Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-2k5h-eehr-eufe
Summaryshim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems
Aliases
0
alias CVE-2023-40548
Fixed_packages
0
url pkg:deb/debian/shim@15.8-1~deb11u1?distro=trixie
purl pkg:deb/debian/shim@15.8-1~deb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/shim@15.8-1~deb11u1%3Fdistro=trixie
1
url pkg:deb/debian/shim@15.8-1~deb11u1
purl pkg:deb/debian/shim@15.8-1~deb11u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/shim@15.8-1~deb11u1
2
url pkg:deb/debian/shim@15.8-1~deb12u1?distro=trixie
purl pkg:deb/debian/shim@15.8-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/shim@15.8-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/shim@15.8-1?distro=trixie
purl pkg:deb/debian/shim@15.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/shim@15.8-1%3Fdistro=trixie
4
url pkg:deb/debian/shim@16.1-1?distro=trixie
purl pkg:deb/debian/shim@16.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/shim@16.1-1%3Fdistro=trixie
5
url pkg:deb/debian/shim@16.1-2?distro=trixie
purl pkg:deb/debian/shim@16.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/shim@16.1-2%3Fdistro=trixie
Affected_packages
0
url pkg:deb/debian/shim@0.9%2B1474479173.6c180c6-1
purl pkg:deb/debian/shim@0.9%2B1474479173.6c180c6-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2k5h-eehr-eufe
1
vulnerability VCID-5sa4-gwdj-7ygc
2
vulnerability VCID-bk8q-vscb-1ba4
3
vulnerability VCID-gjd2-6z4w-gkdn
4
vulnerability VCID-ntsj-rnvk-y7fn
5
vulnerability VCID-ux7y-c4pu-43ex
6
vulnerability VCID-z8xq-mf7b-9fd8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/shim@0.9%252B1474479173.6c180c6-1
1
url pkg:deb/debian/shim@15.4-7~deb10u1
purl pkg:deb/debian/shim@15.4-7~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2k5h-eehr-eufe
1
vulnerability VCID-5sa4-gwdj-7ygc
2
vulnerability VCID-bk8q-vscb-1ba4
3
vulnerability VCID-gjd2-6z4w-gkdn
4
vulnerability VCID-ntsj-rnvk-y7fn
5
vulnerability VCID-ux7y-c4pu-43ex
6
vulnerability VCID-z8xq-mf7b-9fd8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/shim@15.4-7~deb10u1
2
url pkg:rpm/redhat/shim@15.8-2?arch=el8_2
purl pkg:rpm/redhat/shim@15.8-2?arch=el8_2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2k5h-eehr-eufe
1
vulnerability VCID-bk8q-vscb-1ba4
2
vulnerability VCID-gjd2-6z4w-gkdn
3
vulnerability VCID-ntsj-rnvk-y7fn
4
vulnerability VCID-ux7y-c4pu-43ex
5
vulnerability VCID-z8xq-mf7b-9fd8
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/shim@15.8-2%3Farch=el8_2
3
url pkg:rpm/redhat/shim@15.8-2?arch=el8_6
purl pkg:rpm/redhat/shim@15.8-2?arch=el8_6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2k5h-eehr-eufe
1
vulnerability VCID-bk8q-vscb-1ba4
2
vulnerability VCID-gjd2-6z4w-gkdn
3
vulnerability VCID-ntsj-rnvk-y7fn
4
vulnerability VCID-ux7y-c4pu-43ex
5
vulnerability VCID-z8xq-mf7b-9fd8
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/shim@15.8-2%3Farch=el8_6
4
url pkg:rpm/redhat/shim@15.8-2?arch=el8
purl pkg:rpm/redhat/shim@15.8-2?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2k5h-eehr-eufe
1
vulnerability VCID-bk8q-vscb-1ba4
2
vulnerability VCID-gjd2-6z4w-gkdn
3
vulnerability VCID-ntsj-rnvk-y7fn
4
vulnerability VCID-ux7y-c4pu-43ex
5
vulnerability VCID-z8xq-mf7b-9fd8
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/shim@15.8-2%3Farch=el8
5
url pkg:rpm/redhat/shim@15.8-2?arch=el8_4
purl pkg:rpm/redhat/shim@15.8-2?arch=el8_4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2k5h-eehr-eufe
1
vulnerability VCID-bk8q-vscb-1ba4
2
vulnerability VCID-gjd2-6z4w-gkdn
3
vulnerability VCID-ntsj-rnvk-y7fn
4
vulnerability VCID-ux7y-c4pu-43ex
5
vulnerability VCID-z8xq-mf7b-9fd8
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/shim@15.8-2%3Farch=el8_4
6
url pkg:rpm/redhat/shim@15.8-3?arch=el9_2
purl pkg:rpm/redhat/shim@15.8-3?arch=el9_2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2k5h-eehr-eufe
1
vulnerability VCID-bk8q-vscb-1ba4
2
vulnerability VCID-gjd2-6z4w-gkdn
3
vulnerability VCID-ntsj-rnvk-y7fn
4
vulnerability VCID-ux7y-c4pu-43ex
5
vulnerability VCID-z8xq-mf7b-9fd8
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/shim@15.8-3%3Farch=el9_2
7
url pkg:rpm/redhat/shim@15.8-3?arch=el7
purl pkg:rpm/redhat/shim@15.8-3?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2k5h-eehr-eufe
1
vulnerability VCID-bk8q-vscb-1ba4
2
vulnerability VCID-gjd2-6z4w-gkdn
3
vulnerability VCID-ntsj-rnvk-y7fn
4
vulnerability VCID-ux7y-c4pu-43ex
5
vulnerability VCID-z8xq-mf7b-9fd8
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/shim@15.8-3%3Farch=el7
