Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/92371?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/92371?format=api", "purl": "pkg:rpm/redhat/git-lfs@3.6.1-1?arch=el9", "type": "rpm", "namespace": "redhat", "name": "git-lfs", "version": "3.6.1-1", "qualifiers": { "arch": "el9" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42121?format=api", "vulnerability_id": "VCID-4c51-73a9-17f9", "summary": "Multiple vulnerabilities have been discovered in Go, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39322.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39322.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-39322", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12871", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12838", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12741", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12633", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12541", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12677", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12746", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12739", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12767", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12922", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12724", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12804", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12854", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12821", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12784", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12738", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.1264", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12649", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.1276", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12778", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-39322" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237778", "reference_id": "2237778", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237778" }, { "reference_url": "https://go.dev/cl/523039", "reference_id": "523039", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:53:33Z/" } ], "url": "https://go.dev/cl/523039" }, { "reference_url": "https://go.dev/issue/62266", "reference_id": "62266", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:53:33Z/" } ], "url": "https://go.dev/issue/62266" }, { "reference_url": "https://pkg.go.dev/vuln/GO-2023-2045", "reference_id": "GO-2023-2045", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:53:33Z/" } ], "url": "https://pkg.go.dev/vuln/GO-2023-2045" }, { "reference_url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ", "reference_id": "L1hdrPhfBAAJ", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:53:33Z/" } ], "url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20231020-0004/", "reference_id": "ntap-20231020-0004", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:53:33Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20231020-0004/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5009", "reference_id": "RHSA-2023:5009", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5009" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5947", "reference_id": "RHSA-2023:5947", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5947" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5974", "reference_id": "RHSA-2023:5974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5974" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6031", "reference_id": "RHSA-2023:6031", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6031" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6115", "reference_id": "RHSA-2023:6115", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6115" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6154", "reference_id": "RHSA-2023:6154", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6154" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6161", "reference_id": "RHSA-2023:6161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6840", "reference_id": "RHSA-2023:6840", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6840" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7517", "reference_id": "RHSA-2023:7517", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7517" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7762", "reference_id": "RHSA-2023:7762", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7762" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7763", "reference_id": "RHSA-2023:7763", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7763" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7764", "reference_id": "RHSA-2023:7764", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7764" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7765", "reference_id": "RHSA-2023:7765", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7765" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7766", "reference_id": "RHSA-2023:7766", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7766" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0121", "reference_id": "RHSA-2024:0121", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0121" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1383", "reference_id": "RHSA-2024:1383", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1383" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1901", "reference_id": "RHSA-2024:1901", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1901" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2988", "reference_id": "RHSA-2024:2988", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2988" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3467", "reference_id": "RHSA-2024:3467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3467" } ], "fixed_packages": [], "aliases": [ "CVE-2023-39322" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4c51-73a9-17f9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/11694?format=api", "vulnerability_id": "VCID-d97y-w562-fkab", "summary": "Golang FIPS OpenSSL has a Use of Uninitialized Variable vulnerability\nA vulnerability was found in Golang FIPS OpenSSL. This flaw allows a malicious user to randomly cause an uninitialized buffer length variable with a zeroed buffer to be returned in FIPS mode. It may also be possible to force a false positive match between non-equal hashes when comparing a trusted computed hmac sum to an untrusted input sum if an attacker can send a zeroed buffer in place of a pre-computed sum. It is also possible to force a derived key to be all zeros instead of an unpredictable value. This may have follow-on implications for the Go TLS stack.", "references": [ { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10133", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" }, { "value": "7.6", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:35:51Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:10133" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7502", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" }, { "value": "7.6", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:35:51Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:7502" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7550", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" }, { "value": "7.6", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:35:51Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:7550" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8327", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" }, { "value": "7.6", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:35:51Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:8327" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8678", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" }, { "value": "7.6", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:35:51Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:8678" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8847", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" }, { "value": "7.6", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:35:51Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:8847" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9551", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" }, { "value": "7.6", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:35:51Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:9551" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:2416", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" }, { "value": "7.6", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:35:51Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:2416" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7118", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" }, { "value": "7.6", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:35:51Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:7118" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7256", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" }, { "value": "7.6", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:35:51Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:7256" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7624", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" }, { "value": "7.6", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:35:51Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:7624" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9355.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9355.json" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2024-9355", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" }, { "value": "7.6", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:35:51Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2024-9355" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-9355", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21509", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21595", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21654", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21666", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21627", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.2157", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21568", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21575", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21545", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21399", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21441", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21419", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21437", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21809", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22131", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.2218", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21963", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21796", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21704", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21776", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-9355" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2315719", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" }, { "value": "7.6", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:35:51Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2315719" }, { "reference_url": "https://github.com/github/advisory-database/pull/4950", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" }, { "value": "7.6", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/github/advisory-database/pull/4950" }, { "reference_url": "https://github.com/golang-fips/openssl", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" }, { "value": "7.6", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/golang-fips/openssl" }, { "reference_url": "https://github.com/golang-fips/openssl/pull/198", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" }, { "value": "7.6", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:35:51Z/" } ], "url": "https://github.com/golang-fips/openssl/pull/198" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-9355", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" }, { "value": "7.6", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-9355" }, { "reference_url": "https://pkg.go.dev/vuln/GO-2024-3167", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" }, { "value": "7.6", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://pkg.go.dev/vuln/GO-2024-3167" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:amq_streams:2", "reference_id": "cpe:/a:redhat:amq_streams:2", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:amq_streams:2" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ansible_automation_platform", "reference_id": "cpe:/a:redhat:ansible_automation_platform", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ansible_automation_platform" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ansible_automation_platform:2", "reference_id": "cpe:/a:redhat:ansible_automation_platform:2", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ansible_automation_platform:2" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:container_native_virtualization:4", "reference_id": "cpe:/a:redhat:container_native_virtualization:4", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:container_native_virtualization:4" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:network_bound_disk_encryption_tang:1", "reference_id": "cpe:/a:redhat:network_bound_disk_encryption_tang:1", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:network_bound_disk_encryption_tang:1" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ocp_tools", "reference_id": "cpe:/a:redhat:ocp_tools", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ocp_tools" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4", "reference_id": "cpe:/a:redhat:openshift:4", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_container_storage:4", "reference_id": "cpe:/a:redhat:openshift_container_storage:4", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_container_storage:4" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_data_foundation:4", "reference_id": "cpe:/a:redhat:openshift_data_foundation:4", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_data_foundation:4" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_devspaces:3", "reference_id": "cpe:/a:redhat:openshift_devspaces:3", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_devspaces:3" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_gitops:1", "reference_id": "cpe:/a:redhat:openshift_gitops:1", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_gitops:1" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_pipelines:1", "reference_id": "cpe:/a:redhat:openshift_pipelines:1", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_pipelines:1" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_service_on_aws:1", "reference_id": "cpe:/a:redhat:openshift_service_on_aws:1", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_service_on_aws:1" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openstack:16.2", "reference_id": "cpe:/a:redhat:openstack:16.2", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openstack:16.2" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openstack:17.1", "reference_id": "cpe:/a:redhat:openstack:17.1", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openstack:17.1" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:9.4::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_satellite_client:6::el10", "reference_id": "cpe:/a:redhat:rhel_satellite_client:6::el10", