{"url":"http://public2.vulnerablecode.io/api/packages/93253?format=json","purl":"pkg:rpm/redhat/kernel-rt@5.14.0-284.69.1.rt14.354?arch=el9_2","type":"rpm","namespace":"redhat","name":"kernel-rt","version":"5.14.0-284.69.1.rt14.354","qualifiers":{"arch":"el9_2"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76343?format=json","vulnerability_id":"VCID-d6th-8p9s-j7h7","summary":"kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52667.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52667.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-52667","reference_id":"","reference_type":"","scores":[{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32639","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32048","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.3252","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32488","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32324","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32208","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32123","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.31983","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32674","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32496","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32543","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32569","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32571","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32535","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32506","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32541","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-52667"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281350","reference_id":"2281350","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281350"},{"reference_url":"https://git.kernel.org/stable/c/2897c981ee63e1be5e530b1042484626a10b26d8","reference_id":"2897c981ee63e1be5e530b1042484626a10b26d8","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:42:12Z/"}],"url":"https://git.kernel.org/stable/c/2897c981ee63e1be5e530b1042484626a10b26d8"},{"reference_url":"https://git.kernel.org/stable/c/65a4ade8a6d205979292e88beeb6a626ddbd4779","reference_id":"65a4ade8a6d205979292e88beeb6a626ddbd4779","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:42:12Z/"}],"url":"https://git.kernel.org/stable/c/65a4ade8a6d205979292e88beeb6a626ddbd4779"},{"reference_url":"https://git.kernel.org/stable/c/72a729868592752b5a294d27453da264106983b1","reference_id":"72a729868592752b5a294d27453da264106983b1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:42:12Z/"}],"url":"https://git.kernel.org/stable/c/72a729868592752b5a294d27453da264106983b1"},{"reference_url":"https://git.kernel.org/stable/c/aef855df7e1bbd5aa4484851561211500b22707e","reference_id":"aef855df7e1bbd5aa4484851561211500b22707e","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:42:12Z/"}],"url":"https://git.kernel.org/stable/c/aef855df7e1bbd5aa4484851561211500b22707e"},{"reference_url":"https://git.kernel.org/stable/c/b2fa86b2aceb4bc9ada51cea90f61546d7512cbe","reference_id":"b2fa86b2aceb4bc9ada51cea90f61546d7512cbe","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:42:12Z/"}],"url":"https://git.kernel.org/stable/c/b2fa86b2aceb4bc9ada51cea90f61546d7512cbe"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3854","reference_id":"RHSA-2024:3854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3855","reference_id":"RHSA-2024:3855","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3855"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4211","reference_id":"RHSA-2024:4211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4349","reference_id":"RHSA-2024:4349","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4352","reference_id":"RHSA-2024:4352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4740","reference_id":"RHSA-2024:4740","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4740"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4902","reference_id":"RHSA-2024:4902","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4902"},{"reference_url":"https://usn.ubuntu.com/6818-1/","reference_id":"USN-6818-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6818-1/"},{"reference_url":"https://usn.ubuntu.com/6818-2/","reference_id":"USN-6818-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6818-2/"},{"reference_url":"https://usn.ubuntu.com/6818-3/","reference_id":"USN-6818-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6818-3/"},{"reference_url":"https://usn.ubuntu.com/6818-4/","reference_id":"USN-6818-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6818-4/"},{"reference_url":"https://usn.ubuntu.com/6819-1/","reference_id":"USN-6819-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6819-1/"},{"reference_url":"https://usn.ubuntu.com/6819-2/","reference_id":"USN-6819-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6819-2/"},{"reference_url":"https://usn.ubuntu.com/6819-3/","reference_id":"USN-6819-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6819-3/"},{"reference_url":"https://usn.ubuntu.com/6819-4/","reference_id":"USN-6819-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6819-4/"}],"fixed_packages":[],"aliases":["CVE-2023-52667"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d6th-8p9s-j7h7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77685?format=json","vulnerability_id":"VCID-j9ud-q26e-4qbk","summary":"kernel: kvm: Avoid potential UAF in LPI translation cache","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26598.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26598.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-26598","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02708","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02568","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02582","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02586","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02591","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02611","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02594","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0258","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02565","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02573","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02684","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02672","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02661","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02715","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02691","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-26598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26598","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26598"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/stable/c/12c2759ab1343c124ed46ba48f27bd1ef5d2dff4","reference_id":"12c2759ab1343c124ed46ba48f27bd1ef5d2dff4","