Lookup for vulnerable packages by Package URL.

GET /api/packages/98024?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/98024?format=api",
    "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.80.1?arch=el7",
    "type": "rpm",
    "namespace": "redhat",
    "name": "kernel",
    "version": "3.10.0-1160.80.1",
    "qualifiers": {
        "arch": "el7"
    },
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4325?format=api",
            "vulnerability_id": "VCID-2uap-2vm1-efcr",
            "summary": "Retbleed - arbitrary speculative code execution with return instructions",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29900.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29900.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29900",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80477",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80587",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80545",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80531",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80523",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80553",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80554",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80558",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80584",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80498",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80488",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80517",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80527",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29900"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090226",
                    "reference_id": "2090226",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090226"
                },
                {
                    "reference_url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037",
                    "reference_id": "amd-sb-1037",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/"
                        }
                    ],
                    "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5207",
                    "reference_id": "dsa-5207",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5207"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html",
                    "reference_id": "msg00011.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM/",
                    "reference_id": "MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM/"
                },
                {
                    "reference_url": "https://www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability/",
                    "reference_id": "retbleed-intel-and-amd-processor-information-disclosure-vulnerability",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/"
                        }
                    ],
                    "url": "https://www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7110",
                    "reference_id": "RHSA-2022:7110",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7110"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7134",
                    "reference_id": "RHSA-2022:7134",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7134"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7337",
                    "reference_id": "RHSA-2022:7337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7337"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7338",
                    "reference_id": "RHSA-2022:7338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7338"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7933",
                    "reference_id": "RHSA-2022:7933",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7933"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8267",
                    "reference_id": "RHSA-2022:8267",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8267"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8973",
                    "reference_id": "RHSA-2022:8973",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8973"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8974",
                    "reference_id": "RHSA-2022:8974",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8974"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5564-1/",
                    "reference_id": "USN-5564-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5564-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5565-1/",
                    "reference_id": "USN-5565-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5565-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5566-1/",
                    "reference_id": "USN-5566-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5566-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5854-1/",
                    "reference_id": "USN-5854-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5854-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5861-1/",
                    "reference_id": "USN-5861-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5861-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5862-1/",
                    "reference_id": "USN-5862-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5862-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5865-1/",
                    "reference_id": "USN-5865-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5865-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5883-1/",
                    "reference_id": "USN-5883-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5883-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5924-1/",
                    "reference_id": "USN-5924-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5924-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5975-1/",
                    "reference_id": "USN-5975-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5975-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6007-1/",
                    "reference_id": "USN-6007-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6007-1/"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-407.html",
                    "reference_id": "XSA-407",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-407.html"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-29900"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2uap-2vm1-efcr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79151?format=api",
            "vulnerability_id": "VCID-5zzw-du1s-gyf2",
            "summary": "hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26373.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26373.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28903",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28498",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28826",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28867",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28872",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28827",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28778",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28797",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28774",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28725",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28611",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28953",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28759",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115065",
                    "reference_id": "2115065",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115065"
                },
                {
                    "reference_url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00706.html",
                    "reference_id": "intel-sa-00706.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:22Z/"
                        }
                    ],
                    "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00706.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html",
                    "reference_id": "msg00000.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:22Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html",
                    "reference_id": "msg00011.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:22Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20221007-0005/",
                    "reference_id": "ntap-20221007-0005",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:22Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20221007-0005/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7337",
                    "reference_id": "RHSA-2022:7337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7337"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7338",
                    "reference_id": "RHSA-2022:7338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7338"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7444",
                    "reference_id": "RHSA-2022:7444",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7444"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7683",
                    "reference_id": "RHSA-2022:7683",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7683"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7933",
                    "reference_id": "RHSA-2022:7933",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7933"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8267",
                    "reference_id": "RHSA-2022:8267",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8267"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8973",
                    "reference_id": "RHSA-2022:8973",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8973"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8974",