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_satellite_client:6::el10" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_satellite_client:6::el8", "reference_id": "cpe:/a:redhat:rhel_satellite_client:6::el8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_satellite_client:6::el8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_satellite_client:6::el9", "reference_id": "cpe:/a:redhat:rhel_satellite_client:6::el9", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_satellite_client:6::el9" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:satellite:6", "reference_id": "cpe:/a:redhat:satellite:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:satellite:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:serverless:1", "reference_id": "cpe:/a:redhat:serverless:1", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:serverless:1" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:service_interconnect:1", "reference_id": "cpe:/a:redhat:service_interconnect:1", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:service_interconnect:1" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3", "reference_id": "cpe:/a:redhat:storage:3", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:storage:3" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:trusted_artifact_signer:1", "reference_id": "cpe:/a:redhat:trusted_artifact_signer:1", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:trusted_artifact_signer:1" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10", "reference_id": "cpe:/o:redhat:enterprise_linux:10", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8", "reference_id": "cpe:/o:redhat:enterprise_linux:8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9", "reference_id": "cpe:/o:redhat:enterprise_linux:9", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7", "reference_id": "cpe:/o:redhat:rhel_els:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7" } ], "fixed_packages": [], "aliases": [ "CVE-2024-9355", "GHSA-3h3x-2hwv-hr52" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d97y-w562-fkab" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/75016?format=api", "vulnerability_id": "VCID-p1bh-b1qf-ufg6", "summary": "net/http: Denial of service due to improper 100-continue handling in net/http", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24791.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24791.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-24791", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01018", "scoring_system": "epss", "scoring_elements": "0.77402", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.01018", "scoring_system": "epss", "scoring_elements": "0.7724", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01018", "scoring_system": "epss", "scoring_elements": "0.77274", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01018", "scoring_system": "epss", "scoring_elements": "0.77279", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01018", "scoring_system": "epss", "scoring_elements": "0.77294", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01018", "scoring_system": "epss", "scoring_elements": "0.77299", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01018", "scoring_system": "epss", "scoring_elements": "0.77328", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01018", "scoring_system": "epss", "scoring_elements": "0.77349", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01018", "scoring_system": "epss", "scoring_elements": "0.77338", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01018", "scoring_system": "epss", "scoring_elements": "0.77357", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01018", "scoring_system": "epss", "scoring_elements": "0.77152", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01018", "scoring_system": "epss", "scoring_elements": "0.77181", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01018", "scoring_system": "epss", "scoring_elements": "0.77163", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01018", "scoring_system": "epss", "scoring_elements": "0.77195", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01018", "scoring_system": "epss", "scoring_elements": "0.77204", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01018", "scoring_system": "epss", "scoring_elements": "0.77231", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01018", "scoring_system": "epss", "scoring_elements": "0.7721", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01018", "scoring_system": "epss", "scoring_elements": "0.77207", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01018", "scoring_system": "epss", "scoring_elements": "0.77247", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01018", "scoring_system": "epss", "scoring_elements": "0.77248", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-24791" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24791", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24791" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295310", "reference_id": "2295310", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295310" }, { "reference_url": "https://go.dev/cl/591255", "reference_id": "591255", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-03T13:39:23Z/" } ], "url": "https://go.dev/cl/591255" }, { "reference_url": "https://go.dev/issue/67555", "reference_id": "67555", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-03T13:39:23Z/" } ], "url": "https://go.dev/issue/67555" }, { "reference_url": "https://groups.google.com/g/golang-dev/c/t0rK-qHBqzY/m/6MMoAZkMAgAJ", "reference_id": "6MMoAZkMAgAJ", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-03T13:39:23Z/" } ], "url": "https://groups.google.com/g/golang-dev/c/t0rK-qHBqzY/m/6MMoAZkMAgAJ" }, { "reference_url": "https://pkg.go.dev/vuln/GO-2024-2963", "reference_id": "GO-2024-2963", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-03T13:39:23Z/" } ], "url": "https://pkg.go.dev/vuln/GO-2024-2963" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10389", "reference_id": "RHSA-2024:10389", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10389" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10758", "reference_id": "RHSA-2024:10758", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10758" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10906", "reference_id": "RHSA-2024:10906", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10906" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5537", "reference_id": "RHSA-2024:5537", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5537" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6341", "reference_id": "RHSA-2024:6341", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6341" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6908", "reference_id": "RHSA-2024:6908", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6908" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6912", "reference_id": "RHSA-2024:6912", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6912" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6913", "reference_id": "RHSA-2024:6913", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6913" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6914", "reference_id": "RHSA-2024:6914", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6914" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6969", "reference_id": "RHSA-2024:6969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7074", "reference_id": "RHSA-2024:7074", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7074" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7348", "reference_id": "RHSA-2024:7348", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7348" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7349", "reference_id": "RHSA-2024:7349", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7349" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7548", "reference_id": "RHSA-2024:7548", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7548" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8219", "reference_id": "RHSA-2024:8219", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8219" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8314", "reference_id": "RHSA-2024:8314", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8314" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8315", "reference_id": "RHSA-2024:8315", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8315" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8317", "reference_id": "RHSA-2024:8317", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8317" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8318", "reference_id": "RHSA-2024:8318", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8318" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8688", "reference_id": "RHSA-2024:8688", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8688" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8692", "reference_id": "RHSA-2024:8692", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8692" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8697", "reference_id": "RHSA-2024:8697", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8697" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9089", "reference_id": "RHSA-2024:9089", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9089" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9115", "reference_id": "RHSA-2024:9115", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9115" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9135", "reference_id": "RHSA-2024:9135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0082", "reference_id": "RHSA-2025:0082", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0082" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:11889", "reference_id": "RHSA-2025:11889", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:11889" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3973", "reference_id": "RHSA-2025:3973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:9776", "reference_id": "RHSA-2025:9776", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:9776" }, { "reference_url": "https://usn.ubuntu.com/7081-1/", "reference_id": "USN-7081-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7081-1/" }, { "reference_url": "https://usn.ubuntu.com/7109-1/", "reference_id": "USN-7109-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7109-1/" }, { "reference_url": "https://usn.ubuntu.com/7111-1/", "reference_id": "USN-7111-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7111-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2024-24791" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p1bh-b1qf-ufg6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48753?format=api", "vulnerability_id": "VCID-qemj-x1bx-h7gp", "summary": "Multiple vulnerabilities have been discovered in Go, the worst of which could lead to information leakage or a denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24788.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24788.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-24788", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35018", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35458", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35467", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35424", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.354", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.3544", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35428", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35375", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.3514", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35119", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.3503", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.34908", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.3498", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35017", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.34922", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.34948", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.3548", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35504", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35387", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35433", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-24788" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279814", "reference_id": "2279814", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279814" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/05/08/3", "reference_id": "3", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T19:38:26Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/05/08/3" }, { "reference_url": "https://go.dev/cl/578375", "reference_id": "578375", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T19:38:26Z/" } ], "url": "https://go.dev/cl/578375" }, { "reference_url": "https://go.dev/issue/66754", "reference_id": "66754", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T19:38:26Z/" } ], "url": "https://go.dev/issue/66754" }, { "reference_url": "https://security.gentoo.org/glsa/202408-07", "reference_id": "GLSA-202408-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202408-07" }, { "reference_url": "https://pkg.go.dev/vuln/GO-2024-2824", "reference_id": "GO-2024-2824", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T19:38:26Z/" } ], "url": "https://pkg.go.dev/vuln/GO-2024-2824" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240605-0002/", "reference_id": "ntap-20240605-0002", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T19:38:26Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240605-0002/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240614-0001/", "reference_id": "ntap-20240614-0001", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T19:38:26Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240614-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4616", "reference_id": "RHSA-2024:4616", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4616" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4697", "reference_id": "RHSA-2024:4697", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4697" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4872", "reference_id": "RHSA-2024:4872", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4872" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4982", "reference_id": "RHSA-2024:4982", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4982" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5013", "reference_id": "RHSA-2024:5013", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5013" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5291", "reference_id": "RHSA-2024:5291", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5291" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5547", "reference_id": "RHSA-2024:5547", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5547" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6221", "reference_id": "RHSA-2024:6221", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6221" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6341", "reference_id": "RHSA-2024:6341", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6341" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6969", "reference_id": "RHSA-2024:6969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7548", "reference_id": "RHSA-2024:7548", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7548" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9089", "reference_id": "RHSA-2024:9089", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9089" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