Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/redhat-virtualization-host@4.5.3-202304051438_8?arch=6
Typerpm
Namespaceredhat
Nameredhat-virtualization-host
Version4.5.3-202304051438_8
Qualifiers
arch 6
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-3bkb-3m1h-m7fw
vulnerability_id VCID-3bkb-3m1h-m7fw
summary Several vulnerabilities have been found in Git, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41903.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41903.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-41903
reference_id
reference_type
scores
0
value 0.22424
scoring_system epss
scoring_elements 0.95841
published_at 2026-04-16T12:55:00Z
1
value 0.22424
scoring_system epss
scoring_elements 0.95824
published_at 2026-04-09T12:55:00Z
2
value 0.22424
scoring_system epss
scoring_elements 0.95828
published_at 2026-04-12T12:55:00Z
3
value 0.22424
scoring_system epss
scoring_elements 0.95829
published_at 2026-04-13T12:55:00Z
4
value 0.25734
scoring_system epss
scoring_elements 0.96223
published_at 2026-04-04T12:55:00Z
5
value 0.25734
scoring_system epss
scoring_elements 0.96216
published_at 2026-04-02T12:55:00Z
6
value 0.25734
scoring_system epss
scoring_elements 0.96237
published_at 2026-04-08T12:55:00Z
7
value 0.25734
scoring_system epss
scoring_elements 0.96228
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-41903
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23521
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24765
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29187
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39253
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39253
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39260
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39260
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41903
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029114
reference_id 1029114
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029114
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162056
reference_id 2162056
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162056
11
reference_url https://github.com/git/git/commit/508386c6c5857b4faa2c3e491f422c98cc69ae76
reference_id 508386c6c5857b4faa2c3e491f422c98cc69ae76
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-10T20:59:12Z/
url https://github.com/git/git/commit/508386c6c5857b4faa2c3e491f422c98cc69ae76
12
reference_url https://git-scm.com/book/en/v2/Customizing-Git-Git-Attributes#_export_subst
reference_id Customizing-Git-Git-Attributes#_export_subst
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-10T20:59:12Z/
url https://git-scm.com/book/en/v2/Customizing-Git-Git-Attributes#_export_subst
13
reference_url https://github.com/git/git/security/advisories/GHSA-475x-2q3q-hvwq
reference_id GHSA-475x-2q3q-hvwq
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-10T20:59:12Z/
url https://github.com/git/git/security/advisories/GHSA-475x-2q3q-hvwq
14
reference_url https://security.gentoo.org/glsa/202312-15
reference_id GLSA-202312-15
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-10T20:59:12Z/
url https://security.gentoo.org/glsa/202312-15
15
reference_url https://git-scm.com/docs/pretty-formats#Documentation/pretty-formats.txt-emltltNgttruncltruncmtruncem
reference_id pretty-formats.txt-emltltNgttruncltruncmtruncem
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-10T20:59:12Z/
url https://git-scm.com/docs/pretty-formats#Documentation/pretty-formats.txt-emltltNgttruncltruncmtruncem
16
reference_url https://access.redhat.com/errata/RHSA-2023:0596
reference_id RHSA-2023:0596
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0596
17
reference_url https://access.redhat.com/errata/RHSA-2023:0597
reference_id RHSA-2023:0597
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0597
18
reference_url https://access.redhat.com/errata/RHSA-2023:0599
reference_id RHSA-2023:0599
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0599
19
reference_url https://access.redhat.com/errata/RHSA-2023:0609
reference_id RHSA-2023:0609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0609
20
reference_url https://access.redhat.com/errata/RHSA-2023:0610
reference_id RHSA-2023:0610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0610
21
reference_url https://access.redhat.com/errata/RHSA-2023:0611
reference_id RHSA-2023:0611
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0611
22