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T16:15:47Z/"}],"url":"https://git.kernel.org/stable/c/12c2759ab1343c124ed46ba48f27bd1ef5d2dff4"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2265801","reference_id":"2265801","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2265801"},{"reference_url":"https://git.kernel.org/stable/c/65b201bf3e9af1b0254243a5881390eda56f72d1","reference_id":"65b201bf3e9af1b0254243a5881390eda56f72d1","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T16:15:47Z/"}],"url":"https://git.kernel.org/stable/c/65b201bf3e9af1b0254243a5881390eda56f72d1"},{"reference_url":"https://git.kernel.org/stable/c/ad362fe07fecf0aba839ff2cc59a3617bd42c33f","reference_id":"ad362fe07fecf0aba839ff2cc59a3617bd42c33f","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T16:15:47Z/"}],"url":"https://git.kernel.org/stable/c/ad362fe07fecf0aba839ff2cc59a3617bd42c33f"},{"reference_url":"https://git.kernel.org/stable/c/ba7be666740847d967822bed15500656b26bc703","reference_id":"ba7be666740847d967822bed15500656b26bc703","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T16:15:47Z/"}],"url":"https://git.kernel.org/stable/c/ba7be666740847d967822bed15500656b26bc703"},{"reference_url":"https://git.kernel.org/stable/c/d04acadb6490aa3314f9c9e087691e55de153b88","reference_id":"d04acadb6490aa3314f9c9e087691e55de153b88","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T16:15:47Z/"}],"url":"https://git.kernel.org/stable/c/d04acadb6490aa3314f9c9e087691e55de153b88"},{"reference_url":"https://git.kernel.org/stable/c/dba788e25f05209adf2b0175eb1691dc89fb1ba6","reference_id":"dba788e25f05209adf2b0175eb1691dc89fb1ba6","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T16:15:47Z/"}],"url":"https://git.kernel.org/stable/c/dba788e25f05209adf2b0175eb1691dc89fb1ba6"},{"reference_url":"https://git.kernel.org/stable/c/dd3956a1b3dd11f46488c928cb890d6937d1ca80","reference_id":"dd3956a1b3dd11f46488c928cb890d6937d1ca80","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-22T16:15:47Z/"}],"url":"https://git.kernel.org/stable/c/dd3956a1b3dd11f46488c928cb890d6937d1ca80"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3854","reference_id":"RHSA-2024:3854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3855","reference_id":"RHSA-2024:3855","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3855"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4415","reference_id":"RHSA-2024:4415","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4415"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4740","reference_id":"RHSA-2024:4740","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4740"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8161","reference_id":"RHSA-2024:8161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8161"},{"reference_url":"https://usn.ubuntu.com/6688-1/","reference_id":"USN-6688-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6688-1/"},{"reference_url":"https://usn.ubuntu.com/6725-1/","reference_id":"USN-6725-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6725-1/"},{"reference_url":"https://usn.ubuntu.com/6725-2/","reference_id":"USN-6725-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6725-2/"},{"reference_url":"https://usn.ubuntu.com/6767-1/","reference_id":"USN-6767-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6767-1/"},{"reference_url":"https://usn.ubuntu.com/6767-2/","reference_id":"USN-6767-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6767-2/"},{"reference_url":"https://usn.ubuntu.com/6818-1/","reference_id":"USN-6818-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6818-1/"},{"reference_url":"https://usn.ubuntu.com/6818-2/","reference_id":"USN-6818-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6818-2/"},{"reference_url":"https://usn.ubuntu.com/6818-3/","reference_id":"USN-6818-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6818-3/"},{"reference_url":"https://usn.ubuntu.com/6818-4/","reference_id":"USN-6818-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6818-4/"},{"reference_url":"https://usn.ubuntu.com/6819-1/","reference_id":"USN-6819-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6819-1/"},{"reference_url":"https://usn.ubuntu.com/6819-2/","reference_id":"USN-6819-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6819-2/"},{"reference_url":"https://usn.ubuntu.com/6819-3/","reference_id":"USN-6819-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6819-3/"},{"reference_url":"https://usn.ubuntu.com/6819-4/","reference_id":"USN-6819-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6819-4/"}],"fixed_packages":[],"aliases":["CVE-2024-26598"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j9ud-q26e-4qbk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77879?format=json","vulnerability_id":"VCID-n1w6-27yz-dfer","summary":"kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51779.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51779.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-51779","reference_id":"","reference_type":"","scores":[{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28149","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28105","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28192","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27988","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28056","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28098","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28062","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28004","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31408","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31914","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31893","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31866","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.3222","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32015","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.31874","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32099","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-51779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51779"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2256822","reference_id":"2256822","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2256822"},{"reference_url":"https://github.com/torvalds/linux/commit/2e07e8348ea454615e268222ae3fc240421be768","reference_id":"2e07e8348ea454615e268222ae3fc240421be768","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-05T17:06:18Z/"}],"url":"https://github.com/torvalds/linux/commit/2e07e8348ea454615e268222ae3fc240421be768"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html","reference_id":"msg00016.html","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-05T17:06:18Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10941","reference_id":"RHSA-2024:10941","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10941"