8
url pkg:rpm/redhat/shim@15.8-3?arch=el9
purl pkg:rpm/redhat/shim@15.8-3?arch=el9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2k5h-eehr-eufe
1
vulnerability VCID-bk8q-vscb-1ba4
2
vulnerability VCID-gjd2-6z4w-gkdn
3
vulnerability VCID-ntsj-rnvk-y7fn
4
vulnerability VCID-ux7y-c4pu-43ex
5
vulnerability VCID-z8xq-mf7b-9fd8
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/shim@15.8-3%3Farch=el9
9
url pkg:rpm/redhat/shim@15.8-4?arch=el8_9
purl pkg:rpm/redhat/shim@15.8-4?arch=el8_9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2k5h-eehr-eufe
1
vulnerability VCID-bk8q-vscb-1ba4
2
vulnerability VCID-gjd2-6z4w-gkdn
3
vulnerability VCID-ntsj-rnvk-y7fn
4
vulnerability VCID-ux7y-c4pu-43ex
5
vulnerability VCID-z8xq-mf7b-9fd8
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/shim@15.8-4%3Farch=el8_9
10
url pkg:rpm/redhat/shim@15.8-4?arch=el9_3
purl pkg:rpm/redhat/shim@15.8-4?arch=el9_3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2k5h-eehr-eufe
1
vulnerability VCID-bk8q-vscb-1ba4
2
vulnerability VCID-gjd2-6z4w-gkdn
3
vulnerability VCID-ntsj-rnvk-y7fn
4
vulnerability VCID-ux7y-c4pu-43ex
5
vulnerability VCID-z8xq-mf7b-9fd8
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/shim@15.8-4%3Farch=el9_3
11
url pkg:rpm/redhat/shim-signed@15.8-1?arch=el7
purl pkg:rpm/redhat/shim-signed@15.8-1?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2k5h-eehr-eufe
1
vulnerability VCID-bk8q-vscb-1ba4
2
vulnerability VCID-gjd2-6z4w-gkdn
3
vulnerability VCID-ntsj-rnvk-y7fn
4
vulnerability VCID-ux7y-c4pu-43ex
5
vulnerability VCID-z8xq-mf7b-9fd8
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/shim-signed@15.8-1%3Farch=el7
12
url pkg:rpm/redhat/shim-unsigned-aarch64@15.8-2?arch=el9
purl pkg:rpm/redhat/shim-unsigned-aarch64@15.8-2?arch=el9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2k5h-eehr-eufe
1
vulnerability VCID-bk8q-vscb-1ba4
2
vulnerability VCID-gjd2-6z4w-gkdn
3
vulnerability VCID-ntsj-rnvk-y7fn
4
vulnerability VCID-ux7y-c4pu-43ex
5
vulnerability VCID-z8xq-mf7b-9fd8
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/shim-unsigned-aarch64@15.8-2%3Farch=el9
13
url pkg:rpm/redhat/shim-unsigned-x64@15.8-2?arch=el8
purl pkg:rpm/redhat/shim-unsigned-x64@15.8-2?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2k5h-eehr-eufe
1
vulnerability VCID-bk8q-vscb-1ba4
2
vulnerability VCID-gjd2-6z4w-gkdn
3
vulnerability VCID-ntsj-rnvk-y7fn
4
vulnerability VCID-ux7y-c4pu-43ex
5
vulnerability VCID-z8xq-mf7b-9fd8
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/shim-unsigned-x64@15.8-2%3Farch=el8
14
url pkg:rpm/redhat/shim-unsigned-x64@15.8-2?arch=el9
purl pkg:rpm/redhat/shim-unsigned-x64@15.8-2?arch=el9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2k5h-eehr-eufe
1
vulnerability VCID-bk8q-vscb-1ba4
2
vulnerability VCID-gjd2-6z4w-gkdn
3
vulnerability VCID-ntsj-rnvk-y7fn
4
vulnerability VCID-ux7y-c4pu-43ex
5
vulnerability VCID-z8xq-mf7b-9fd8
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/shim-unsigned-x64@15.8-2%3Farch=el9
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40548.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40548.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-40548
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.0941
published_at 2026-05-07T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09333
published_at 2026-04-29T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09246
published_at 2026-05-05T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09272
published_at 2026-04-02T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09323
published_at 2026-04-04T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09237
published_at 2026-04-07T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09312
published_at 2026-04-08T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09358
published_at 2026-04-09T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.09367
published_at 2026-04-11T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.09339
published_at 2026-04-12T12:55:00Z
10
value 0.00032
scoring_system epss
scoring_elements 0.09326
published_at 2026-04-13T12:55:00Z
11
value 0.00032
scoring_system epss
scoring_elements 0.09216
published_at 2026-04-16T12:55:00Z
12
value 0.00032
scoring_system epss
scoring_elements 0.09214
published_at 2026-04-18T12:55:00Z
13
value 0.00032
scoring_system epss
scoring_elements 0.09365
published_at 2026-04-21T12:55:00Z
14
value 0.00032
scoring_system epss
scoring_elements 0.09416
