Lookup for vulnerable packages by Package URL.

GET /api/packages/79265?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/79265?format=api",
    "purl": "pkg:ebuild/app-emulation/xen@4.16.6_pre1",
    "type": "ebuild",
    "namespace": "app-emulation",
    "name": "xen",
    "version": "4.16.6_pre1",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "4.17.4",
    "latest_non_vulnerable_version": "4.17.4",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4325?format=api",
            "vulnerability_id": "VCID-2uap-2vm1-efcr",
            "summary": "Retbleed - arbitrary speculative code execution with return instructions",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29900.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29900.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29900",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80477",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80587",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80545",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80531",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80523",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80553",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80554",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80558",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80584",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80498",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80488",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80517",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80527",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29900"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090226",
                    "reference_id": "2090226",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090226"
                },
                {
                    "reference_url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037",
                    "reference_id": "amd-sb-1037",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/"
                        }
                    ],
                    "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5207",
                    "reference_id": "dsa-5207",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5207"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html",
                    "reference_id": "msg00011.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM/",
                    "reference_id": "MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM/"
                },
                {
                    "reference_url": "https://www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability/",
                    "reference_id": "retbleed-intel-and-amd-processor-information-disclosure-vulnerability",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/"
                        }
                    ],
                    "url": "https://www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7110",
                    "reference_id": "RHSA-2022:7110",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7110"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7134",
                    "reference_id": "RHSA-2022:7134",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7134"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7337",
                    "reference_id": "RHSA-2022:7337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7337"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7338",
                    "reference_id": "RHSA-2022:7338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7338"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7933",
                    "reference_id": "RHSA-2022:7933",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7933"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8267",
                    "reference_id": "RHSA-2022:8267",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8267"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8973",
                    "reference_id": "RHSA-2022:8973",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8973"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8974",
                    "reference_id": "RHSA-2022:8974",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8974"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5564-1/",
                    "reference_id": "USN-5564-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5564-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5565-1/",
                    "reference_id": "USN-5565-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5565-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5566-1/",
                    "reference_id": "USN-5566-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5566-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5854-1/",
                    "reference_id": "USN-5854-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5854-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5861-1/",
                    "reference_id": "USN-5861-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5861-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5862-1/",
                    "reference_id": "USN-5862-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5862-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5865-1/",
                    "reference_id": "USN-5865-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5865-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5883-1/",
                    "reference_id": "USN-5883-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5883-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5924-1/",
                    "reference_id": "USN-5924-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5924-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5975-1/",
                    "reference_id": "USN-5975-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5975-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6007-1/",
                    "reference_id": "USN-6007-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6007-1/"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-407.html",
                    "reference_id": "XSA-407",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-407.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79265?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.16.6_pre1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1"
                }
            ],
            "aliases": [
                "CVE-2022-29900"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2uap-2vm1-efcr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4348?format=api",
            "vulnerability_id": "VCID-3d53-4qtr-myhm",
            "summary": "x86 shadow plus log-dirty mode use-after-free",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42332",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16081",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16018",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15878",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17956",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18171",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18177",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1813",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18081",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18024",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18037",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18071",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1798",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18115",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42332"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/03/21/1",
                    "reference_id": "1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-03T15:13:24Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/03/21/1"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033297",
                    "reference_id": "1033297",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033297"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5L6PM4RE7MUE6OWA32ZVOXCP235RM2TM/",
                    "reference_id": "5L6PM4RE7MUE6OWA32ZVOXCP235RM2TM",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-03T15:13:24Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5L6PM4RE7MUE6OWA32ZVOXCP235RM2TM/"
                },
                {
                    "reference_url": "http://xenbits.xen.org/xsa/advisory-427.html",
                    "reference_id": "advisory-427.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-03T15:13:24Z/"
                        }
                    ],
                    "url": "http://xenbits.xen.org/xsa/advisory-427.html"
                },
                {
                    "reference_url": "https://xenbits.xenproject.org/xsa/advisory-427.txt",
                    "reference_id": "advisory-427.txt",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-03T15:13:24Z/"
                        }
                    ],
                    "url": "https://xenbits.xenproject.org/xsa/advisory-427.txt"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APBMS2Q6746AXAFAITNJMGBNFGNMVLWR/",
                    "reference_id": "APBMS2Q6746AXAFAITNJMGBNFGNMVLWR",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-03T15:13:24Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APBMS2Q6746AXAFAITNJMGBNFGNMVLWR/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2023/dsa-5378",
                    "reference_id": "dsa-5378",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-03T15:13:24Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2023/dsa-5378"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-03T15:13:24Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-427.html",
                    "reference_id": "XSA-427",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-427.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79265?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.16.6_pre1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1"
                }
            ],
            "aliases": [
                "CVE-2022-42332",
                "XSA-427"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3d53-4qtr-myhm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4352?format=api",
            "vulnerability_id": "VCID-4ftz-k9rh-jubk",
            "summary": "x86 shadow paging arbitrary pointer dereference",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42335",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22701",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23016",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23061",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22851",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22924",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22976",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22994",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22957",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22901",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22915",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2291",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22873",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22707",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42335"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034842",