                    "reference_id": "RHSA-2022:8974",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8974"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0440",
                    "reference_id": "RHSA-2023:0440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0440"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5667-1/",
                    "reference_id": "USN-5667-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5667-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5668-1/",
                    "reference_id": "USN-5668-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5668-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5677-1/",
                    "reference_id": "USN-5677-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5677-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5682-1/",
                    "reference_id": "USN-5682-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5682-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5683-1/",
                    "reference_id": "USN-5683-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5683-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5703-1/",
                    "reference_id": "USN-5703-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5703-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5706-1/",
                    "reference_id": "USN-5706-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5706-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5854-1/",
                    "reference_id": "USN-5854-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5854-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5861-1/",
                    "reference_id": "USN-5861-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5861-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5862-1/",
                    "reference_id": "USN-5862-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5862-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5865-1/",
                    "reference_id": "USN-5865-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5865-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5883-1/",
                    "reference_id": "USN-5883-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5883-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5924-1/",
                    "reference_id": "USN-5924-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5924-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5975-1/",
                    "reference_id": "USN-5975-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5975-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6007-1/",
                    "reference_id": "USN-6007-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6007-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6221-1/",
                    "reference_id": "USN-6221-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6221-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-26373"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5zzw-du1s-gyf2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51621?format=api",
            "vulnerability_id": "VCID-kw9v-ery2-sffr",
            "summary": "Multiple vulnerabilities have been found in Xen, the worst of which can lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29901.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29901.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29901",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22224",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22272",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22055",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22136",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2219",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22211",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22171",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22111",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2211",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22104",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22058",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21918",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21906",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29901"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103148",
                    "reference_id": "2103148",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103148"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7110",
                    "reference_id": "RHSA-2022:7110",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7110"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7134",
                    "reference_id": "RHSA-2022:7134",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7134"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7337",
                    "reference_id": "RHSA-2022:7337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7337"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7338",
                    "reference_id": "RHSA-2022:7338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7338"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7933",
                    "reference_id": "RHSA-2022:7933",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7933"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8267",
                    "reference_id": "RHSA-2022:8267",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8267"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8973",
                    "reference_id": "RHSA-2022:8973",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8973"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8974",
                    "reference_id": "RHSA-2022:8974",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8974"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5564-1/",
                    "reference_id": "USN-5564-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5564-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5565-1/",
                    "reference_id": "USN-5565-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5565-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5566-1/",
                    "reference_id": "USN-5566-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5566-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5728-1/",
                    "reference_id": "USN-5728-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5728-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5728-2/",
                    "reference_id": "USN-5728-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5728-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5728-3/",
                    "reference_id": "USN-5728-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5728-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5854-1/",
                    "reference_id": "USN-5854-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5854-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5861-1/",
                    "reference_id": "USN-5861-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5861-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5862-1/",
                    "reference_id": "USN-5862-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5862-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5865-1/",
                    "reference_id": "USN-5865-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5865-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5883-1/",
                    "reference_id": "USN-5883-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5883-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5924-1/",
                    "reference_id": "USN-5924-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5924-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5975-1/",
                    "reference_id": "USN-5975-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5975-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6007-1/",
                    "reference_id": "USN-6007-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6007-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6221-1/",
                    "reference_id": "USN-6221-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6221-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-29901"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kw9v-ery2-sffr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79146?format=api",
            "vulnerability_id": "VCID-pmbu-dsmk-jkaw",
            "summary": "kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2588.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2588.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.54307",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98009",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.54307",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98011",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.54307",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98022",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.54307",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98012",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.54307",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98028",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.54307",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98027",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.54307",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98029",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.54307",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98017",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.54307",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98018",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.54426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98027",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.54426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98034",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/"