9115", "reference_id": "RHSA-2024:9115", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9115" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9135", "reference_id": "RHSA-2024:9135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9200", "reference_id": "RHSA-2024:9200", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9200" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9277", "reference_id": "RHSA-2024:9277", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9277" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9485", "reference_id": "RHSA-2024:9485", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9485" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:9776", "reference_id": "RHSA-2025:9776", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:9776" }, { "reference_url": "https://usn.ubuntu.com/6886-1/", "reference_id": "USN-6886-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6886-1/" }, { "reference_url": "https://groups.google.com/g/golang-announce/c/wkkO4P9stm0", "reference_id": "wkkO4P9stm0", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T19:38:26Z/" } ], "url": "https://groups.google.com/g/golang-announce/c/wkkO4P9stm0" } ], "fixed_packages": [], "aliases": [ "CVE-2024-24788" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qemj-x1bx-h7gp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/75396?format=api", "vulnerability_id": "VCID-r8tc-7h1k-gqc6", "summary": "golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24790.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24790.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-24790", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38031", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38451", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38432", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38368", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38211", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38187", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38092", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.3798", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38051", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38063", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.37978", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.37955", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38506", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38531", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38393", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38444", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38452", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38467", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38429", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38404", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-24790" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24790", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24790" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/06/04/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-07T14:59:19Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/06/04/1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292787", "reference_id": "2292787", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292787" }, { "reference_url": "https://go.dev/cl/590316", "reference_id": "590316", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-07T14:59:19Z/" } ], "url": "https://go.dev/cl/590316" }, { "reference_url": "https://go.dev/issue/67680", "reference_id": "67680", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-07T14:59:19Z/" } ], "url": "https://go.dev/issue/67680" }, { "reference_url": "https://pkg.go.dev/vuln/GO-2024-2887", "reference_id": "GO-2024-2887", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-07T14:59:19Z/" } ], "url": "https://pkg.go.dev/vuln/GO-2024-2887" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10186", "reference_id": "RHSA-2024:10186", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10186" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10775", "reference_id": "RHSA-2024:10775", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10775" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10906", "reference_id": "RHSA-2024:10906", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10906" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4212", "reference_id": "RHSA-2024:4212", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4212" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4237", "reference_id": "RHSA-2024:4237", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4237" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4333", "reference_id": "RHSA-2024:4333", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4333" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4335", "reference_id": "RHSA-2024:4335", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4335" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4336", "reference_id": "RHSA-2024:4336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4336" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4697", "reference_id": "RHSA-2024:4697", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4697" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4785", "reference_id": "RHSA-2024:4785", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4785" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4872", "reference_id": "RHSA-2024:4872", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4872" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4893", "reference_id": "RHSA-2024:4893", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4893" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4982", "reference_id": "RHSA-2024:4982", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4982" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5075", "reference_id": "RHSA-2024:5075", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5075" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5077", "reference_id": "RHSA-2024:5077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5202", "reference_id": "RHSA-2024:5202", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5202" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5291", "reference_id": "RHSA-2024:5291", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5291" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5433", "reference_id": "RHSA-2024:5433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5436", "reference_id": "RHSA-2024:5436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5436" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5439", "reference_id": "RHSA-2024:5439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5439" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5442", "reference_id": "RHSA-2024:5442", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5442" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5444", "reference_id": "RHSA-2024:5444", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5444" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5446", "reference_id": "RHSA-2024:5446", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5446" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5547", "reference_id": "RHSA-2024:5547", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5547" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5808", "reference_id": "RHSA-2024:5808", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5808" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6341", "reference_id": "RHSA-2024:6341", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6341" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7548", "reference_id": "RHSA-2024:7548", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7548" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7987", "reference_id": "RHSA-2024:7987", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7987" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8418", "reference_id": "RHSA-2024:8418", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8418" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8876", "reference_id": "RHSA-2024:8876", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8876" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9115", "reference_id": "RHSA-2024:9115", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9115" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9583", "reference_id": "RHSA-2024:9583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4240", "reference_id": "RHSA-2025:4240", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4240" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4664", "reference_id": "RHSA-2025:4664", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4664" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4667", "reference_id": "RHSA-2025:4667", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4667" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:9776", "reference_id": "RHSA-2025:9776", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:9776" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3718", "reference_id": "RHSA-2026:3718", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3718" }, { "reference_url": "https://groups.google.com/g/golang-announce/c/XbxouI9gY7k/m/TuoGEhxIEwAJ", "reference_id": "TuoGEhxIEwAJ", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-07T14:59:19Z/" } ], "url": "https://groups.google.com/g/golang-announce/c/XbxouI9gY7k/m/TuoGEhxIEwAJ" }, { "reference_url": "https://usn.ubuntu.com/6886-1/", "reference_id": "USN-6886-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6886-1/" }, { "reference_url": "https://usn.ubuntu.com/7109-1/", "reference_id": "USN-7109-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7109-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2024-24790" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r8tc-7h1k-gqc6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42120?format=api", "vulnerability_id": "VCID-x4ux-7vyz-eug9", "summary": "Multiple vulnerabilities have been discovered in Go, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39321.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39321.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-39321", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17459", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17285", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17209", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.1715", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17011", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.171", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17192", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17163", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17201", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17505", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17286", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17377", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17437", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17449", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17402", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17347", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17293", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17325", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17231", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-39321" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237777", "reference_id": "2237777", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237777" }, { "reference_url": "https://go.dev/cl/523039", "reference_id": "523039", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:23:57Z/" } ], "url": "https://go.dev/cl/523039" }, { "reference_url": "https://go.dev/issue/62266", "reference_id": "62266", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:23:57Z/" } ], "url": "https://go.dev/issue/62266" }, { "reference_url": "https://pkg.go.dev/vuln/GO-2023-2044", "reference_id": "GO-2023-2044", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:23:57Z/" } ], "url": "https://pkg.go.dev/vuln/GO-2023-2044" }, { "reference_url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ", "reference_id": "L1hdrPhfBAAJ", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:23:57Z/" } ], "url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20231020-0004/", "reference_id": "ntap-20231020-0004", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:23:57Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20231020-0004/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5009", "reference_id": "RHSA-2023:5009", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5009" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5947", "reference_id": "RHSA-2023:5947", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5947" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5974", "reference_id": "RHSA-2023:5974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5974" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6031", "reference_id": "RHSA-2023:6031", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6031" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6115", "reference_id": "RHSA-2023:6115", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6115" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6154", "reference_id": "RHSA-2023:6154", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6154" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6161", "reference_id": "RHSA-2023:6161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6840", "reference_id": "RHSA-2023:6840", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6840" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7517", "reference_id": "RHSA-2023:7517", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7517" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7762", "reference_id": "RHSA-2023:7762", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7762" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7763", "reference_id": "RHSA-2023:7763", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7763" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7764", "reference_id": "RHSA-2023:7764", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7764" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7765", "reference_id": "RHSA-2023:7765", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7765" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7766", "reference_id": "RHSA-2023:7766", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7766" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0121", "reference_id": "RHSA-2024:0121", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0121" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1383", "reference_id": "RHSA-2024:1383", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1383" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1901", "reference_id": "RHSA-2024:1901", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1901" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2988", "reference_id": "RHSA-2024:2988", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2988" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3467", "reference_id": "RHSA-2024:3467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3467" } ], "fixed_packages": [], "aliases": [ "CVE-2023-39321" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x4ux-7vyz-eug9" } ], "fixing_vulnerabilities": [], "risk_score": "4.4", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/git-lfs@3.6.1-1%3Farch=el9" }