/6549-4/", "reference_id": "USN-6549-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6549-4/" }, { "reference_url": "https://usn.ubuntu.com/6549-5/", "reference_id": "USN-6549-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6549-5/" }, { "reference_url": "https://usn.ubuntu.com/6573-1/", "reference_id": "USN-6573-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6573-1/" }, { "reference_url": "https://usn.ubuntu.com/6635-1/", "reference_id": "USN-6635-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6635-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-5178" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s15g-xfaf-pqck" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79367?format=api", "vulnerability_id": "VCID-vqy7-37ym-eufr", "summary": "kernel: xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36879.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36879.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36879", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06944", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06975", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06971", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.0682", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06984", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06842", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.0686", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06921", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06925", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06932", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06935", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06904", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06863", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06849", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10755", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10552", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10686", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36879" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119855", "reference_id": "2119855", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119855" }, { "reference_url": "https://security.archlinux.org/AVG-2834", "reference_id": "AVG-2834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2834" }, { "reference_url": "https://security.archlinux.org/AVG-2835", "reference_id": "AVG-2835", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2835" }, { "reference_url": "https://security.archlinux.org/AVG-2836", "reference_id": "AVG-2836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2836" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=f85daf0e725358be78dfd208dea5fd665d8cb901", "reference_id": "commit?id=f85daf0e725358be78dfd208dea5fd665d8cb901", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=f85daf0e725358be78dfd208dea5fd665d8cb901" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5207", "reference_id": "dsa-5207", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5207" }, { "reference_url": "https://github.com/torvalds/linux/commit/f85daf0e725358be78dfd208dea5fd665d8cb901", "reference_id": "f85daf0e725358be78dfd208dea5fd665d8cb901", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/" } ], "url": "https://github.com/torvalds/linux/commit/f85daf0e725358be78dfd208dea5fd665d8cb901" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html", "reference_id": "msg00000.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html", "reference_id": "msg00011.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220901-0007/", "reference_id": "ntap-20220901-0007", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:30Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220901-0007/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2148", "reference_id": "RHSA-2023:2148", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2148" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2458", "reference_id": "RHSA-2023:2458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2736", "reference_id": "RHSA-2023:2736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951", "reference_id": "RHSA-2023:2951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5627", "reference_id": "RHSA-2023:5627", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5627" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0431", "reference_id": "RHSA-2024:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0432", "reference_id": "RHSA-2024:0432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0432" }, { "reference_url": "https://usn.ubuntu.com/5667-1/", "reference_id": "USN-5667-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5667-1/" }, { "reference_url": "https://usn.ubuntu.com/5668-1/", "reference_id": "USN-5668-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5668-1/" }, { "reference_url": "https://usn.ubuntu.com/5677-1/", "reference_id": "USN-5677-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5677-1/" }, { "reference_url": "https://usn.ubuntu.com/5682-1/", "reference_id": "USN-5682-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5682-1/" }, { "reference_url": "https://usn.ubuntu.com/5683-1/", "reference_id": "USN-5683-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5683-1/" }, { "reference_url": "https://usn.ubuntu.com/5703-1/", "reference_id": "USN-5703-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5703-1/" }, { "reference_url": "https://usn.ubuntu.com/5706-1/", "reference_id": "USN-5706-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5706-1/" }, { "reference_url": "https://usn.ubuntu.com/5727-1/", "reference_id": "USN-5727-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5727-1/" }, { "reference_url": "https://usn.ubuntu.com/5727-2/", "reference_id": "USN-5727-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5727-2/" }, { "reference_url": "https://usn.ubuntu.com/5774-1/", "reference_id": "USN-5774-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5774-1/" }, { "reference_url": "https://usn.ubuntu.com/5913-1/", "reference_id": "USN-5913-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5913-1/" }, { "reference_url": "https://usn.ubuntu.com/6001-1/", "reference_id": "USN-6001-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6001-1/" }, { "reference_url": "https://usn.ubuntu.com/6013-1/", "reference_id": "USN-6013-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6013-1/" }, { "reference_url": "https://usn.ubuntu.com/6014-1/", "reference_id": "USN-6014-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6014-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-36879" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vqy7-37ym-eufr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78733?format=api", "vulnerability_id": "VCID-ww12-xnsy-gyfm", "summary": "kernel: UAF during login when accessing the shost ipaddress", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2162.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2162.