                    "reference_id": "1034842",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034842"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-430.html",
                    "reference_id": "XSA-430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-430.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79265?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.16.6_pre1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1"
                }
            ],
            "aliases": [
                "CVE-2022-42335",
                "XSA-430"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4ftz-k9rh-jubk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4288?format=api",
            "vulnerability_id": "VCID-5dbd-kz24-6fc1",
            "summary": "issues with partially successful P2M updates on x86",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28709",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24643",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24807",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24885",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24925",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.247",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24767",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24813",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24827",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24787",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2473",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24745",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24737",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24714",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24654",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28709"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-389.html",
                    "reference_id": "XSA-389",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-389.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79265?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.16.6_pre1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1"
                }
            ],
            "aliases": [
                "CVE-2021-28709",
                "XSA-389"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5dbd-kz24-6fc1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4349?format=api",
            "vulnerability_id": "VCID-7d5b-66n7-zbe1",
            "summary": "x86/HVM pinned cache attributes mis-handling",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42333",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61946",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61978",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61947",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66431",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66418",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66388",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66424",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6644",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66426",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66449",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66464",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66396",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6641",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42333"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033297",
                    "reference_id": "1033297",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033297"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-428.html",
                    "reference_id": "XSA-428",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-428.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79265?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.16.6_pre1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1"
                }
            ],
            "aliases": [
                "CVE-2022-42333",
                "CVE-2022-43334",
                "XSA-428"
            ],
            "risk_score": 1.7,
            "exploitability": "0.5",
            "weighted_severity": "3.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7d5b-66n7-zbe1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4342?format=api",
            "vulnerability_id": "VCID-7ek3-weqx-9fhs",
            "summary": "x86: Multiple speculative security issues",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23824.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23824.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23824",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10821",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12597",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12507",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12621",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1263",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14859",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14874",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14838",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14779",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14892",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14913",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14967",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14768",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23824"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119127",
                    "reference_id": "2119127",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119127"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-422.html",
                    "reference_id": "XSA-422",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-422.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79265?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.16.6_pre1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1"
                }
            ],
            "aliases": [
                "CVE-2022-23824",
                "XSA-422"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7ek3-weqx-9fhs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4307?format=api",
            "vulnerability_id": "VCID-7etc-u5ya-zued",
            "summary": "IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26358",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31132",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31574",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31618",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31437",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3149",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31519",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31523",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31481",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31444",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31479",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31457",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31426",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31257",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26358"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-400.html",
                    "reference_id": "XSA-400",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-400.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79265?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.16.6_pre1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1"
                }
            ],
            "aliases": [
                "CVE-2022-26358"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7etc-u5ya-zued"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4338?format=api",
            "vulnerability_id": "VCID-7t5h-jy8h-t3d4",
            "summary": "Xenstore: Cooperating guests can create arbitrary numbers of nodes",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09802",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09727",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09776",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09681",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09752",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11254",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11455",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11422",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11393",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11255",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12043",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12097",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12075",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-419.html",
                    "reference_id": "XSA-419",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-419.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79265?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.16.6_pre1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1"
                }
            ],
            "aliases": [
                "CVE-2022-42323"
            ],
            "risk_score": 1.3,
            "exploitability": "0.5",
            "weighted_severity": "2.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7t5h-jy8h-t3d4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4350?format=api",
            "vulnerability_id": "VCID-7ysh-usku-c3dz",
            "summary": "x86/HVM pinned cache attributes mis-handling",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42334",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15179",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15246",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1505",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18616",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18569",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18517",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18458",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18468",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1849",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1839",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18373",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18561",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18613",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42334"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033297",
                    "reference_id": "1033297",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033297"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-428.html",
                    "reference_id": "XSA-428",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-428.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79265?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.16.6_pre1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1"
                }
            ],
            "aliases": [
                "CVE-2022-42334"
            ],
            "risk_score": 1.7,
            "exploitability": "0.5",
            "weighted_severity": "3.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7ysh-usku-c3dz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4332?format=api",
            "vulnerability_id": "VCID-8cb8-vq2c-q3e9",