reference_url https://access.redhat.com/errata/RHSA-2023:0627
reference_id RHSA-2023:0627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0627
23
reference_url https://access.redhat.com/errata/RHSA-2023:0628
reference_id RHSA-2023:0628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0628
24
reference_url https://access.redhat.com/errata/RHSA-2023:0978
reference_id RHSA-2023:0978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0978
25
reference_url https://access.redhat.com/errata/RHSA-2023:1677
reference_id RHSA-2023:1677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1677
26
reference_url https://usn.ubuntu.com/5810-1/
reference_id USN-5810-1
reference_type
scores
url https://usn.ubuntu.com/5810-1/
27
reference_url https://usn.ubuntu.com/5810-3/
reference_id USN-5810-3
reference_type
scores
url https://usn.ubuntu.com/5810-3/
28
reference_url https://usn.ubuntu.com/5810-4/
reference_id USN-5810-4
reference_type
scores
url https://usn.ubuntu.com/5810-4/
fixed_packages
aliases CVE-2022-41903
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3bkb-3m1h-m7fw
1
url VCID-6uub-fxap-pbfa
vulnerability_id VCID-6uub-fxap-pbfa
summary Several vulnerabilities have been found in Git, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23521.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23521.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23521
reference_id
reference_type
scores
0
value 0.12292
scoring_system epss
scoring_elements 0.93831
published_at 2026-04-02T12:55:00Z
1
value 0.12292
scoring_system epss
scoring_elements 0.93882
published_at 2026-04-16T12:55:00Z
2
value 0.12292
scoring_system epss
scoring_elements 0.9384
published_at 2026-04-04T12:55:00Z
3
value 0.12292
scoring_system epss
scoring_elements 0.93843
published_at 2026-04-07T12:55:00Z
4
value 0.12292
scoring_system epss
scoring_elements 0.93851
published_at 2026-04-08T12:55:00Z
5
value 0.12292
scoring_system epss
scoring_elements 0.93855
published_at 2026-04-09T12:55:00Z
6
value 0.12292
scoring_system epss
scoring_elements 0.9386
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23521
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23521
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24765
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29187
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39253
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39253
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39260
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39260
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41903
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029114
reference_id 1029114
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029114
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162055
reference_id 2162055
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162055
11
reference_url https://github.com/git/git/commit/508386c6c5857b4faa2c3e491f422c98cc69ae76
reference_id 508386c6c5857b4faa2c3e491f422c98cc69ae76
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:36:25Z/
url https://github.com/git/git/commit/508386c6c5857b4faa2c3e491f422c98cc69ae76
12
reference_url https://github.com/git/git/security/advisories/GHSA-c738-c5qq-xg89
reference_id GHSA-c738-c5qq-xg89
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:36:25Z/
url https://github.com/git/git/security/advisories/GHSA-c738-c5qq-xg89
13
reference_url https://security.gentoo.org/glsa/202312-15
reference_id GLSA-202312-15
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:36:25Z/
url https://security.gentoo.org/glsa/202312-15
14
reference_url https://access.redhat.com/errata/RHSA-2023:0596
reference_id RHSA-2023:0596
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0596
15
reference_url https://access.redhat.com/errata/RHSA-2023:0597
reference_id RHSA-2023:0597
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0597
16
reference_url https://access.redhat.com/errata/RHSA-2023:0599
reference_id RHSA-2023:0599
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0599
17
reference_url https://access.redhat.com/errata/RHSA-2023:0609
reference_id RHSA-2023:0609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0609
18
reference_url https://access.redhat.com/errata/RHSA-2023:0610
reference_id RHSA-2023:0610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0610
19
reference_url https://access.redhat.com/errata/RHSA-2023:0611
reference_id RHSA-2023:0611
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0611