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2162", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.01145", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.01148", "published_at": "2026-05-07T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00828", "published_at": "2026-04-04T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.0082", "published_at": "2026-04-11T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00814", "published_at": "2026-04-12T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00815", "published_at": "2026-04-16T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00819", "published_at": "2026-04-18T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00864", "published_at": "2026-04-21T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00866", "published_at": "2026-05-05T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00869", "published_at": "2026-04-26T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00829", "published_at": "2026-04-07T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00834", "published_at": "2026-04-08T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00831", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2162" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2162", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2162" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187773", "reference_id": "2187773", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187773" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html", "reference_id": "msg00005.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:12Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html", "reference_id": "msg00006.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:12Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html" }, { "reference_url": "https://www.spinics.net/lists/linux-scsi/msg181542.html", "reference_id": "msg181542.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:56:12Z/" } ], "url": "https://www.spinics.net/lists/linux-scsi/msg181542.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0113", "reference_id": "RHSA-2024:0113", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0113" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0134", "reference_id": "RHSA-2024:0134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0402", "reference_id": "RHSA-2024:0402", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0402" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0403", "reference_id": "RHSA-2024:0403", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0403" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0412", "reference_id": "RHSA-2024:0412", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0412" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0431", "reference_id": "RHSA-2024:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0432", "reference_id": "RHSA-2024:0432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0439", "reference_id": "RHSA-2024:0439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0439" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0448", "reference_id": "RHSA-2024:0448", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0448" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0562", "reference_id": "RHSA-2024:0562", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0562" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0563", "reference_id": "RHSA-2024:0563", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0563" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0575", "reference_id": "RHSA-2024:0575", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0575" }, { "reference_url": "https://usn.ubuntu.com/6079-1/", "reference_id": "USN-6079-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6079-1/" }, { "reference_url": "https://usn.ubuntu.com/6080-1/", "reference_id": "USN-6080-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6080-1/" }, { "reference_url": "https://usn.ubuntu.com/6081-1/", "reference_id": "USN-6081-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6081-1/" }, { "reference_url": "https://usn.ubuntu.com/6084-1/", "reference_id": "USN-6084-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6084-1/" }, { "reference_url": "https://usn.ubuntu.com/6085-1/", "reference_id": "USN-6085-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6085-1/" }, { "reference_url": "https://usn.ubuntu.com/6090-1/", "reference_id": "USN-6090-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6090-1/" }, { "reference_url": "https://usn.ubuntu.com/6091-1/", "reference_id": "USN-6091-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6091-1/" }, { "reference_url": "https://usn.ubuntu.com/6092-1/", "reference_id": "USN-6092-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6092-1/" }, { "reference_url": "https://usn.ubuntu.com/6094-1/", "reference_id": "USN-6094-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6094-1/" }, { "reference_url": "https://usn.ubuntu.com/6095-1/", "reference_id": "USN-6095-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6095-1/" }, { "reference_url": "https://usn.ubuntu.com/6096-1/", "reference_id": "USN-6096-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6096-1/" }, { "reference_url": "https://usn.ubuntu.com/6109-1/", "reference_id": "USN-6109-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6109-1/" }, { "reference_url": "https://usn.ubuntu.com/6118-1/", "reference_id": "USN-6118-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6118-1/" }, { "reference_url": "https://usn.ubuntu.com/6132-1/", "reference_id": "USN-6132-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6132-1/" }, { "reference_url": "https://usn.ubuntu.com/6133-1/", "reference_id": "USN-6133-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6133-1/" }, { "reference_url": "https://usn.ubuntu.com/6134-1/", "reference_id": "USN-6134-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6134-1/" }, { "reference_url": "https://usn.ubuntu.com/6222-1/", "reference_id": "USN-6222-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6222-1/" }, { "reference_url": "https://usn.ubuntu.com/6254-1/", "reference_id": "USN-6254-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6254-1/" }, { "reference_url": "https://usn.ubuntu.com/6256-1/", "reference_id": "USN-6256-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6256-1/" }, { "reference_url": "https://usn.ubuntu.com/6385-1/", "reference_id": "USN-6385-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6385-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-2162" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ww12-xnsy-gyfm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77980?format=api", "vulnerability_id": "VCID-zcxw-xq7k-tkhx", "summary": "kernel: SEV-ES local priv escalation", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46813.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46813.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-46813", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52743", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.5277", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.56025", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.56056", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.56059", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.5607", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.56051", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.56033", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.56069", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.56072", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.56044", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.55971", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.55991", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.55966", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.55916", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.55964", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.56004", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-46813" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246944", "reference_id": "2246944", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246944" }, { "reference_url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.9", "reference