published_at 2026-04-24T12:55:00Z
15
value 0.00032
scoring_system epss
scoring_elements 0.09371
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-40548
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40548
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40548
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061519
reference_id 1061519
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061519
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241782
reference_id 2241782
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T18:45:11Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2241782
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb
reference_id cpe:/a:redhat:rhel_eus:8.8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb
reference_id cpe:/a:redhat:rhel_eus:9.0::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
reference_id cpe:/o:redhat:enterprise_linux:7::client
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
reference_id cpe:/o:redhat:enterprise_linux:7::server
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
reference_id cpe:/o:redhat:enterprise_linux:7::workstation
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.2::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.2::baseos
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.4::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.4::baseos
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
reference_id cpe:/o:redhat:rhel_eus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos
reference_id cpe:/o:redhat:rhel_eus:9.0::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
reference_id cpe:/o:redhat:rhel_eus:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.2::baseos
reference_id cpe:/o:redhat:rhel_tus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.2::baseos
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.4::baseos
reference_id cpe:/o:redhat:rhel_tus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.4::baseos
24
reference_url https://access.redhat.com/security/cve/CVE-2023-40548
reference_id CVE-2023-40548
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T18:45:11Z/
url https://access.redhat.com/security/cve/CVE-2023-40548
25
reference_url https://access.redhat.com/errata/RHSA-2024:1834
reference_id RHSA-2024:1834
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T18:45:11Z/
url https://access.redhat.com/errata/RHSA-2024:1834
26
reference_url https://access.redhat.com/errata/RHSA-2024:1835
reference_id RHSA-2024:1835
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T18:45:11Z/
url https://access.redhat.com/errata/RHSA-2024:1835
27
reference_url https://access.redhat.com/errata/RHSA-2024:1873
reference_id RHSA-2024:1873
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T18:45:11Z/
url https://access.redhat.com/errata/RHSA-2024:1873
28
reference_url https://access.redhat.com/errata/RHSA-2024:1876
reference_id RHSA-2024:1876
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T18:45:11Z/
url https://access.redhat.com/errata/RHSA-2024:1876
29
reference_url https://access.redhat.com/errata/RHSA-2024:1883
reference_id RHSA-2024:1883
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T18:45:11Z/
url https://access.redhat.com/errata/RHSA-2024:1883
30
reference_url https://access.redhat.com/errata/RHSA-2024:1902
reference_id RHSA-2024:1902
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T18:45:11Z/
url https://access.redhat.com/errata/RHSA-2024:1902
31
reference_url https://access.redhat.com/errata/RHSA-2024:1903
reference_id RHSA-2024:1903
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T18:45:11Z/
url https://access.redhat.com/errata/RHSA-2024:1903
32
reference_url https://access.redhat.com/errata/RHSA-2024:1959
reference_id RHSA-2024:1959
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T18:45:11Z/
url https://access.redhat.com/errata/RHSA-2024:1959
33
reference_url https://access.redhat.com/errata/RHSA-2024:2086
reference_id RHSA-2024:2086
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T18:45:11Z/
url https://access.redhat.com/errata/RHSA-2024:2086
Weaknesses
0
cwe_id 190
name Integer Overflow or Wraparound
description The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
1
cwe_id 787
name Out-of-bounds Write
description The product writes data past the end, or before the beginning, of the intended buffer.
Exploits
Severity_range_score6.7 - 7.4
Exploitability0.5
Weighted_severity6.7
Risk_score3.4
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-2k5h-eehr-eufe