20
reference_url https://access.redhat.com/errata/RHSA-2023:0627
reference_id RHSA-2023:0627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0627
21
reference_url https://access.redhat.com/errata/RHSA-2023:0628
reference_id RHSA-2023:0628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0628
22
reference_url https://access.redhat.com/errata/RHSA-2023:0978
reference_id RHSA-2023:0978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0978
23
reference_url https://access.redhat.com/errata/RHSA-2023:1677
reference_id RHSA-2023:1677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1677
24
reference_url https://usn.ubuntu.com/5810-1/
reference_id USN-5810-1
reference_type
scores
url https://usn.ubuntu.com/5810-1/
25
reference_url https://usn.ubuntu.com/5810-3/
reference_id USN-5810-3
reference_type
scores
url https://usn.ubuntu.com/5810-3/
26
reference_url https://usn.ubuntu.com/5810-4/
reference_id USN-5810-4
reference_type
scores
url https://usn.ubuntu.com/5810-4/
fixed_packages
aliases CVE-2022-23521
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6uub-fxap-pbfa
2
url VCID-cgvg-aj53-kkbp
vulnerability_id VCID-cgvg-aj53-kkbp
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0767.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0767.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0767
reference_id
reference_type
scores
0
value 0.0027
scoring_system epss
scoring_elements 0.50485
published_at 2026-04-13T12:55:00Z
1
value 0.0027
scoring_system epss
scoring_elements 0.505
published_at 2026-04-12T12:55:00Z
2
value 0.0027
scoring_system epss
scoring_elements 0.50448
published_at 2026-04-02T12:55:00Z
3
value 0.0027
scoring_system epss
scoring_elements 0.50523
published_at 2026-04-11T12:55:00Z
4
value 0.0027
scoring_system epss
scoring_elements 0.50481
published_at 2026-04-09T12:55:00Z
5
value 0.0027
scoring_system epss
scoring_elements 0.50484
published_at 2026-04-08T12:55:00Z
6
value 0.0027
scoring_system epss
scoring_elements 0.5043
published_at 2026-04-07T12:55:00Z
7
value 0.0027
scoring_system epss
scoring_elements 0.50477
published_at 2026-04-04T12:55:00Z
8
value 0.0027
scoring_system epss
scoring_elements 0.50528
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0767
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46871
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46871
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46877
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46877
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0430
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0616
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23598
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23601
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23602
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23603
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23605
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23605
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746
22
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2170377
reference_id 2170377
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2170377
24
reference_url https://alas.aws.amazon.com/AL2/ALAS-2023-1992.html
reference_id ALAS-2023-1992.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:56Z/
url https://alas.aws.amazon.com/AL2/ALAS-2023-1992.html
25
reference_url https://security.gentoo.org/glsa/202305-35
reference_id GLSA-202305-35
reference_type
scores
url https://security.gentoo.org/glsa/202305-35
26
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-05
reference_id mfsa2023-05
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-05
27
reference_url https://www.mozilla.org/security/advisories/mfsa2023-05/
reference_id mfsa2023-05
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:56Z/
url https://www.mozilla.org/security/advisories/mfsa2023-05/
28
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-06
reference_id mfsa2023-06
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-06
29
reference_url https://www.mozilla.org/security/advisories/mfsa2023-06/
reference_id mfsa2023-06
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:56Z/
url https://www.mozilla.org/security/advisories/mfsa2023-06/
30
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-07
reference_id mfsa2023-07
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-07
31
reference_url https://www.mozilla.org/security/advisories/mfsa2023-07/