            "summary": "Xenstore: Guests can crash xenstored",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42309",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16825",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16846",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16902",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16686",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16771",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18818",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18965",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18918",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18867",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18831",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1958",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19701",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19594",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42309"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-414.html",
                    "reference_id": "XSA-414",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-414.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79265?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.16.6_pre1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1"
                }
            ],
            "aliases": [
                "CVE-2022-42309",
                "XSA-414"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8cb8-vq2c-q3e9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4329?format=api",
            "vulnerability_id": "VCID-91hk-73kq-83g6",
            "summary": "lock order inversion in transitive grant copy handling",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-33748",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11606",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11778",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11821",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11609",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11693",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11748",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11761",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11723",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11699",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1156",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11563",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11686",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11646",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-33748"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021668",
                    "reference_id": "1021668",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021668"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-411.html",
                    "reference_id": "XSA-411",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-411.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79265?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.16.6_pre1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1"
                }
            ],
            "aliases": [
                "CVE-2022-33748",
                "XSA-411"
            ],
            "risk_score": 1.3,
            "exploitability": "0.5",
            "weighted_severity": "2.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-91hk-73kq-83g6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4283?format=api",
            "vulnerability_id": "VCID-9s43-gewn-bycc",
            "summary": "grant table v2 status pages may remain accessible after de-allocation (take two)",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28703",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29032",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29363",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29433",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2948",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29292",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29356",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29398",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29401",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29357",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29304",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29329",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29259",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29143",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28703"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28703",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28703"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-387.html",
                    "reference_id": "XSA-387",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-387.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79265?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.16.6_pre1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1"
                }
            ],
            "aliases": [
                "CVE-2021-28703",
                "XSA-387"
            ],
            "risk_score": 1.6,
            "exploitability": "0.5",
            "weighted_severity": "3.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9s43-gewn-bycc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4310?format=api",
            "vulnerability_id": "VCID-b7tb-ns1t-fyaw",
            "summary": "IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26361",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31132",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31574",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31618",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31437",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3149",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31519",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31523",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31481",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31444",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31479",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31457",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31426",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31257",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26361"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-400.html",
                    "reference_id": "XSA-400",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-400.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79265?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.16.6_pre1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1"
                }
            ],
            "aliases": [
                "CVE-2022-26361"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b7tb-ns1t-fyaw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4286?format=api",
            "vulnerability_id": "VCID-bxae-85uh-uyek",
            "summary": "PoD operations on misaligned GFNs",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28708",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2477",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24855",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24867",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2486",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24838",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24781",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24929",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25008",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25047",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2482",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24888",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24934",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24949",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24909",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28708"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://xenbits.xenproject.org/xsa/advisory-388.txt",
                    "reference_id": "advisory-388.txt",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-18T20:21:02Z/"
                        }
                    ],
                    "url": "https://xenbits.xenproject.org/xsa/advisory-388.txt"
                },
                {
                    "reference_url": "https://www.debian.org/security/2021/dsa-5017",
                    "reference_id": "dsa-5017",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-18T20:21:02Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2021/dsa-5017"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-18T20:21:02Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I7ZGWVVRI4XY2XSTBI3XEMWBXPDVX6OT/",
                    "reference_id": "I7ZGWVVRI4XY2XSTBI3XEMWBXPDVX6OT",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-18T20:21:02Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I7ZGWVVRI4XY2XSTBI3XEMWBXPDVX6OT/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PXUI4VMD52CH3T7YXAG3J2JW7ZNN3SXF/",
                    "reference_id": "PXUI4VMD52CH3T7YXAG3J2JW7ZNN3SXF",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-18T20:21:02Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PXUI4VMD52CH3T7YXAG3J2JW7ZNN3SXF/"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-388.html",
                    "reference_id": "XSA-388",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-388.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79265?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.16.6_pre1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1"
                }
            ],
            "aliases": [
                "CVE-2021-28708"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bxae-85uh-uyek"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4339?format=api",
            "vulnerability_id": "VCID-dfjm-gwzm-jqbt",
            "summary": "Oxenstored 32->31 bit integer truncation issues",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42324",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10047",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10122",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10183",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10087",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1015",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11591",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11713",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11671",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11632",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1179",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11751",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11726",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11589",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42324"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-420.html",
                    "reference_id": "XSA-420",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-420.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79265?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.16.6_pre1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1"
                }
            ],
            "aliases": [
                "CVE-2022-42324",
                "XSA-420"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dfjm-gwzm-jqbt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4335?format=api",
            "vulnerability_id": "VCID-dgm4-ye4m-1fcq",