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2394","reference_id":"RHSA-2024:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2950","reference_id":"RHSA-2024:2950","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2950"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3138","reference_id":"RHSA-2024:3138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3854","reference_id":"RHSA-2024:3854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3855","reference_id":"RHSA-2024:3855","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3855"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3859","reference_id":"RHSA-2024:3859","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3859"},{"reference_url":"https://usn.ubuntu.com/6606-1/","reference_id":"USN-6606-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6606-1/"},{"reference_url":"https://usn.ubuntu.com/6680-1/","reference_id":"USN-6680-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6680-1/"},{"reference_url":"https://usn.ubuntu.com/6680-2/","reference_id":"USN-6680-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6680-2/"},{"reference_url":"https://usn.ubuntu.com/6680-3/","reference_id":"USN-6680-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6680-3/"},{"reference_url":"https://usn.ubuntu.com/6681-1/","reference_id":"USN-6681-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6681-1/"},{"reference_url":"https://usn.ubuntu.com/6681-2/","reference_id":"USN-6681-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6681-2/"},{"reference_url":"https://usn.ubuntu.com/6681-3/","reference_id":"USN-6681-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6681-3/"},{"reference_url":"https://usn.ubuntu.com/6681-4/","reference_id":"USN-6681-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6681-4/"},{"reference_url":"https://usn.ubuntu.com/6686-1/","reference_id":"USN-6686-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6686-1/"},{"reference_url":"https://usn.ubuntu.com/6686-2/","reference_id":"USN-6686-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6686-2/"},{"reference_url":"https://usn.ubuntu.com/6686-3/","reference_id":"USN-6686-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6686-3/"},{"reference_url":"https://usn.ubuntu.com/6686-4/","reference_id":"USN-6686-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6686-4/"},{"reference_url":"https://usn.ubuntu.com/6686-5/","reference_id":"USN-6686-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6686-5/"},{"reference_url":"https://usn.ubuntu.com/6705-1/","reference_id":"USN-6705-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6705-1/"},{"reference_url":"https://usn.ubuntu.com/6716-1/","reference_id":"USN-6716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6716-1/"},{"reference_url":"https://usn.ubuntu.com/6739-1/","reference_id":"USN-6739-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6739-1/"},{"reference_url":"https://usn.ubuntu.com/6740-1/","reference_id":"USN-6740-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6740-1/"}],"fixed_packages":[],"aliases":["CVE-2023-51779"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n1w6-27yz-dfer"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78060?format=json","vulnerability_id":"VCID-z5c6-dfvg-dyhm","summary":"kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5090.json","reference_id":"","reference_type":"","scores":[{"value":"6.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5090.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5090","reference_id":"","reference_type":"","scores":[{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11596","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11611","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11537","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.1146","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11617","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11702","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11757","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11768","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.1173","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11705","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11567","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11568","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11692","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11651","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12366","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12411","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5090"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2248122","reference_id":"2248122","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2248122"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2758","reference_id":"RHSA-2024:2758","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2758"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3854","reference_id":"RHSA-2024:3854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3855","reference_id":"RHSA-2024:3855","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3855"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4211","reference_id":"RHSA-2024:4211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4352","reference_id":"RHSA-2024:4352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4352"},{"reference_url":"https://usn.ubuntu.com/6497-1/","reference_id":"USN-6497-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6497-1/"},{"reference_url":"https://usn.ubuntu.com/6502-1/","reference_id":"USN-6502-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6502-1/"},{"reference_url":"https://usn.ubuntu.com/6502-2/","reference_id":"USN-6502-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6502-2/"},{"reference_url":"https://usn.ubuntu.com/6502-3/","reference_id":"USN-6502-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6502-3/"},{"reference_url":"https://usn.ubuntu.com/6502-4/","reference_id":"USN-6502-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6502-4/"},{"reference_url":"https://usn.ubuntu.com/6503-1/","reference_id":"USN-6503-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6503-1/"},{"reference_url":"https://usn.ubuntu.com/6520-1/","reference_id":"USN-6520-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6520-1/"},{"reference_url":"https://usn.ubuntu.com/6537-1/","reference_id":"USN-6537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6537-1/"},{"reference_url":"https://usn.ubuntu.com/6572-1/","reference_id":"USN-6572-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6572-1/"}],"fixed_packages":[],"aliases":["CVE-2023-5090"],"risk_score":2.7,"exploitability":"0.5","weighted_severity":"5.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z5c6-dfvg-dyhm"}],"fixing_vulnerabilities":[],"risk_score":"3.5","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@5.14.0-284.69.1.rt14.354%3Farch=el9_2"}