reference_id mfsa2023-07
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:56Z/
url https://www.mozilla.org/security/advisories/mfsa2023-07/
32
reference_url https://access.redhat.com/errata/RHSA-2023:1252
reference_id RHSA-2023:1252
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1252
33
reference_url https://access.redhat.com/errata/RHSA-2023:1332
reference_id RHSA-2023:1332
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1332
34
reference_url https://access.redhat.com/errata/RHSA-2023:1365
reference_id RHSA-2023:1365
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1365
35
reference_url https://access.redhat.com/errata/RHSA-2023:1366
reference_id RHSA-2023:1366
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1366
36
reference_url https://access.redhat.com/errata/RHSA-2023:1368
reference_id RHSA-2023:1368
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1368
37
reference_url https://access.redhat.com/errata/RHSA-2023:1369
reference_id RHSA-2023:1369
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1369
38
reference_url https://access.redhat.com/errata/RHSA-2023:1370
reference_id RHSA-2023:1370
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1370
39
reference_url https://access.redhat.com/errata/RHSA-2023:1406
reference_id RHSA-2023:1406
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1406
40
reference_url https://access.redhat.com/errata/RHSA-2023:1436
reference_id RHSA-2023:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1436
41
reference_url https://access.redhat.com/errata/RHSA-2023:1442
reference_id RHSA-2023:1442
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1442
42
reference_url https://access.redhat.com/errata/RHSA-2023:1443
reference_id RHSA-2023:1443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1443
43
reference_url https://access.redhat.com/errata/RHSA-2023:1444
reference_id RHSA-2023:1444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1444
44
reference_url https://access.redhat.com/errata/RHSA-2023:1445
reference_id RHSA-2023:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1445
45
reference_url https://access.redhat.com/errata/RHSA-2023:1472
reference_id RHSA-2023:1472
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1472
46
reference_url https://access.redhat.com/errata/RHSA-2023:1479
reference_id RHSA-2023:1479
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1479
47
reference_url https://access.redhat.com/errata/RHSA-2023:1677
reference_id RHSA-2023:1677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1677
48
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1804640
reference_id show_bug.cgi?id=1804640
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:56Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1804640
49
reference_url https://usn.ubuntu.com/5880-1/
reference_id USN-5880-1
reference_type
scores
url https://usn.ubuntu.com/5880-1/
50
reference_url https://usn.ubuntu.com/5892-1/
reference_id USN-5892-1
reference_type
scores
url https://usn.ubuntu.com/5892-1/
51
reference_url https://usn.ubuntu.com/5892-2/
reference_id USN-5892-2
reference_type
scores
url https://usn.ubuntu.com/5892-2/
52
reference_url https://usn.ubuntu.com/5943-1/
reference_id USN-5943-1
reference_type
scores
url https://usn.ubuntu.com/5943-1/
fixed_packages
aliases CVE-2023-0767
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cgvg-aj53-kkbp
3
url VCID-mwwp-mrsw-jqgw
vulnerability_id VCID-mwwp-mrsw-jqgw
summary kernel: FUSE filesystem low-privileged user privileges escalation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0386.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0386.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0386
reference_id
reference_type
scores
0
value 0.49157
scoring_system epss
scoring_elements 0.97784
published_at 2026-04-16T12:55:00Z
1
value 0.51992
scoring_system epss
scoring_elements 0.97898
published_at 2026-04-04T12:55:00Z
2
value 0.51992
scoring_system epss
scoring_elements 0.97896
published_at 2026-04-02T12:55:00Z
3
value 0.52388
scoring_system epss
scoring_elements 0.97931
published_at 2026-04-13T12:55:00Z
4
value 0.52388
scoring_system epss
scoring_elements 0.97928
published_at 2026-04-11T12:55:00Z
5
value 0.52388
scoring_system epss
scoring_elements 0.97929
published_at 2026-04-12T12:55:00Z
6
value 0.54224
scoring_system epss
scoring_elements 0.98015
published_at 2026-04-08T12:55:00Z
7
value 0.54874
scoring_system epss
scoring_elements 0.98036