_id": "ChangeLog-6.5.9", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:17Z/" } ], "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.9" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=63e44bc52047f182601e7817da969a105aa1f721", "reference_id": "?id=63e44bc52047f182601e7817da969a105aa1f721", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:17Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=63e44bc52047f182601e7817da969a105aa1f721" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a37cd2a59d0cb270b1bba568fd3a3b8668b9d3ba", "reference_id": "?id=a37cd2a59d0cb270b1bba568fd3a3b8668b9d3ba", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:17Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a37cd2a59d0cb270b1bba568fd3a3b8668b9d3ba" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b9cb9c45583b911e0db71d09caa6b56469eb2bdf", "reference_id": "?id=b9cb9c45583b911e0db71d09caa6b56469eb2bdf", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:17Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b9cb9c45583b911e0db71d09caa6b56469eb2bdf" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html", "reference_id": "msg00005.html", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:17Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0431", "reference_id": "RHSA-2024:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0432", "reference_id": "RHSA-2024:0432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0439", "reference_id": "RHSA-2024:0439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0439" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0448", "reference_id": "RHSA-2024:0448", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0448" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0461", "reference_id": "RHSA-2024:0461", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0461" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0575", "reference_id": "RHSA-2024:0575", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0575" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0724", "reference_id": "RHSA-2024:0724", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0724" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0881", "reference_id": "RHSA-2024:0881", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0881" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0897", "reference_id": "RHSA-2024:0897", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0897" }, { "reference_url": "https://bugzilla.suse.com/show_bug.cgi?id=1212649", "reference_id": "show_bug.cgi?id=1212649", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-10T04:00:17Z/" } ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1212649" }, { "reference_url": "https://usn.ubuntu.com/6533-1/", "reference_id": "USN-6533-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6533-1/" }, { "reference_url": "https://usn.ubuntu.com/6624-1/", "reference_id": "USN-6624-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6624-1/" }, { "reference_url": "https://usn.ubuntu.com/6626-1/", "reference_id": "USN-6626-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6626-1/" }, { "reference_url": "https://usn.ubuntu.com/6626-2/", "reference_id": "USN-6626-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6626-2/" }, { "reference_url": "https://usn.ubuntu.com/6626-3/", "reference_id": "USN-6626-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6626-3/" }, { "reference_url": "https://usn.ubuntu.com/6628-1/", "reference_id": "USN-6628-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6628-1/" }, { "reference_url": "https://usn.ubuntu.com/6628-2/", "reference_id": "USN-6628-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6628-2/" }, { "reference_url": "https://usn.ubuntu.com/6652-1/", "reference_id": "USN-6652-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6652-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-46813" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zcxw-xq7k-tkhx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78762?format=api", "vulnerability_id": "VCID-zph7-5zjb-quae", "summary": "kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3567.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3567.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3567", "reference_id": "", "reference_type": "", "scores": [ { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00709", "published_at": "2026-04-07T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00705", "published_at": "2026-04-04T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00708", "published_at": "2026-04-08T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00699", "published_at": "2026-04-09T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00698", "published_at": "2026-04-11T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00693", "published_at": "2026-04-12T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00692", "published_at": "2026-04-18T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00686", "published_at": "2026-04-16T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00734", "published_at": "2026-04-21T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00736", "published_at": "2026-04-29T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00737", "published_at": "2026-04-26T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00744", "published_at": "2026-05-05T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00738", "published_at": "2026-05-07T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00733", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3567" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3567", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3567" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2221463", "reference_id": "2221463", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2221463" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0412", "reference_id": "RHSA-2024:0412", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0412" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0431", "reference_id": "RHSA-2024:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0432", "reference_id": "RHSA-2024:0432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0439", "reference_id": "RHSA-2024:0439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0439" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0448", "reference_id": "RHSA-2024:0448", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0448" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0575", "reference_id": "RHSA-2024:0575", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0575" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2394", "reference_id": "RHSA-2024:2394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2950", "reference_id": "RHSA-2024:2950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3138", "reference_id": "RHSA-2024:3138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3138" }, { "reference_url": "https://usn.ubuntu.com/6309-1/", "reference_id": "USN-6309-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6309-1/" }, { "reference_url": "https://usn.ubuntu.com/6327-1/", "reference_id": "USN-6327-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6327-1/" }, { "reference_url": "https://usn.ubuntu.com/6341-1/", "reference_id": "USN-6341-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6341-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-3567" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zph7-5zjb-quae" } ], "fixing_vulnerabilities": [], "risk_score": "4.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@5.14.0-70.85.1%3Farch=el9_0" }