            "summary": "Xenstore: Guests can get access to Xenstore nodes of deleted domains",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42320",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12428",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12384",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12359",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12308",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12229",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14067",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14108",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13898",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13907",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14013",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14809",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14774",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1481",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42320"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/11/01/7",
                    "reference_id": "7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T14:37:14Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/11/01/7"
                },
                {
                    "reference_url": "http://xenbits.xen.org/xsa/advisory-417.html",
                    "reference_id": "advisory-417.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T14:37:14Z/"
                        }
                    ],
                    "url": "http://xenbits.xen.org/xsa/advisory-417.html"
                },
                {
                    "reference_url": "https://xenbits.xenproject.org/xsa/advisory-417.txt",
                    "reference_id": "advisory-417.txt",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T14:37:14Z/"
                        }
                    ],
                    "url": "https://xenbits.xenproject.org/xsa/advisory-417.txt"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5272",
                    "reference_id": "dsa-5272",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T14:37:14Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5272"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T14:37:14Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-417.html",
                    "reference_id": "XSA-417",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-417.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/",
                    "reference_id": "YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T14:37:14Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/",
                    "reference_id": "YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T14:37:14Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/",
                    "reference_id": "ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T14:37:14Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79265?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.16.6_pre1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1"
                }
            ],
            "aliases": [
                "CVE-2022-42320",
                "XSA-417"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dgm4-ye4m-1fcq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4305?format=api",
            "vulnerability_id": "VCID-dj1v-h79p-9ydz",
            "summary": "Racy interactions between dirty vram tracking and paging log dirty hypercalls",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26356",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14982",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15105",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15172",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14976",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15065",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15116",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15084",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15045",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14985",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14882",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14889",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14943",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26356"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-397.html",
                    "reference_id": "XSA-397",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-397.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79265?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.16.6_pre1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1"
                }
            ],
            "aliases": [
                "CVE-2022-26356",
                "XSA-397"
            ],
            "risk_score": 1.7,
            "exploitability": "0.5",
            "weighted_severity": "3.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dj1v-h79p-9ydz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4330?format=api",
            "vulnerability_id": "VCID-eaz5-1yjy-cybd",
            "summary": "x86: unintended memory sharing between guests",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42327",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0265",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02663",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02726",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02739",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02748",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02638",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0263",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02647",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05215",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05164",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05266",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05248",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05193",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42327"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/11/01/3",
                    "reference_id": "3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T19:10:45Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/11/01/3"
                },
                {
                    "reference_url": "http://xenbits.xen.org/xsa/advisory-412.html",
                    "reference_id": "advisory-412.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T19:10:45Z/"
                        }
                    ],
                    "url": "http://xenbits.xen.org/xsa/advisory-412.html"
                },
                {
                    "reference_url": "https://xenbits.xenproject.org/xsa/advisory-412.txt",
                    "reference_id": "advisory-412.txt",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T19:10:45Z/"
                        }
                    ],
                    "url": "https://xenbits.xenproject.org/xsa/advisory-412.txt"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T19:10:45Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-412.html",
                    "reference_id": "XSA-412",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-412.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/",
                    "reference_id": "YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T19:10:45Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/",
                    "reference_id": "ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T19:10:45Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79265?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.16.6_pre1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1"
                }
            ],
            "aliases": [
                "CVE-2022-42327",
                "XSA-412"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eaz5-1yjy-cybd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4284?format=api",
            "vulnerability_id": "VCID-fekb-fbhz-y7g7",
            "summary": "PoD operations on misaligned GFNs",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28704",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24643",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24807",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24885",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24925",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.247",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24767",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24813",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24827",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24787",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2473",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24745",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24737",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24714",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24654",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28704"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-388.html",
                    "reference_id": "XSA-388",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-388.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79265?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.16.6_pre1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1"
                }
            ],
            "aliases": [
                "CVE-2021-28704",
                "XSA-388"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fekb-fbhz-y7g7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4327?format=api",
            "vulnerability_id": "VCID-fhbs-3nvf-tbha",
            "summary": "Arm: unbounded memory consumption for 2nd-level page tables",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-33747",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08339",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08391",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08312",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08376",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08392",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08384",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08365",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08349",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08242",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08227",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08388",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0836",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08325",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-33747"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021668",
                    "reference_id": "1021668",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021668"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-409.html",
                    "reference_id": "XSA-409",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-409.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79265?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.16.6_pre1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1"
                }
            ],
            "aliases": [
                "CVE-2022-33747",
                "XSA-409"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fhbs-3nvf-tbha"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4287?format=api",