published_at 2026-04-07T12:55:00Z
8
value 0.56414
scoring_system epss
scoring_elements 0.98112
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0386
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0386
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0386
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31436
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31436
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32233
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32233
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2159505
reference_id 2159505
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2159505
7
reference_url https://www.debian.org/security/2023/dsa-5402
reference_id dsa-5402
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-07-17T03:55:31Z/
url https://www.debian.org/security/2023/dsa-5402
8
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4f11ada10d0a
reference_id ?id=4f11ada10d0a
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-07-17T03:55:31Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4f11ada10d0a
9
reference_url http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html
reference_id Kernel-Live-Patch-Security-Notice-LSN-0095-1.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-07-17T03:55:31Z/
url http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html
10
reference_url https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-07-17T03:55:31Z/
url https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html
11
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
reference_id msg00020.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-07-17T03:55:31Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
12
reference_url https://security.netapp.com/advisory/ntap-20230420-0004/
reference_id ntap-20230420-0004
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-07-17T03:55:31Z/
url https://security.netapp.com/advisory/ntap-20230420-0004/
13
reference_url https://access.redhat.com/errata/RHSA-2023:1554
reference_id RHSA-2023:1554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1554
14
reference_url https://access.redhat.com/errata/RHSA-2023:1566
reference_id RHSA-2023:1566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1566
15
reference_url https://access.redhat.com/errata/RHSA-2023:1584
reference_id RHSA-2023:1584
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1584
16
reference_url https://access.redhat.com/errata/RHSA-2023:1659
reference_id RHSA-2023:1659
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1659
17
reference_url https://access.redhat.com/errata/RHSA-2023:1660
reference_id RHSA-2023:1660
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1660
18
reference_url https://access.redhat.com/errata/RHSA-2023:1677
reference_id RHSA-2023:1677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1677
19
reference_url https://access.redhat.com/errata/RHSA-2023:1681
reference_id RHSA-2023:1681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1681
20
reference_url https://access.redhat.com/errata/RHSA-2023:1691
reference_id RHSA-2023:1691
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1691
21
reference_url https://access.redhat.com/errata/RHSA-2023:1703
reference_id RHSA-2023:1703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1703
22
reference_url https://access.redhat.com/errata/RHSA-2023:1970
reference_id RHSA-2023:1970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1970
23
reference_url https://access.redhat.com/errata/RHSA-2023:1980
reference_id RHSA-2023:1980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1980
24
reference_url https://access.redhat.com/errata/RHSA-2023:1984
reference_id RHSA-2023:1984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1984
25
reference_url https://usn.ubuntu.com/6025-1/
reference_id USN-6025-1
reference_type
scores
url https://usn.ubuntu.com/6025-1/
26
reference_url https://usn.ubuntu.com/6040-1/
reference_id USN-6040-1
reference_type
scores
url https://usn.ubuntu.com/6040-1/
27
reference_url https://usn.ubuntu.com/6043-1/
reference_id USN-6043-1
reference_type
scores
url https://usn.ubuntu.com/6043-1/
28
reference_url https://usn.ubuntu.com/6057-1/
reference_id USN-6057-1
reference_type
scores
url https://usn.ubuntu.com/6057-1/
29
reference_url https://usn.ubuntu.com/6071-1/
reference_id USN-6071-1
reference_type
scores
url https://usn.ubuntu.com/6071-1/
30
reference_url https://usn.ubuntu.com/6072-1/
reference_id USN-6072-1
