Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-5eck-adts-e3de
Vulnerability ID VCID-5eck-adts-e3de
Aliases CVE-2023-39326
Summary Multiple vulnerabilities have been discovered in Go, the worst of which could lead to information leakage or a denial of service.
Status Published
Exploitability 0.5
Weighted Severity 4.8
Risk 2.4
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 5.3 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39326.json
epss 0.00123 https://api.first.org/data/v1/epss?cve=CVE-2023-39326
epss 0.00123 https://api.first.org/data/v1/epss?cve=CVE-2023-39326
epss 0.00123 https://api.first.org/data/v1/epss?cve=CVE-2023-39326
epss 0.00123 https://api.first.org/data/v1/epss?cve=CVE-2023-39326
epss 0.00123 https://api.first.org/data/v1/epss?cve=CVE-2023-39326
epss 0.00123 https://api.first.org/data/v1/epss?cve=CVE-2023-39326
epss 0.00123 https://api.first.org/data/v1/epss?cve=CVE-2023-39326
epss 0.00123 https://api.first.org/data/v1/epss?cve=CVE-2023-39326
epss 0.00123 https://api.first.org/data/v1/epss?cve=CVE-2023-39326
epss 0.00123 https://api.first.org/data/v1/epss?cve=CVE-2023-39326
epss 0.00123 https://api.first.org/data/v1/epss?cve=CVE-2023-39326
epss 0.00123 https://api.first.org/data/v1/epss?cve=CVE-2023-39326
epss 0.00123 https://api.first.org/data/v1/epss?cve=CVE-2023-39326
epss 0.00123 https://api.first.org/data/v1/epss?cve=CVE-2023-39326
epss 0.00123 https://api.first.org/data/v1/epss?cve=CVE-2023-39326
epss 0.00123 https://api.first.org/data/v1/epss?cve=CVE-2023-39326
epss 0.00123 https://api.first.org/data/v1/epss?cve=CVE-2023-39326
epss 0.00123 https://api.first.org/data/v1/epss?cve=CVE-2023-39326
epss 0.00123 https://api.first.org/data/v1/epss?cve=CVE-2023-39326
epss 0.00123 https://api.first.org/data/v1/epss?cve=CVE-2023-39326
epss 0.00123 https://api.first.org/data/v1/epss?cve=CVE-2023-39326
cvssv3.1 7.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39326.json
https://api.first.org/data/v1/epss?cve=CVE-2023-39326
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39326
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2253330 https://bugzilla.redhat.com/show_bug.cgi?id=2253330
GLSA-202408-07 https://security.gentoo.org/glsa/202408-07
RHSA-2023:7198 https://access.redhat.com/errata/RHSA-2023:7198
RHSA-2023:7200 https://access.redhat.com/errata/RHSA-2023:7200
RHSA-2023:7201 https://access.redhat.com/errata/RHSA-2023:7201
RHSA-2024:0269 https://access.redhat.com/errata/RHSA-2024:0269
RHSA-2024:0281 https://access.redhat.com/errata/RHSA-2024:0281
RHSA-2024:0530 https://access.redhat.com/errata/RHSA-2024:0530
RHSA-2024:0694 https://access.redhat.com/errata/RHSA-2024:0694
RHSA-2024:0695 https://access.redhat.com/errata/RHSA-2024:0695
RHSA-2024:0728 https://access.redhat.com/errata/RHSA-2024:0728
RHSA-2024:0748 https://access.redhat.com/errata/RHSA-2024:0748
RHSA-2024:0843 https://access.redhat.com/errata/RHSA-2024:0843
RHSA-2024:0880 https://access.redhat.com/errata/RHSA-2024:0880
RHSA-2024:0887 https://access.redhat.com/errata/RHSA-2024:0887
RHSA-2024:1041 https://access.redhat.com/errata/RHSA-2024:1041
RHSA-2024:1078 https://access.redhat.com/errata/RHSA-2024:1078
RHSA-2024:1131 https://access.redhat.com/errata/RHSA-2024:1131
RHSA-2024:1149 https://access.redhat.com/errata/RHSA-2024:1149
RHSA-2024:1244 https://access.redhat.com/errata/RHSA-2024:1244
RHSA-2024:1434 https://access.redhat.com/errata/RHSA-2024:1434
RHSA-2024:1812 https://access.redhat.com/errata/RHSA-2024:1812
RHSA-2024:1859 https://access.redhat.com/errata/RHSA-2024:1859
RHSA-2024:1896 https://access.redhat.com/errata/RHSA-2024:1896
RHSA-2024:1901 https://access.redhat.com/errata/RHSA-2024:1901
RHSA-2024:2160 https://access.redhat.com/errata/RHSA-2024:2160
RHSA-2024:2193 https://access.redhat.com/errata/RHSA-2024:2193
RHSA-2024:2245 https://access.redhat.com/errata/RHSA-2024:2245
RHSA-2024:2272 https://access.redhat.com/errata/RHSA-2024:2272
RHSA-2024:2728 https://access.redhat.com/errata/RHSA-2024:2728
RHSA-2024:2988 https://access.redhat.com/errata/RHSA-2024:2988
RHSA-2024:3316 https://access.redhat.com/errata/RHSA-2024:3316
RHSA-2024:3467 https://access.redhat.com/errata/RHSA-2024:3467
RHSA-2024:3479 https://access.redhat.com/errata/RHSA-2024:3479
RHSA-2024:3868 https://access.redhat.com/errata/RHSA-2024:3868
USN-6574-1 https://usn.ubuntu.com/6574-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39326.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.31657
EPSS Score 0.00123
Published At April 2, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:03:16.792638+00:00 Gentoo Importer Import https://security.gentoo.org/glsa/202408-07 38.0.0