                        }
                    ],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114849",
                    "reference_id": "2114849",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114849"
                },
                {
                    "reference_url": "https://www.openwall.com/lists/oss-security/2022/08/09/6",
                    "reference_id": "6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/"
                        }
                    ],
                    "url": "https://www.openwall.com/lists/oss-security/2022/08/09/6"
                },
                {
                    "reference_url": "https://github.com/Markakd/CVE-2022-2588",
                    "reference_id": "CVE-2022-2588",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/"
                        }
                    ],
                    "url": "https://github.com/Markakd/CVE-2022-2588"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6551",
                    "reference_id": "RHSA-2022:6551",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6551"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6872",
                    "reference_id": "RHSA-2022:6872",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6872"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6875",
                    "reference_id": "RHSA-2022:6875",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6875"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6978",
                    "reference_id": "RHSA-2022:6978",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6978"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6983",
                    "reference_id": "RHSA-2022:6983",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6983"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6991",
                    "reference_id": "RHSA-2022:6991",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6991"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7110",
                    "reference_id": "RHSA-2022:7110",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7110"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7134",
                    "reference_id": "RHSA-2022:7134",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7134"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7137",
                    "reference_id": "RHSA-2022:7137",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7137"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7146",
                    "reference_id": "RHSA-2022:7146",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7146"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7171",
                    "reference_id": "RHSA-2022:7171",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7171"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7173",
                    "reference_id": "RHSA-2022:7173",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7173"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7279",
                    "reference_id": "RHSA-2022:7279",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7279"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7280",
                    "reference_id": "RHSA-2022:7280",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7280"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7337",
                    "reference_id": "RHSA-2022:7337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7337"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7338",
                    "reference_id": "RHSA-2022:7338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7338"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7344",
                    "reference_id": "RHSA-2022:7344",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7344"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7885",
                    "reference_id": "RHSA-2022:7885",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7885"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4022",
                    "reference_id": "RHSA-2023:4022",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4022"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4023",
                    "reference_id": "RHSA-2023:4023",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4023"
                },
                {
                    "reference_url": "https://lore.kernel.org/netdev/20220809170518.164662-1-cascardo@canonical.com/T/#u",
                    "reference_id": "#u",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/"
                        }
                    ],
                    "url": "https://lore.kernel.org/netdev/20220809170518.164662-1-cascardo@canonical.com/T/#u"
                },
                {
                    "reference_url": "https://ubuntu.com/security/notices/USN-5557-1",
                    "reference_id": "USN-5557-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/"
                        }
                    ],
                    "url": "https://ubuntu.com/security/notices/USN-5557-1"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5557-1/",
                    "reference_id": "USN-5557-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5557-1/"
                },
                {
                    "reference_url": "https://ubuntu.com/security/notices/USN-5560-1",
                    "reference_id": "USN-5560-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/"
                        }
                    ],
                    "url": "https://ubuntu.com/security/notices/USN-5560-1"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5560-1/",
                    "reference_id": "USN-5560-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5560-1/"
                },
                {
                    "reference_url": "https://ubuntu.com/security/notices/USN-5560-2",
                    "reference_id": "USN-5560-2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/"
                        }
                    ],
                    "url": "https://ubuntu.com/security/notices/USN-5560-2"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5560-2/",
                    "reference_id": "USN-5560-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5560-2/"
                },
                {
                    "reference_url": "https://ubuntu.com/security/notices/USN-5562-1",
                    "reference_id": "USN-5562-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/"
                        }
                    ],
                    "url": "https://ubuntu.com/security/notices/USN-5562-1"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5562-1/",
                    "reference_id": "USN-5562-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5562-1/"
                },
                {
                    "reference_url": "https://ubuntu.com/security/notices/USN-5564-1",
                    "reference_id": "USN-5564-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/"
                        }
                    ],
                    "url": "https://ubuntu.com/security/notices/USN-5564-1"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5564-1/",
                    "reference_id": "USN-5564-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5564-1/"
                },
                {
                    "reference_url": "https://ubuntu.com/security/notices/USN-5565-1",
                    "reference_id": "USN-5565-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/"
                        }
                    ],
                    "url": "https://ubuntu.com/security/notices/USN-5565-1"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5565-1/",
                    "reference_id": "USN-5565-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5565-1/"
                },
                {
                    "reference_url": "https://ubuntu.com/security/notices/USN-5566-1",
                    "reference_id": "USN-5566-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/"
                        }
                    ],
                    "url": "https://ubuntu.com/security/notices/USN-5566-1"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5566-1/",
                    "reference_id": "USN-5566-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5566-1/"
                },
                {
                    "reference_url": "https://ubuntu.com/security/notices/USN-5567-1",
                    "reference_id": "USN-5567-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/"
                        }
                    ],
                    "url": "https://ubuntu.com/security/notices/USN-5567-1"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5567-1/",
                    "reference_id": "USN-5567-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5567-1/"
                },
                {
                    "reference_url": "https://ubuntu.com/security/notices/USN-5582-1",
                    "reference_id": "USN-5582-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/"
                        }
                    ],
                    "url": "https://ubuntu.com/security/notices/USN-5582-1"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5582-1/",
                    "reference_id": "USN-5582-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5582-1/"
                },
                {