reference_type
scores
url https://usn.ubuntu.com/6072-1/
31
reference_url https://usn.ubuntu.com/6134-1/
reference_id USN-6134-1
reference_type
scores
url https://usn.ubuntu.com/6134-1/
fixed_packages
aliases CVE-2023-0386
risk_score 10.0
exploitability 2.0
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mwwp-mrsw-jqgw
4
url VCID-r4pv-ac7b-aufb
vulnerability_id VCID-r4pv-ac7b-aufb
summary ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0266.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0266.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0266
reference_id
reference_type
scores
0
value 0.00097
scoring_system epss
scoring_elements 0.26922
published_at 2026-04-02T12:55:00Z
1
value 0.00097
scoring_system epss
scoring_elements 0.26864
published_at 2026-04-09T12:55:00Z
2
value 0.00097
scoring_system epss
scoring_elements 0.26816
published_at 2026-04-08T12:55:00Z
3
value 0.00097
scoring_system epss
scoring_elements 0.26747
published_at 2026-04-07T12:55:00Z
4
value 0.00097
scoring_system epss
scoring_elements 0.26958
published_at 2026-04-04T12:55:00Z
5
value 0.00158
scoring_system epss
scoring_elements 0.36648
published_at 2026-04-16T12:55:00Z
6
value 0.00158
scoring_system epss
scoring_elements 0.36662
published_at 2026-04-11T12:55:00Z
7
value 0.00158
scoring_system epss
scoring_elements 0.36627
published_at 2026-04-12T12:55:00Z
8
value 0.00158
scoring_system epss
scoring_elements 0.36602
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0266
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2163379
reference_id 2163379
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2163379
17
reference_url https://github.com/torvalds/linux/commit/56b88b50565cd8b946a2d00b0c83927b7ebb055e
reference_id 56b88b50565cd8b946a2d00b0c83927b7ebb055e
reference_type
scores
0
value 7.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T15:07:49Z/
url https://github.com/torvalds/linux/commit/56b88b50565cd8b946a2d00b0c83927b7ebb055e
18
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-5.10/alsa-pcm-move-rwsem-lock-inside-snd_ctl_elem_read-to-prevent-uaf.patch?id=72783cf35e6c55bca84c4bb7b776c58152856fd4
reference_id alsa-pcm-move-rwsem-lock-inside-snd_ctl_elem_read-to-prevent-uaf.patch?id=72783cf35e6c55bca84c4bb7b776c58152856fd4
reference_type
scores
0
value 7.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T15:07:49Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-5.10/alsa-pcm-move-rwsem-lock-inside-snd_ctl_elem_read-to-prevent-uaf.patch?id=72783cf35e6c55bca84c4bb7b776c58152856fd4
19
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
20
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
21
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
22
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
23
reference_url https://github.com/torvalds/linux/commit/becf9e5d553c2389d857a3c178ce80fdb34a02e1
reference_id becf9e5d553c2389d857a3c178ce80fdb34a02e1
reference_type
scores
0
value 7.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T15:07:49Z/
url https://github.com/torvalds/linux/commit/becf9e5d553c2389d857a3c178ce80fdb34a02e1
24
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 7.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T15:07:49Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
25
reference_url https://access.redhat.com/errata/RHSA-2023:1202
reference_id RHSA-2023:1202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1202
26
reference_url https://access.redhat.com/errata/RHSA-2023:1203
reference_id RHSA-2023:1203
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1203
27
reference_url https://access.redhat.com/errata/RHSA-2023:1435
reference_id RHSA-2023:1435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1435
28
reference_url https://access.redhat.com/errata/RHSA-2023:1469
reference_id RHSA-2023:1469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1469
29
reference_url https://access.redhat.com/errata/RHSA-2023:1470
reference_id RHSA-2023:1470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1470
30
reference_url https://access.redhat.com/errata/RHSA-2023:1471
reference_id RHSA-2023:1471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1471
31
reference_url https://access.redhat.com/errata/RHSA-2023:1554
reference_id RHSA-2023:1554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1554
32
reference_url https://access.redhat.com/errata/RHSA-2023:1556
reference_id RHSA-2023:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1556