            "vulnerability_id": "VCID-gdsj-4cbx-ufep",
            "summary": "issues with partially successful P2M updates on x86",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28705",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29828",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30158",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30195",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30243",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30063",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30122",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30161",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30119",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30069",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30082",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3006",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30014",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29944",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28705"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-389.html",
                    "reference_id": "XSA-389",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-389.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79265?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.16.6_pre1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1"
                }
            ],
            "aliases": [
                "CVE-2021-28705"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gdsj-4cbx-ufep"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4333?format=api",
            "vulnerability_id": "VCID-gj1u-mbaj-kyc5",
            "summary": "Xenstore: Guests can create orphaned Xenstore nodes",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42310",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06106",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06008",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06043",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06028",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06067",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07039",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07124",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07114",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07103",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07023",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07518",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07566",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07528",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42310"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-415.html",
                    "reference_id": "XSA-415",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-415.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79265?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.16.6_pre1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1"
                }
            ],
            "aliases": [
                "CVE-2022-42310",
                "XSA-415"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gj1u-mbaj-kyc5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4334?format=api",
            "vulnerability_id": "VCID-hsau-swt9-kyf7",
            "summary": "Xenstore: Guests can cause Xenstore to not free temporary memory",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42319",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06792",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06679",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06724",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06708",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06759",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00028",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07834",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00028",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07948",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00028",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07931",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00028",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07918",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00028",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07818",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08359",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08423",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08393",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42319"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-416.html",
                    "reference_id": "XSA-416",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-416.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79265?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.16.6_pre1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1"
                }
            ],
            "aliases": [
                "CVE-2022-42319",
                "XSA-416"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hsau-swt9-kyf7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4308?format=api",
            "vulnerability_id": "VCID-hx7j-eymk-4ygk",
            "summary": "IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26359",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31132",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31574",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31618",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31437",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3149",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31519",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31523",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31481",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31444",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31479",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31457",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31426",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31257",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26359"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-400.html",
                    "reference_id": "XSA-400",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-400.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79265?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.16.6_pre1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1"
                }
            ],
            "aliases": [
                "CVE-2022-26359"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hx7j-eymk-4ygk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4306?format=api",
            "vulnerability_id": "VCID-jwdv-qe4x-yfgw",
            "summary": "race in VT-d domain ID cleanup",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26357",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05211",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05011",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05039",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05061",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05094",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05109",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05083",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05066",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05049",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04991",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04997",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05143",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0517",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26357"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-399.html",
                    "reference_id": "XSA-399",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-399.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79265?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.16.6_pre1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1"
                }
            ],
            "aliases": [
                "CVE-2022-26357",
                "XSA-399"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jwdv-qe4x-yfgw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4347?format=api",
            "vulnerability_id": "VCID-k133-xqmd-vqhr",
            "summary": "x86: Cross-Thread Return Address Predictions",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27672.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27672.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27672",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31027",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31074",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30892",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3095",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30979",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30984",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30941",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30896",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30928",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30907",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45935",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46848",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46838",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27672"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27672",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27672"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031567",
                    "reference_id": "1031567",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031567"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174765",
                    "reference_id": "2174765",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174765"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7370",
                    "reference_id": "RHSA-2023:7370",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7370"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7379",
                    "reference_id": "RHSA-2023:7379",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7379"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5978-1/",
                    "reference_id": "USN-5978-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5978-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6079-1/",
                    "reference_id": "USN-6079-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6079-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6080-1/",
                    "reference_id": "USN-6080-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6080-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6085-1/",
                    "reference_id": "USN-6085-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6085-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6090-1/",
                    "reference_id": "USN-6090-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6090-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6091-1/",
                    "reference_id": "USN-6091-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6091-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6096-1/",
                    "reference_id": "USN-6096-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6096-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6133-1/",