                    "reference_url": "https://ubuntu.com/security/notices/USN-5588-1",
                    "reference_id": "USN-5588-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/"
                        }
                    ],
                    "url": "https://ubuntu.com/security/notices/USN-5588-1"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5588-1/",
                    "reference_id": "USN-5588-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5588-1/"
                },
                {
                    "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1117/",
                    "reference_id": "ZDI-22-1117",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T20:44:16Z/"
                        }
                    ],
                    "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1117/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-2588"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pmbu-dsmk-jkaw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79235?format=api",
            "vulnerability_id": "VCID-r48g-c56n-sqdz",
            "summary": "hw: cpu: Intel: information disclosure via local access",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28693.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28693.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-28693",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13913",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13746",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13683",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13755",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13777",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1397",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13773",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13856",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13907",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13864",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13828",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1378",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13688",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-28693"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107465",
                    "reference_id": "2107465",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107465"
                },
                {
                    "reference_url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00707.html",
                    "reference_id": "intel-sa-00707.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-14T20:54:47Z/"
                        }
                    ],
                    "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00707.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7110",
                    "reference_id": "RHSA-2022:7110",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7110"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7134",
                    "reference_id": "RHSA-2022:7134",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7134"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7337",
                    "reference_id": "RHSA-2022:7337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7337"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7338",
                    "reference_id": "RHSA-2022:7338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7338"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7933",
                    "reference_id": "RHSA-2022:7933",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7933"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8267",
                    "reference_id": "RHSA-2022:8267",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8267"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8973",
                    "reference_id": "RHSA-2022:8973",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8973"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8974",
                    "reference_id": "RHSA-2022:8974",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8974"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-28693"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r48g-c56n-sqdz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4323?format=api",
            "vulnerability_id": "VCID-t84j-7tyr-fkfy",
            "summary": "Retbleed - arbitrary speculative code execution with return instructions",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23816.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23816.json"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090226",
                    "reference_id": "2090226",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090226"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7110",
                    "reference_id": "RHSA-2022:7110",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7110"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7134",
                    "reference_id": "RHSA-2022:7134",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7134"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7337",
                    "reference_id": "RHSA-2022:7337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7337"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7338",
                    "reference_id": "RHSA-2022:7338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7338"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7933",
                    "reference_id": "RHSA-2022:7933",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7933"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8267",
                    "reference_id": "RHSA-2022:8267",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8267"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8973",
                    "reference_id": "RHSA-2022:8973",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8973"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8974",
                    "reference_id": "RHSA-2022:8974",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8974"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-407.html",
                    "reference_id": "XSA-407",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-407.html"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-23816"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t84j-7tyr-fkfy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4324?format=api",
            "vulnerability_id": "VCID-zkyv-h5at-xkgq",
            "summary": "Retbleed - arbitrary speculative code execution with return instructions",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23825.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23825.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23825",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3369",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33723",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33561",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33605",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33638",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33633",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33591",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33569",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33602",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33578",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33546",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33387",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33368",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23825"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103153",
                    "reference_id": "2103153",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103153"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-07",
                    "reference_id": "GLSA-202402-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-07"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7110",
                    "reference_id": "RHSA-2022:7110",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7110"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7134",
                    "reference_id": "RHSA-2022:7134",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7134"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7337",
                    "reference_id": "RHSA-2022:7337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7337"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7338",
                    "reference_id": "RHSA-2022:7338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7338"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7933",
                    "reference_id": "RHSA-2022:7933",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7933"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8267",
                    "reference_id": "RHSA-2022:8267",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8267"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8973",
                    "reference_id": "RHSA-2022:8973",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8973"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8974",
                    "reference_id": "RHSA-2022:8974",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8974"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-407.html",
                    "reference_id": "XSA-407",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-407.html"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-23825",
                "XSA-407"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zkyv-h5at-xkgq"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "3.5",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@3.10.0-1160.80.1%3Farch=el7"
}