33
reference_url https://access.redhat.com/errata/RHSA-2023:1557
reference_id RHSA-2023:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1557
34
reference_url https://access.redhat.com/errata/RHSA-2023:1559
reference_id RHSA-2023:1559
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1559
35
reference_url https://access.redhat.com/errata/RHSA-2023:1560
reference_id RHSA-2023:1560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1560
36
reference_url https://access.redhat.com/errata/RHSA-2023:1566
reference_id RHSA-2023:1566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1566
37
reference_url https://access.redhat.com/errata/RHSA-2023:1584
reference_id RHSA-2023:1584
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1584
38
reference_url https://access.redhat.com/errata/RHSA-2023:1588
reference_id RHSA-2023:1588
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1588
39
reference_url https://access.redhat.com/errata/RHSA-2023:1590
reference_id RHSA-2023:1590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1590
40
reference_url https://access.redhat.com/errata/RHSA-2023:1659
reference_id RHSA-2023:1659
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1659
41
reference_url https://access.redhat.com/errata/RHSA-2023:1660
reference_id RHSA-2023:1660
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1660
42
reference_url https://access.redhat.com/errata/RHSA-2023:1662
reference_id RHSA-2023:1662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1662
43
reference_url https://access.redhat.com/errata/RHSA-2023:1666
reference_id RHSA-2023:1666
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1666
44
reference_url https://access.redhat.com/errata/RHSA-2023:1677
reference_id RHSA-2023:1677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1677
45
reference_url https://usn.ubuntu.com/5915-1/
reference_id USN-5915-1
reference_type
scores
url https://usn.ubuntu.com/5915-1/
46
reference_url https://usn.ubuntu.com/5917-1/
reference_id USN-5917-1
reference_type
scores
url https://usn.ubuntu.com/5917-1/
47
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
48
reference_url https://usn.ubuntu.com/5927-1/
reference_id USN-5927-1
reference_type
scores
url https://usn.ubuntu.com/5927-1/
49
reference_url https://usn.ubuntu.com/5934-1/
reference_id USN-5934-1
reference_type
scores
url https://usn.ubuntu.com/5934-1/
50
reference_url https://usn.ubuntu.com/5939-1/
reference_id USN-5939-1
reference_type
scores
url https://usn.ubuntu.com/5939-1/
51
reference_url https://usn.ubuntu.com/5940-1/
reference_id USN-5940-1
reference_type
scores
url https://usn.ubuntu.com/5940-1/
52
reference_url https://usn.ubuntu.com/5951-1/
reference_id USN-5951-1
reference_type
scores
url https://usn.ubuntu.com/5951-1/
53
reference_url https://usn.ubuntu.com/5970-1/
reference_id USN-5970-1
reference_type
scores
url https://usn.ubuntu.com/5970-1/
54
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
55
reference_url https://usn.ubuntu.com/5979-1/
reference_id USN-5979-1
reference_type
scores
url https://usn.ubuntu.com/5979-1/
56
reference_url https://usn.ubuntu.com/5981-1/
reference_id USN-5981-1
reference_type
scores
url https://usn.ubuntu.com/5981-1/
57
reference_url https://usn.ubuntu.com/5982-1/
reference_id USN-5982-1
reference_type
scores
url https://usn.ubuntu.com/5982-1/
58
reference_url https://usn.ubuntu.com/5984-1/
reference_id USN-5984-1
reference_type
scores
url https://usn.ubuntu.com/5984-1/
59
reference_url https://usn.ubuntu.com/5987-1/
reference_id USN-5987-1
reference_type
scores
url https://usn.ubuntu.com/5987-1/
60
reference_url https://usn.ubuntu.com/5991-1/
reference_id USN-5991-1
reference_type
scores
url https://usn.ubuntu.com/5991-1/
61
reference_url https://usn.ubuntu.com/6000-1/
reference_id USN-6000-1
reference_type
scores
url https://usn.ubuntu.com/6000-1/
62
reference_url https://usn.ubuntu.com/6004-1/
reference_id USN-6004-1
reference_type
scores
url https://usn.ubuntu.com/6004-1/
63
reference_url https://usn.ubuntu.com/6009-1/
reference_id USN-6009-1
reference_type
scores
url https://usn.ubuntu.com/6009-1/
64
reference_url https://usn.ubuntu.com/6030-1/
reference_id USN-6030-1
reference_type
scores
url https://usn.ubuntu.com/6030-1/
fixed_packages
aliases CVE-2023-0266
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r4pv-ac7b-aufb
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/redhat-virtualization-host@4.5.3-202304051438_8%3Farch=6