                    "reference_id": "USN-6133-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6133-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6134-1/",
                    "reference_id": "USN-6134-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6134-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6284-1/",
                    "reference_id": "USN-6284-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6284-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6301-1/",
                    "reference_id": "USN-6301-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6301-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6312-1/",
                    "reference_id": "USN-6312-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6312-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6314-1/",
                    "reference_id": "USN-6314-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6314-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6331-1/",
                    "reference_id": "USN-6331-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6331-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6337-1/",
                    "reference_id": "USN-6337-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6337-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6385-1/",
                    "reference_id": "USN-6385-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6385-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6396-1/",
                    "reference_id": "USN-6396-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6396-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6396-2/",
                    "reference_id": "USN-6396-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6396-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6396-3/",
                    "reference_id": "USN-6396-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6396-3/"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-426.html",
                    "reference_id": "XSA-426",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-426.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79265?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.16.6_pre1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1"
                }
            ],
            "aliases": [
                "CVE-2022-27672",
                "XSA-426"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k133-xqmd-vqhr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51621?format=api",
            "vulnerability_id": "VCID-kw9v-ery2-sffr",
            "summary": "Multiple vulnerabilities have been found in Xen, the worst of which can lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29901.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29901.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29901",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22224",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22272",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22055",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22136",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2219",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22211",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22171",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22111",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2211",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22104",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22058",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21918",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21906",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29901"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103148",
                    "reference_id": "2103148",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103148"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7110",
                    "reference_id": "RHSA-2022:7110",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7110"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7134",
                    "reference_id": "RHSA-2022:7134",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7134"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7337",
                    "reference_id": "RHSA-2022:7337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7337"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7338",
                    "reference_id": "RHSA-2022:7338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7338"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7933",
                    "reference_id": "RHSA-2022:7933",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7933"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8267",
                    "reference_id": "RHSA-2022:8267",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8267"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8973",
                    "reference_id": "RHSA-2022:8973",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8973"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8974",
                    "reference_id": "RHSA-2022:8974",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8974"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5564-1/",
                    "reference_id": "USN-5564-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5564-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5565-1/",
                    "reference_id": "USN-5565-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5565-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5566-1/",
                    "reference_id": "USN-5566-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5566-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5728-1/",
                    "reference_id": "USN-5728-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5728-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5728-2/",
                    "reference_id": "USN-5728-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5728-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5728-3/",
                    "reference_id": "USN-5728-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5728-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5854-1/",
                    "reference_id": "USN-5854-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5854-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5861-1/",
                    "reference_id": "USN-5861-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5861-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5862-1/",
                    "reference_id": "USN-5862-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5862-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5865-1/",
                    "reference_id": "USN-5865-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5865-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5883-1/",
                    "reference_id": "USN-5883-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5883-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5924-1/",
                    "reference_id": "USN-5924-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5924-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5975-1/",
                    "reference_id": "USN-5975-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5975-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6007-1/",
                    "reference_id": "USN-6007-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6007-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6221-1/",
                    "reference_id": "USN-6221-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6221-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79265?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.16.6_pre1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1"
                }
            ],
            "aliases": [
                "CVE-2022-29901"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kw9v-ery2-sffr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4351?format=api",
            "vulnerability_id": "VCID-mcs2-ndqd-tydv",
            "summary": "x86: speculative vulnerability in 32bit SYSCALL path",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42331",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14308",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14119",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1757",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17523",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17471",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17413",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17423",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17458",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17371",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17348",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17497",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17557",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42331"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033297",
                    "reference_id": "1033297",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033297"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-429.html",
                    "reference_id": "XSA-429",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-429.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79265?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.16.6_pre1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1"
                }
            ],
            "aliases": [
                "CVE-2022-42331",
                "XSA-429"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mcs2-ndqd-tydv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4346?format=api",
            "vulnerability_id": "VCID-mn7p-cz54-hqag",
            "summary": "Guests can cause Xenstore crash via soft reset",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42330",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5258",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52528",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52555",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52521",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52574",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52568",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52619",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52602",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52587",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52626",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52633",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52569",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42330"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029830",
                    "reference_id": "1029830",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029830"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-425.html",
                    "reference_id": "XSA-425",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-425.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79265?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.16.6_pre1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1"
                }
            ],
            "aliases": [
                "CVE-2022-42330",
                "XSA-425"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mn7p-cz54-hqag"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4331?format=api",
            "vulnerability_id": "VCID-n3xk-y5zd-hqcu",
            "summary": "XAPI open file limit DoS",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-33749",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00298",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53216",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00298",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53145",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00298",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53169",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00298",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53137",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00298",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53191",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00298",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53183",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00298",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53234",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00298",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5322",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00298",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53203",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00298",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53241",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00298",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53247",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00298",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5323",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00298",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53204",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-33749"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-413.html",
                    "reference_id": "XSA-413",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-413.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79265?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.16.6_pre1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1"
                }
            ],
            "aliases": [
                "CVE-2022-33749",
                "XSA-413"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n3xk-y5zd-hqcu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4328?format=api",
            "vulnerability_id": "VCID-pb8n-hmsc-syfw",
            "summary": "P2M pool freeing may take excessively long",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-33746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11693",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11867",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11912",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11698",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11782",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11835",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11845",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11806",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11779",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11643",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11764",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11732",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-33746"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021668",
                    "reference_id": "1021668",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021668"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-410.html",
                    "reference_id": "XSA-410",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-410.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79265?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.16.6_pre1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1"
                }
            ],
            "aliases": [
                "CVE-2022-33746",
                "XSA-410"
            ],
            "risk_score": 1.3,
            "exploitability": "0.5",
            "weighted_severity": "2.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pb8n-hmsc-syfw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4337?format=api",
            "vulnerability_id": "VCID-pphm-ygb7-q7g2",
            "summary": "Xenstore: Cooperating guests can create arbitrary numbers of nodes",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09802",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09727",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09776",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09681",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09752",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11254",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11455",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11422",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11393",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11255",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12043",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12097",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12075",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-419.html",
                    "reference_id": "XSA-419",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-419.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79265?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.16.6_pre1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1"
                }
            ],
            "aliases": [
                "CVE-2022-42322",
                "XSA-419"
            ],
            "risk_score": 1.3,
            "exploitability": "0.5",
            "weighted_severity": "2.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pphm-ygb7-q7g2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4336?format=api",
            "vulnerability_id": "VCID-qnew-xqte-kbej",
            "summary": "Xenstore: Guests can crash xenstored via exhausting the stack",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.084",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08345",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08398",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0832",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08383",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09504",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09661",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09629",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09613",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09509",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10228",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10261",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10241",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-418.html",
                    "reference_id": "XSA-418",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-418.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79265?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.16.6_pre1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1"
                }
            ],
            "aliases": [
                "CVE-2022-42321",
                "XSA-418"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qnew-xqte-kbej"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4323?format=api",
            "vulnerability_id": "VCID-t84j-7tyr-fkfy",
            "summary": "Retbleed - arbitrary speculative code execution with return instructions",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23816.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23816.json"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090226",
                    "reference_id": "2090226",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090226"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7110",
                    "reference_id": "RHSA-2022:7110",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7110"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7134",
                    "reference_id": "RHSA-2022:7134",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7134"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7337",
                    "reference_id": "RHSA-2022:7337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7337"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7338",
                    "reference_id": "RHSA-2022:7338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7338"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7933",
                    "reference_id": "RHSA-2022:7933",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7933"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8267",
                    "reference_id": "RHSA-2022:8267",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8267"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8973",
                    "reference_id": "RHSA-2022:8973",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8973"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8974",
                    "reference_id": "RHSA-2022:8974",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8974"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-407.html",
                    "reference_id": "XSA-407",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-407.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79265?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.16.6_pre1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1"
                }
            ],
            "aliases": [
                "CVE-2022-23816"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t84j-7tyr-fkfy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4340?format=api",
            "vulnerability_id": "VCID-wh75-sc4f-qqc1",
            "summary": "Xenstore: Guests can create arbitrary number of nodes via transactions",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42325",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09802",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09727",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09776",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09681",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09752",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11254",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11455",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11422",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11393",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11255",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12043",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12097",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12075",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42325"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-421.html",
                    "reference_id": "XSA-421",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-421.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79265?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.16.6_pre1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1"
                }
            ],
            "aliases": [
                "CVE-2022-42325",
                "XSA-421"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wh75-sc4f-qqc1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4285?format=api",
            "vulnerability_id": "VCID-xcvw-eex8-j3bf",
            "summary": "PoD operations on misaligned GFNs",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28707",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24643",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24807",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24885",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24925",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.247",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24767",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24813",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24827",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24787",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2473",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24745",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24737",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24714",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24654",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28707"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-388.html",
                    "reference_id": "XSA-388",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-388.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79265?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.16.6_pre1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1"
                }
            ],
            "aliases": [
                "CVE-2021-28707"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xcvw-eex8-j3bf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4341?format=api",
            "vulnerability_id": "VCID-z3g4-1vhq-97dj",
            "summary": "Xenstore: Guests can create arbitrary number of nodes via transactions",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42326",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09583",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09534",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09618",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0957",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09496",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11071",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11062",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11198",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11224",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11257",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11746",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11792",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11824",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42326"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/11/01/11",
                    "reference_id": "11",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T15:05:04Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/11/01/11"
                },
                {
                    "reference_url": "http://xenbits.xen.org/xsa/advisory-421.html",
                    "reference_id": "advisory-421.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T15:05:04Z/"
                        }
                    ],
                    "url": "http://xenbits.xen.org/xsa/advisory-421.html"
                },
                {
                    "reference_url": "https://xenbits.xenproject.org/xsa/advisory-421.txt",
                    "reference_id": "advisory-421.txt",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T15:05:04Z/"
                        }
                    ],
                    "url": "https://xenbits.xenproject.org/xsa/advisory-421.txt"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5272",
                    "reference_id": "dsa-5272",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T15:05:04Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5272"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T15:05:04Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-421.html",
                    "reference_id": "XSA-421",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-421.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/",
                    "reference_id": "YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T15:05:04Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/",
                    "reference_id": "YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T15:05:04Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/",
                    "reference_id": "ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T15:05:04Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79265?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.16.6_pre1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1"
                }
            ],
            "aliases": [
                "CVE-2022-42326"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z3g4-1vhq-97dj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4281?format=api",
            "vulnerability_id": "VCID-z3qj-cnxq-pkgq",
            "summary": "guests may exceed their designated memory limit",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35949",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3616",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36355",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36388",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36222",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36271",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36294",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36299",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36238",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36282",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36266",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36214",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35982",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28706"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-385.html",
                    "reference_id": "XSA-385",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-385.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79265?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.16.6_pre1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1"
                }
            ],
            "aliases": [
                "CVE-2021-28706",
                "XSA-385"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z3qj-cnxq-pkgq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4309?format=api",
            "vulnerability_id": "VCID-z8zf-cqkb-guge",
            "summary": "IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26360",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31132",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31574",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31618",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31437",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3149",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31519",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31523",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31481",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31444",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31479",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31457",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31426",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31257",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26360"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-400.html",
                    "reference_id": "XSA-400",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-400.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79265?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.16.6_pre1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1"
                }
            ],
            "aliases": [
                "CVE-2022-26360",
                "XSA-400"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z8zf-cqkb-guge"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4324?format=api",
            "vulnerability_id": "VCID-zkyv-h5at-xkgq",
            "summary": "Retbleed - arbitrary speculative code execution with return instructions",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23825.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23825.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23825",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3369",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33723",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33561",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33605",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33638",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33633",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33591",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33569",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33602",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33578",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33546",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33387",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33368",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23825"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103153",
                    "reference_id": "2103153",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103153"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7110",
                    "reference_id": "RHSA-2022:7110",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7110"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7134",
                    "reference_id": "RHSA-2022:7134",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7134"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7337",
                    "reference_id": "RHSA-2022:7337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7337"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7338",
                    "reference_id": "RHSA-2022:7338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7338"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7933",
                    "reference_id": "RHSA-2022:7933",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7933"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8267",
                    "reference_id": "RHSA-2022:8267",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8267"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8973",
                    "reference_id": "RHSA-2022:8973",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8973"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8974",
                    "reference_id": "RHSA-2022:8974",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8974"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-407.html",
                    "reference_id": "XSA-407",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-407.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79265?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.16.6_pre1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1"
                }
            ],
            "aliases": [
                "CVE-2022-23825",
                "XSA-407"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zkyv-h5at-xkgq"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1"
}